WO2021087386A1 - Utility monitoring, analytics security management and business process management system and method - Google Patents

Utility monitoring, analytics security management and business process management system and method Download PDF

Info

Publication number
WO2021087386A1
WO2021087386A1 PCT/US2020/058396 US2020058396W WO2021087386A1 WO 2021087386 A1 WO2021087386 A1 WO 2021087386A1 US 2020058396 W US2020058396 W US 2020058396W WO 2021087386 A1 WO2021087386 A1 WO 2021087386A1
Authority
WO
WIPO (PCT)
Prior art keywords
utility
data
monitoring
analytics
report
Prior art date
Application number
PCT/US2020/058396
Other languages
French (fr)
Inventor
Alastair Hood
Original Assignee
Verdafero, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US16/671,114 external-priority patent/US20210018335A1/en
Application filed by Verdafero, Inc. filed Critical Verdafero, Inc.
Publication of WO2021087386A1 publication Critical patent/WO2021087386A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/067Enterprise or organisation modelling
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0637Strategic management or analysis, e.g. setting a goal or target of an organisation; Planning actions based on goals; Analysis or evaluation of effectiveness of goals
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/80Management or planning
    • Y02P90/84Greenhouse gas [GHG] management systems
    • Y02P90/845Inventory and reporting systems for greenhouse gases [GHG]

Definitions

  • the disclosure relates generally to a system and method for monitoring and analyzing a building’s utilities or business processes and in particular to a system and method for providing analytical insight into the utility data as part of a business’ security strategy or management of business processes.
  • Figure l is a block diagram of an implementation of the utility monitoring and analytics security management system
  • Figure 2 is a flowchart of a method for utility monitoring and analytics security management using, for example, the system in Figure 1;
  • Figures 3 A and 3B illustrate examples of the output data of the utility monitoring and analytics security management system
  • Figure 4 is a flowchart illustrating more details of a method for utility monitoring and analytics security management using, for example, the system in Figure 1;
  • Figure 5 is a flowchart illustrating the potential options available for a method for utility monitoring and analytics security management using, for example, the system in Figure 1;
  • Figure 6 is a flowchart asking the user for input on what utilities they would like to monitor;
  • Figure 7 illustrates an example of an improving the performance of your building utility security analysis summary user interface of the utility monitoring and analytics security management system
  • Figure 8 illustrates an example of a system to provide a utility overview report from an analysis with the utility monitoring and analytics security management system
  • Figure 9 illustrates an example of a system to check your utility bills for errors using the utility monitoring and analytics security management system
  • Figure 10 illustrates an example of a system to detect unusual behavior of your building utility security usage and costs using the utility monitoring and analytics security management system
  • Figure 11 illustrates an example of comparing your property against others / your own utility usage user interfaces of the utility monitoring and analytics security management system
  • Figure 12 illustrates an example of setting utility security goals / develop utility monitoring security plan user interfaces of the utility monitoring and analytics security management system
  • Figure 13 illustrates an example of a utility security monitoring certification checklist summary user interface of the utility monitoring and analytics security management system
  • Figure 14 illustrates an example of a building performance for insurance / financial assessment report user interface of the utility monitoring and analytics security management system
  • Figure 15 illustrates an example of a local governmental building ordinances report user interface of the utility monitoring and analytics security management system
  • Figure 16 illustrates an example of identifying fraudulent / suspicious activity using machine learning / AI user interface of the utility monitoring and analytics security management system
  • Figure 17 illustrates an example of quantative data capture of the utility monitoring and analytics security management system
  • Figure 18 illustrates an example of data analysis process of the utility monitoring and analytics security management system
  • Figure 19 illustrates an example of data output process of the utility monitoring and analytics security management system
  • Figure 20 illustrates an example of the utility monitoring report process of the utility monitoring and analytics security management system
  • Figure 21 illustrates an example of the utility analysis report process of the utility monitoring and analytics security management system
  • Figure 22 illustrates an example of the abnormalities / potential security problems report process of the utility monitoring and analytics security management system
  • Figure 23 illustrates an example of the property utility comparison report process of the utility monitoring and analytics security management system
  • Figure 24 illustrates an example of the utility security monitoring certification report process of the utility monitoring and analytics security management system
  • Figure 25 illustrates an example of the property performance for insurance report process of the utility monitoring and analytics security management system
  • Figure 26 illustrates an example of the local governmental building ordinance reporting process of the utility monitoring and analytics security management system
  • Figure 27 illustrates an example of the machine learning / AI detected fraudulent / suspicious activity report process of the utility monitoring and analytics security management system
  • Figures 28A-28B illustrate an example of a company main utility monitoring dashboard user interface of the utility monitoring and analytics security management system
  • Figure 29 illustrates an example of a manufacturing line (an example of a business process) that may be managed by the system.
  • the disclosure is particularly applicable to a web-based system that implements the Utility Monitoring and Analytics Security and Business Process Management System and Method, and it is in this context that the disclosure will be described. It will be appreciated, however, that the system and method has greater utility since it can be implemented in other manners/using different architectures, and may be used for other purposes that those specifically described below for the specific implementation. Furthermore, the system may be used to monitor and provide analytics for any business process in which it is desirable to provide the predictive analytics, the production performance, the cost of ownership etc. for the business process and the individual elements of the business process.
  • a Utility Monitoring and Analytics Security Management System and Method is provided for parties, such as channel partners and/or property owners/operators, and provides these parties with a comprehensive monitoring (real-time or historical), analysis and reporting system to help them gain an improved realization of their utility usage, costs, and metrics including the security monitoring of their utility resources, billing errors, operational or equipment problems as well as environmental and societal impacts of their building’s activities with the ability to manage and report on these parameters in a way that can alert the user to fraudulent activity or misuse of a building’s utilities.
  • the system may include automated data entry from related utility service providers such as energy, water, waste, etc., other data sources such as weather data, applicable property data sources such as occupancy etc, powerful utility analytic metrics and analysis processes, TCP/IP communications capabilities or communication capabilities over cellular networks, a World Wide Web (WWW)-based interface with a Software-as-a-Service (SaaS) architecture, and an Application Programming Interface (API) to communications with other external communication devices and individual Intemet-of-Thing (IoT) sensors and systems and other value added services.
  • the system also includes a real-time data retrieval and dissemination process and system which permits real-time utility data and analysis to be communicated immediately within the system.
  • the utility monitoring and analytics security management system has an artificial intelligence (AI) decision engine that has a comparison mechanism and action planner to give the user real-world next step actions and alerts to pre-defmed trigger points and recommendations for the optimum security analysis output.
  • AI artificial intelligence
  • the system and method may also be used for any business process in which sensors, such as IoT sensors, measure characteristics of a portion of the business process (an amount of energy consumed by a motor), a throughput of input materials into the process and/or the output of the business process and the system determines a correlation between the business process output and the characteristics of the business process.
  • the system may generate predictive analysis of production capabilities and energy production costs of the process based on the data from the sensors.
  • the system also may determine a downtime of the process based on the data from the sensors and may determine production problems for the process based on the data from the sensors.
  • the system also may determine a total cost of ownership of an element of the process based on the data from the sensors.
  • FIG l is a block diagram of an implementation of the utility monitoring and analytics security management system 50.
  • the system 50 may have one or more computing devices 52, such as computing devices 52a, 52b, ...52n as shown in Figure 1) that establish contact with, communicate with and exchange data with a utility monitoring and analytics security management unit 58 over a link 56.
  • Each computing device 52 may be a device with one or more processing unit(s), memory, storage, wireless or wired connectivity capabilities and a display sufficient to permit the computing device 52 to interact with the utility monitoring and analytics security management unit 58 as described below.
  • each computing device 52 may be a desktop computer, a laptop computer, a tablet computer, a smartphone (Apple iPhone, RIM Blackberry, phones that run the Android operating system), a terminal and the like since the implementation of the system is not limited to any particular computing device.
  • each computing device 52 may have a browser 54 that allows the user of the computing device to interact with the utility monitoring and analytics security management unit 58 as described below.
  • the processing unit on each computing device 52 may execute a web browser application or a small downloadable application that can be stored on the computing device and then executed by the processing unit.
  • the link 56 may be a digital data link, that may be wired or wireless, and may be digital cellular network or a computer network since the implementation of the system is not limited to any particular link.
  • the utility monitoring and analytics security management unit 58 may be, in one embodiment, one or more server computers that execute a plurality of line of computer code to implement the functions and operations of the utility monitoring and analytics security management unit 58 as described below.
  • the utility monitoring and analytics security management unit 58 may also be implemented in hardware or a combination of hardware and software.
  • the utility monitoring and analytics security management unit 58 may utilize, for example, a LAMP stack software bundle or other implementation that allows multiple computing devices in the client environment to be connected to a PHP/MySQL managed database and website user interface (commonly referred to as a Software as a Service, or SaaS).
  • SaaS Software as a Service
  • the utility monitoring and analytics security management unit 58 also may be implemented in a standalone computer system architecture, a mainframe type architecture, a downloadable application architecture and the like since the system is not limited to any particular architecture implementation.
  • the utility monitoring and analytics security management unit 58 may further comprise a web server 60 (that may be software or hardware) that coordinates interactions with the computing devices, receives data from the computing devices and generates outputs, such as web pages, that are delivered to each computing device as needed, a management unit 64 that manages the overall operation of the utility monitoring and analytics security management unit 58, controls the web server 60, manages the user data and manages a security monitoring business development analysis unit 66.
  • the utility monitoring and analytics security management unit 58 may be coupled to a store 68, such as one or more databases for example, that stores the user data of the system, stored security upgrade projects, the analyzed data and the like.
  • the units 60-66 and store 68 may be implemented in hardware or software.
  • Figure 2 is a flowchart of a method 70 for utility monitoring and analytics security management using, for example, the system in Figure 1 for each user of the system when the user wants to receive an output from the system.
  • the system captures user profile data about their property data (including, but not limited to business property size and use, strategic security goals, utility consumption data, etc) and implements a computational process to analyze their historical utility data to current data via internet enabled energy, water or other utility type meters / IoT sensors to alert the user of any potential abnormal or security related activities associated with the building’s utilities.
  • a user enters property details into the system (72).
  • the system may query a user about the one or more desired outputs of the system (such as a particular chart to show a particular security aspect such as energy usage) and the system may then request data from the user about the desired outputs wherein the requested data may include qualitative data and quantitative data.
  • the system also is capable of other input methods including file imports, an API to receive data from other systems, sub-meters, IoT sensors, billing systems and the like.
  • the meters used will primarily be ‘off the shelf internet enabled energy, water or other utility type meters that have a user configurable API that the utility monitoring and analytics security management system will use to make a connection with and poll via an internet request at varying increments of time to write / read data to / from the meter as necessary to get the quantity and quality of data we need to produce effective analysis and alerts on usage and cost security issues.
  • These meters could be single ‘whole building’ utility meters, individual utility meters serving specific areas of a location or user installed ‘sub-meters’ on an individual circuit or a combination there of.
  • the utility monitoring and analytics security management system can use IoT sensors on individual pieces of equipment that uses a utility stream for operation.
  • the sensors would be internet enabled ‘off the shelf type sensors with an API that that we will use to make a connection with and poll via an internet request at varying increments of time to write / read data to / from the sensor as necessary to get the quantity and quality of data we need to produce effective analysis and alerts on usage and cost security issues.
  • the system may perform data analysis (74). During the data analysis, the system may, for example, serve insights into their utility data, such as alerts or data trends, to the user via his/her computing device and also provide potential causes of the insights.
  • the system may also perform a data output process (76) in which the system generates the desired outputs for the particular user.
  • the data output may include system reports on the appropriate metrics (based on the user’s desired outputs).
  • the system may have an API that allows the system (and the data outputs of the system) to be broadly adopted/used by other systems that can interface with the utility monitoring and analytics security management system 50.
  • Figure 3 A-B illustrate examples of the output data of the utility monitoring and analytics security management system.
  • Figure 3 A illustrates a data output (shown as a web page in this example) in which the system is displaying electrical cost analysis output over a twenty four month period for a specific customer’s building along with associated metrics. The system also may show a variety of other outputs including the main dashboard, suspicious activity report, overall building performance report, a carbon footprint, etc.
  • Figure 3B illustrates a data output (shown as a web page in this example) in which the system is displaying electrical usage analysis output over a twenty four month period for a specific customer’s building along with associated metrics.
  • Figure 4 is a flowchart illustrating more details of a method 100 for utility monitoring and analytics security management using, for example, the system in Figure 1 that incorporates the processes 72-76 described above with more details. The processes described below may be carried out by the system shown in Figure 1, using web pages, forms and the like.
  • the user provides account login details (102) in which the user, who wants to become a user/member of the utility monitoring and analytics security management system, provides/inputs basic profile information, including, for example, user details, property name, geographic location of property, industry, # employees, etc..
  • the user can login to the system (104) over a link using the computing device in which the computing device interacts with the web server of the unit.
  • the system may be known as Verdafero - Utility Monitoring & Analytics Platform, which is a trademark of the owner of this patent application.
  • the login may be done in a typical manner, securely, using appropriate SSL and/or other security standards.
  • the user may enter building profile information for the building for utility and security monitoring (104) and the utility data feed (106) for the utilities to be monitoring for the building.
  • the data may include building size, year built, construction type, use, utilities used and utility provider.
  • the user may also set up the utility data feed analysis criterion (108), examples of which may be, but not limited to, billing error analysis, utility usage change analysis, utility cost change analysis, trend analysis, building comparison analysis and then the process could proceed through processes 72-76 as shown.
  • the data input may also include quantative data capture that is described in more detail with reference to Figure 17.
  • the data from all of the data input processes above are stored in the system under the user profile.
  • Figure 6 is performed.
  • the system asks the user to enter the utility providers (waste, water, watts and others) into the system and then the process proceeds to the process shown in Figure 17 in which the system does quantitative data capture that includes energy data, water data, transportation data, fuel data and waste data as well as any influencing factors such as weather or occupancy data.
  • the qualitative data capture process 1700 shown in Figure 17 may be used by various processes as described below.
  • various pieces of data about each utility such as electric, gas, water, heating fuel, renewable energy and/or other utilities may be captured by the process.
  • Examples of the type of data captured for each utility may be, but not limited to, electrical current, voltage, power data, gas flow rate and volume data, water flow rate and volume data and biomass weight, volume, calorific data and trash volume, weight data etc.
  • the data input process shown in Figure 7 is performed.
  • the system asks which utility (which include the ones shown in Figure 7 such as waste, water, transportation, etc. that are referred to hereafter as the “utility areas”) the user would like to improve its performance and then suggests to carry out an audit on that utility to establish ways to improve performance.
  • these audits may include, but not limited to, electrical energy audits, gas audits, waste audits of differing levels providing differing levels of analysis and insight.
  • the data input process shown in Figure 8 is performed.
  • the system determines the type of report that the user wants, such as a carbon footprint report, comparison report or a different report, and generates the report output for the user.
  • the system goes to the quantitative data capture process shown in Figure 17.
  • the system may have a reporting algorithm to analyze the data and format that data such that an overview report can be displayed and printed.
  • Other Verdafero developed algorithms may be used to detect and report usage / cost change alerts over time or changes in the utility rate which can call out several problem factors for further attention.
  • the data input process shown in Figure 9 is performed. During the process, the system determines if there has been a billing error, or some other type of miscalculation within the billing data and generates the analysis output for the user. Once completed, the system goes to the quantitative data capture process shown in Figure 17. For example, as part of the billing error analysis the system can compare the usage and cost over the same periods this year and last year to determine if there is a dramatic increase in cost per unit of utility. If this change is outside a predetermined value it may indicate, amongst other things, a potential error or miscalculation in the utility bill.
  • the data input process shown in Figure 10 is performed.
  • the system runs unusual behavior analysis on the chosen utility which may include, for example, using our trending analysis algorithm to compare a user’s historically usage pattern against their current usage pattern to identify any abnormalities which could indicate potential security problems or unusual behavior and generates the alert output for the user.
  • the system goes to the quantitative data capture process shown in Figure 17.
  • the data input process shown in Figure 11 is performed.
  • the system runs the comparison analysis which may include, for example, using our energy usage analysis algorithm, including normalizing to any external influencing factors such as weather or occupancy etc, to calculate the energy use intensity of the user’s building to compare the particular building’s utility data with comparable buildings in Verdafero’s database or accessible to Verdafero through multiple sources and generates a comparison analysis report output for the user.
  • the comparison analysis may include, for example, using our energy usage analysis algorithm, including normalizing to any external influencing factors such as weather or occupancy etc, to calculate the energy use intensity of the user’s building to compare the particular building’s utility data with comparable buildings in Verdafero’s database or accessible to Verdafero through multiple sources and generates a comparison analysis report output for the user.
  • the data input process shown in Figure 12 is performed. During the process, the system inquires as to whether the user / property has existing security goals or a utility monitoring security plan. If the property does not have an existing security goals or a utility monitoring security plan, the system can guide the user through a process of questions designed to analyze their current situational utility monitoring security plan against predefined standards and guide them to select predefined comprehensive utility security goals and / or develop a comprehensive utility monitoring security plan specific to their individual needs. Once the data gathering about the certifications is completed, the system goes to the quantitative data capture process shown in Figure 17.
  • the data input process shown in Figure 13 is performed.
  • the system asks the user about what certification that would like to receive.
  • the certification standards could be from, but not limited to, a list of industry recognized security certifications or Verdafero defined security certifications depending on the user’s preference. Given these inputs and based on Verdafero’ s utility monitoring algorithm analysis of their utility data the system can produce the necessary reporting documentation required by the certifying body in several required output formats and, if desired, have it sent to the certifying body for review. Once the data gathering about the education is completed, the system goes to the quantitative data capture process shown in Figure 17.
  • the data input process shown in Figure 14 is performed.
  • the system asks the user about what insurance / financial institution they would like to report their building’s performance to or to what standards and analysis these institutions are specifically requiring.
  • Verdafero’ s utility monitoring algorithm analysis the system can produce the necessary documentation required by the institution in a desired output format and, if desired, have it sent to the institution for review.
  • the system goes to the quantitative data capture process shown in Figure 17.
  • the data input process shown in Figure 15 is performed.
  • the system asks the user about what local governmental building ordinance they would like to report their building’s performance to.
  • Verdafero s utility monitoring algorithm analysis and possible communications with other external software systems like the Environmental Protection Agency’s ENERGY STAR
  • the Verdafero system can produce the necessary documentation required by the ordinance body in a desired output format and, if desired, have it sent to the ordinance body for review or interface with the ordinance body’s system of choice and report the building’s performance.
  • the system goes to the quantitative data capture process shown in Figure 17.
  • the data input process shown in Figure 16 is performed.
  • the system asks the user which utility they would like to analyze for fraudulent / suspicious activity? Given this input the system can run analysis to identify subtle fluctuations within the data over time that may be indicative of fraudulent / suspicious activity and report the findings to the user.
  • the process continually monitors the utility usage over time, short or longer periods, and using the AI engine, and based on identified patterns extracted from Verdafero’s utility monitoring AI algorithm analysis, identifies potential fraudulent / suspicious activities that have not been seen in the past, such as usage spikes during unoccupied times of the day, higher load profiles at unexpected times, be it singular or regular occurrences. If these spikes / abnormalities identified as non-suspicious the AI engine can learn to incorporate these non- suspicious events as normal behavior for future events.
  • the system goes to the quantitative data capture process shown in Figure 17.
  • the system captures data about the one or more utility monitoring areas as shown and the quantitative data is stored in the system indexed against the user’s profile.
  • the data is automatically captured via computer scanning of paper or PDF utility bills via character recognition software, via direct connection to internet enabled smart utility meters, off the shelf internet enabled sub-meters or internet enabled IoT sensing device on individual pieces of equipment etc. Verdafero will read/write to each wed-enabled device through the devices specified API and store the information in our desired format on our servers in preparation for analysis in our machine learning / AI analysis algorithm.
  • the process moves onto the data analysis process 74 that is shown in more detail in Figure 18.
  • the system implements an analysis algorithm to take into account internal or external factors, that may influence utility usage to determine a list of utility security priorities for the particular user / business based on the input data.
  • the system can determine if one or more utility monitoring areas may be outside the scope of normal behavior, based on the historical Verdafero analysis algorithm and other Verdafero data analysis algorithms, may prioritize the alerts and recommendations, and/or provide links to products/services related to the recommendations/projects to investigate these abnormalities further.
  • the links to possible products / services related to the recommendations / projects may be based upon an AI decision engine that taking into account the building’s location, use and other relevant data and alerting factors, can present the user the most useful product / service solutions to their problem. Examples of this may be a catastrophic water leak detected on the top floor of the building requiring immediate attention from a qualified plumber. Following the system detection of this leak it would immediately identify an appropriate plumber, from a user predefined list or public database, and present the user with necessary details.
  • the system can make security recommendations in one, a few, many or all of the one or more utility monitoring areas. For each utility monitoring area, the system may provide a project list of one or more projects in that utility monitoring area to investigate as the cause of the alert and/or a list of service providers to help with investigating the cause of the alert.
  • the system may permit the projects to be sorted by: profile such as the type of building (such as industry vertical or similar); ownership status of facilities, 3rd party hosting, etc.; security projects & security certifications already completed; security goals for organization, such as alert if electricity changes by x% and/or if water changes by x%; and/or other utility analysis abnormality.
  • profile such as the type of building (such as industry vertical or similar); ownership status of facilities, 3rd party hosting, etc.
  • security projects & security certifications already completed security goals for organization, such as alert if electricity changes by x% and/or if water changes by x%; and/or other utility analysis abnormality.
  • the process moves onto the data output process 76.
  • the system allows the particular user to select the one or more desired outputs and the reports output A/R.
  • the user may be presented with views (dashboard) and / or print, .pdf, etc. of: * Utility Monitoring Report; Security performance details (metrics); Overall Security Health Report; and/or Status details A/R.
  • a report (as shown in Figure 19) that may include: a utility monitoring report (the details of which process to generate the report are shown in Figure 20); a utility analysis report (the details of which process to generate the report are shown in Figure 21); an abnormalities / potential security problems report (the details of which process to generate the report are shown in Figure 22); a property utility comparison report (the details of which process to generate the report are shown in Figure 23); a utility security monitoring certificate report (the details of which process to generate the report are shown in Figure 24); a property performance for insurance assessment report (the details of which process to generate the report are shown in Figure 25); a local governmental building ordinance report (the details of which process to generate the report are shown in Figure 26); a machine learning / AI detected fraudulent / suspicious activity report (the details of which process to generate the report are shown in Figure 27); and other reports that the system can generate or that can be created by the user.
  • a utility monitoring report the details of which process to generate the report are shown in Figure 20
  • a utility analysis report the details of which
  • the system determines if the user wants a utility security summary and can provide that to the user (an example of which is contained in Appendix A which is incorporated herein by reference) or an in-depth report related to the one or more utility monitoring areas and can then provide those reports.
  • the system determines if the user wants a utility analysis report summary and can provide that to the user or an in-depth report related to the one or more utility monitoring areas and can then provide those reports.
  • the system determines if the user wants a abnormalities / potential security problems report summary and can provide that to the user or an in-depth report related to the one or more utility monitoring areas and can then provide those reports.
  • the system determines if the user wants a property utility comparison report summary and can provide that to the user or an in-depth report related to the one or more utility monitoring areas and can then provide those reports.
  • the system determines if the user wants a utility security monitoring certificate report summary and can provide that to the user or an in-depth report related to the one or more utility monitoring areas and can then provide those reports.
  • the system determines if the user wants a property performance for insurance report summary and can provide that to the user or an in-depth report related to the one or more utility monitoring areas and can then provide those reports.
  • the system determines if the user wants a local governmental building ordinance report summary and can provide that to the user or an in-depth report related to the one or more utility monitoring areas and can then provide those reports.
  • the system determines if the user wants a machine learning / AI detected fraudulent / suspicious activity report summary and can provide that to the user or an in-depth report related to the one or more utility monitoring areas and can then provide those reports.
  • the machine learning / AI detected fraudulent / suspicious activity report summary consists of a high-level overview through graphical interfaces and associated descriptive detail of if your property portfolio or individual facility may have been subject to fraud / suspicious behavior within its utility use.
  • the machine learning / AI detected fraudulent / suspicious activity report detailed report consists of an in-depth view through graphical interfaces and associated descriptive detail if your property portfolio, individual facility has been subject to fraud / suspicious behavior within its utility use down to the , meters or sensors level so you can pin point the affected party.
  • Figures 28A-28B illustrate an example of a company main utility monitoring dashboard user interface of the utility monitoring and analytics security management system.
  • the user interface may include a summary portion 100 (that also allows the user to select a category to navigate to quickly), a utility monitoring summary portion 102 that has the key statistics for each utility monitoring category, a reports and certification portion 104 that displays the reports and certifications for the particular business whose user is viewing the user interface and a projects and planning portion 106 that displays the projects for the business.
  • the company main utility monitoring dashboard user interface thus permits the user who is viewing the user interface to get a good overview of the utility monitoring progress of the business.
  • the system includes a multi-level UI approach with varying levels of interactivity between the user and the system.
  • the user will interact with the system to visualize the portfolio level analysis.
  • the user can then go to the next level of analysis and interact with the data analysis for a facility or group of facilities.
  • the user can then go to the next level of analysis and interact with the data analysis for an individual utility meters within a facility.
  • the user can then go to the next level of analysis and interact with the data analysis for an individual utility sub-meters under a meter within the facility.
  • the user can then go to the next level of analysis and interact with the individual utility sensors under a sub-meter under a meter within a facility.
  • the user can set appropriate alert thresholds or run rate, trending, deeper data normalization analysis if necessary.
  • sample performance dashboard shows average estimated monthly utility usage and cost that is calculated based on: Industry and type of space, Square footage, Number of employees and Location.
  • the user is then asked questions to assess the amount their business has done to secure their utilities including actions taken to actively monitor their utilities, reduce utility usage. For each question, the user provides qualitative assessment of how much they have done (nothing, a little, some actions, a lot). The user is also asked questions about their existing physical infrastructure security systems, if any. Based on answers to questions about actions they’ve taken, user is presented with sample utility monitoring planning dashboard that has a set of projects in areas of electricity, water, waste, natural gas and transport are recommended based on: answers to qualitative assessment of actions already taken, industry and type of space.
  • the user is also shown a complete dashboard with information about average company of their size, industry, space type with utility monitoring indicators they should be tracking, certifications and reports they could produce, security projects and planning they could undertake to improve utility security and specific next steps they should take based on their security goals including: reporting to stakeholders, reducing security risks / environmental impact and making a utility security monitoring plan.
  • the system shown in Figure 1 may be used for managing a variety business processes and the energy consumption of the elements of the business process as described above.
  • the system may be used to monitor and control a product line process (shown in Figure 29) or the cups of coffee sold by a store as described below in more detail. It should be understood that the system may be used to monitor and manage energy consumption for any business process in which it is desirable to be able to monitor and control that business process.
  • Figure 29 illustrates an example of a manufacturing line 2900 (an example of a business process) that may be managed by the system 58.
  • the manufacturing line may have an input 2902, at least two motors 2904, 2906 and a belt so that input materials at the input are turned into an output.
  • the manufacturing line may have a plurality of Internet or Things (IoT) sensors 2908 at various points along the manufacturing line.
  • IoT sensors 2908 may be at the input, adjacent each motor at predetermined intervals along the production line and at the output.
  • Each IoT sensor 2908 measures some characteristic of the point in the manufacturing line and communicates that data to the system 58 over a communication path that may be wired or wireless.
  • the input and output IoT sensor 2908 may measure the amount of input material or output, respectively while each motor IoT sensor 2908 may capture data about the energy usage of that motor.
  • the system can be operated with fewer or more IoT sensors 2908 than those shown in Figure 29.
  • the various data captured by the IoT sensors 2908 along the manufacturing line may be collectively known as production line data that is input into the system 58.
  • the system 58 can effectively track and monitor a production line process such as paper production.
  • the system can determine correlation functions between the amount of paper produced, over a set time, and the energy consumed by the motors / drives. Having developed this correlation function, the system 58 is able to carry out several important analytical functions on this data to help the user in several ways.
  • the system may perform predictive analytics using the production line data and the correlation.
  • the system 58 can be used for predictive analytics to help the user better predict their production capabilities and energy production costs associated with any change in production output, ie: predict expected energy use per unit of increase or decrease in production output.
  • the system may also perform downtime analysis since, given the real time IoT monitoring nature of the system 58 on a production line 2900, the user can be alerted to any unexpected downtime failures through the drop in either output or energy consumption by the motor, for example.
  • the system may detect production problems since the system 58 can alert the user immediately when/if there is a production problem when either the production output changes dramatically or when the energy consumption associated without production changes dramatically and does not follow the correlated energy / production function.
  • the system 58, for the production system data may determine a total cost of ownership for the equipment.
  • Total cost of ownership is vital for both user and equipment vendors / installers in order to effectively verify the efficacy of newly installed equipment as part of any upgrade or new installation.
  • End users are increasingly requesting, as part of any agreements, that installers give energy efficiency and cost reduction guarantees as part of the TCO for equipment upgrades or installations.
  • the ability to track and verify energy efficiency and cost reductions over agreed time periods are vitally important to demonstrate the effectiveness of the new equipment upgrades. This enables the end user to understand their true costs and also enables the vendor to verify their energy savings and calculate the real TCO.
  • the system 58 using the correlation, can present the user with better analysis on energy used per unit of production. Given that there is interest by some end users to better understand the real total cost of ownership of any energy efficient equipment installed, such as new motors or drives, the system 58 can calculate the energy per unit of production which can then be accurately compared to the energy per unit of production for the old motors and drives. Rather than just looking at the overall energy bill over the course of a week, month or year on the production line and comparing it to the prior week, month or year when the older equipment was installed, the system 58 can accurately calculate the total cost of ownership for the production line with the new power equipment installed.
  • the system 58 can effectively track and monitor a business process such as cups of drip coffee sold in a coffee shop.
  • a business process such as cups of drip coffee sold in a coffee shop.
  • IoT sensors connected to production equipment in the coffee shop to monitor the volume of drip coffee produced as well as the energy consumed by the coffee production equipment (grinders, hot water boilers etc)
  • the system 58 can develop a correlation function to understand the direct relationship between volume of drip coffee produced versus amount of water used or energy consumed to produce the coffee. There may even be the opportunity to differentiate between types of coffee produced. Having developed this correlation function, the system 58 will be able to carry out several important analytical functions on this data to help the user in several ways.
  • the system may perform predictive analysis for the coffee shop and the system 58 can be used to help the user better understand their drip coffee production capabilities and energy production costs associated with any change in drip coffee production output, i.e. : predict expected energy use per unit of increased or decreased in drip coffee production output.
  • the system may also determine downtime and given the real time IoT monitoring nature of the system 58 on a drip coffee production line, the user could be alerted to any unexpected downtime through the drop in either output or energy consumption from the coffee production equipment.
  • the system 58 may also determine production problems and alert the user immediately if there is a production problem when either the production output changes dramatically or when the energy consumption associated without production changes dramatically and does not follow the correlated energy / production function.
  • the system 58 may also determine a total cost of ownership (TCO) for the equipment which is vital for both user and equipment vendors / installers in order to effectively verify the efficacy of newly installed equipment as part of any upgrade or new installation.
  • TCO total cost of ownership
  • End users are increasingly requesting, as part of any agreements, that installers give energy efficiency and cost reduction guarantees as part of the TCO for equipment upgrades or installations.
  • the ability to track and verify energy efficiency and cost reductions over agreed time periods are vitally important to demonstrate the effectiveness of the new equipment upgrades. This enables the end user to understand their true costs and also enables the vendor to verify their energy savings and calculate the real TCO.
  • the system for a coffee shop using the correlation function, can present the user with better analysis on energy used per unit volume of drip coffee produced. Given that there is interest by some end users to better understand the real total cost of ownership of any energy efficient equipment installed, such as new coffee machine or new production process, the system 58 can calculate the energy per unit of coffee production which can then be accurately compared to the energy per unit of coffee production for the old equipment. Rather than just looking at the overall energy bill over the course of a week, month or year on the coffee production shop and comparing it to the prior week, month or year when the older equipment was installed the system 58 can accurately calculate the total cost of ownership for the coffee production line with the new equipment installed.
  • system and method disclosed herein may be implemented via one or more components, systems, servers, appliances, other subcomponents, or distributed between such elements.
  • systems may include an/or involve, inter alia, components such as software modules, general-purpose CPU, RAM, etc. found in general- purpose computers.
  • components such as software modules, general-purpose CPU, RAM, etc. found in general- purpose computers.
  • a server may include or involve components such as CPU, RAM, etc., such as those found in general-purpose computers.
  • system and method herein may be achieved via implementations with disparate or entirely different software, hardware and/or firmware components, beyond that set forth above.
  • components e.g., software, processing components, etc.
  • computer-readable media associated with or embodying the present inventions
  • aspects of the innovations herein may be implemented consistent with numerous general purpose or special purpose computing systems or configurations.
  • exemplary computing systems, environments, and/or configurations may include, but are not limited to: software or other components within or embodied on personal computers, servers or server computing devices such as routing/connectivity components, hand-held or laptop devices, multiprocessor systems, microprocessor-based systems, set top boxes, consumer electronic devices, network PCs, other existing computer platforms, distributed computing environments that include one or more of the above systems or devices, etc.
  • aspects of the system and method may be achieved via or performed by logic and/or logic instructions including program modules, executed in association with such components or circuitry, for example.
  • program modules may include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular instructions herein.
  • the inventions may also be practiced in the context of distributed software, computer, or circuit settings where circuitry is connected via communication buses, circuitry or links. In distributed settings, control/instructions may occur from both local and remote computer storage media including memory storage devices.
  • Computer readable media can be any available media that is resident on, associable with, or can be accessed by such circuits and/or computing components.
  • Computer readable media may comprise computer storage media and communication media.
  • Computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data.
  • Computer storage media includes, but is not limited to,
  • Communication media may comprise computer readable instructions, data structures, program modules and/or other components. Further, communication media may include wired media such as a wired network or direct-wired connection, however no media of any such type herein includes transitory media. Combinations of the any of the above are also included within the scope of computer readable media.
  • the terms component, module, device, etc. may refer to any type of logical or functional software elements, circuits, blocks and/or processes that may be implemented in a variety of ways.
  • the functions of various circuits and/or blocks can be combined with one another into any other number of modules.
  • Each module may even be implemented as a software program stored on a tangible memory (e.g., random access memory, read only memory, CD-ROM memory, hard disk drive, etc.) to be read by a central processing unit to implement the functions of the innovations herein.
  • the modules can comprise programming instructions transmitted to a general purpose computer or to processing/graphics hardware via a transmission carrier wave.
  • the modules can be implemented as hardware logic circuitry implementing the functions encompassed by the innovations herein.
  • the modules can be implemented using special purpose instructions (SIMD instructions), field programmable logic arrays or any mix thereof which provides the desired level performance and cost.
  • SIMD instructions special purpose instructions
  • features consistent with the disclosure may be implemented via computer-hardware, software and/or firmware.
  • the systems and methods disclosed herein may be embodied in various forms including, for example, a data processor, such as a computer that also includes a database, digital electronic circuitry, firmware, software, or in combinations of them.
  • a data processor such as a computer that also includes a database
  • digital electronic circuitry such as a computer
  • firmware such as a firmware
  • software such as a computer
  • the systems and methods disclosed herein may be implemented with any combination of hardware, software and/or firmware.
  • the above-noted features and other aspects and principles of the innovations herein may be implemented in various environments.
  • Such environments and related applications may be specially constructed for performing the various routines, processes and/or operations according to the invention or they may include a general-purpose computer or computing platform selectively activated or reconfigured by code to provide the necessary functionality.
  • the processes disclosed herein are not inherently related to any particular computer, network, architecture, environment, or other apparatus, and may be implemented by a suitable combination of hardware, software, and/or firmware.
  • various general-purpose machines may be used with programs written in accordance with teachings of the invention, or it may be more convenient to construct a specialized apparatus or system to perform the required methods and techniques.
  • aspects of the method and system described herein, such as the logic may also be implemented as functionality programmed into any of a variety of circuitry, including programmable logic devices (“PLDs”), such as field programmable gate arrays (“FPGAs”), programmable array logic (“PAL”) devices, electrically programmable logic and memory devices and standard cell-based devices, as well as application specific integrated circuits.
  • PLDs programmable logic devices
  • FPGAs field programmable gate arrays
  • PAL programmable array logic
  • electrically programmable logic and memory devices and standard cell-based devices as well as application specific integrated circuits.
  • Some other possibilities for implementing aspects include: memory devices, microcontrollers with memory (such as EEPROM), embedded microprocessors, firmware, software, etc.
  • aspects may be embodied in microprocessors having software-based circuit emulation, discrete logic (sequential and combinatorial), custom devices, fuzzy (neural) logic, quantum devices, and hybrids of any of the above device types.
  • the underlying device technologies may be provided in a variety of component types, e.g., metal-oxide semiconductor field-effect transistor (“MOSFET”) technologies like complementary metal- oxide semiconductor (“CMOS”), bipolar technologies like emitter-coupled logic (“ECL”), polymer technologies (e.g., silicon-conjugated polymer and metal-conjugated polymer-metal structures), mixed analog and digital, and so on.
  • MOSFET metal-oxide semiconductor field-effect transistor
  • CMOS complementary metal- oxide semiconductor
  • ECL emitter-coupled logic
  • polymer technologies e.g., silicon-conjugated polymer and metal-conjugated polymer-metal structures
  • mixed analog and digital and so on.

Landscapes

  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Engineering & Computer Science (AREA)
  • Strategic Management (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Economics (AREA)
  • Educational Administration (AREA)
  • Game Theory and Decision Science (AREA)
  • Development Economics (AREA)
  • Marketing (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Alarm Systems (AREA)

Abstract

A utility monitoring and analytics security management system and method and business process monitoring and analysis for businesses provides these businesses with a comprehensive understanding of their utility security strategy goals, utility security projects, security metrics including the environmental and societal impacts of their business and business process analytics. The system provides an ability to manage and report on these parameters in a way that makes sense for the security of their business or the monitoring of the business process.

Description

UTILITY MONITORING. ANALYTICS SECURITY MANAGEMENT AND BUSINESS PROCESS MANAGEMENT SYSTEM AND METHOD
RELATED APPLICATIONS
[0001] This PCT application is a continuation in part and claims priority to U.S. Application No. 16/671,114 entitled: "UTILITY MONITORING AND ANALYTICS SECURITY MANAGEMENT SYSTEM AND METHOD", fded October 31 , 2020 that in turn in a continuation in part and claims priority under 35 USC 120 to U.S. Application No. 13/548,089, filed July 12, 2012 which in turn claims the benefit under 35 USC 119(e) to U.S. Provisional Patent Application Serial No. 61/507,569, filed on July 13, 2011 and entitled “Utility Monitoring and Analytics Security Management System and Method”, the entirety of both of which are incorporated herein by reference.
FIELD
[0002] The disclosure relates generally to a system and method for monitoring and analyzing a building’s utilities or business processes and in particular to a system and method for providing analytical insight into the utility data as part of a business’ security strategy or management of business processes.
BACKGROUND
[0003] It is desirable to be able to monitor all utility usage and cost of a business to detect any undesired usage or cost variations. Today, the most prevalent system is the widespread attempted use of an individual person tracking their utility costs and usage in spreadsheets and email, presentations and documents to display and report their usage and costs findings to identify security factors or variations that may need further investigation. This technique is prone to errors and misunderstanding and can quickly become complicated and unmanageable.
[0004] Furthermore, it is desirable to be able to monitor a business process and generate analytics about the business process and individual elements of the business proceed including total cost of ownership. Currently, system may be able to provide overall cost of the system operation, but unable to provide the total cost of ownership of a particular element of the business process.
[0005] Thus, it is desirable to provide a utility monitoring and analytics security and business process management system and method that overcomes the limitations of current methods above, and it is to this end that the disclosure is directed.
BRIEF DESCRIPTION OF THE DRAWINGS
[0006] Figure l is a block diagram of an implementation of the utility monitoring and analytics security management system;
[0007] Figure 2 is a flowchart of a method for utility monitoring and analytics security management using, for example, the system in Figure 1;
[0008] Figures 3 A and 3B illustrate examples of the output data of the utility monitoring and analytics security management system;
[0009] Figure 4 is a flowchart illustrating more details of a method for utility monitoring and analytics security management using, for example, the system in Figure 1;
[0010] Figure 5 is a flowchart illustrating the potential options available for a method for utility monitoring and analytics security management using, for example, the system in Figure 1;
[0011] Figure 6 is a flowchart asking the user for input on what utilities they would like to monitor;
[0012] Figure 7 illustrates an example of an improving the performance of your building utility security analysis summary user interface of the utility monitoring and analytics security management system;
[0013] Figure 8 illustrates an example of a system to provide a utility overview report from an analysis with the utility monitoring and analytics security management system;
[0014] Figure 9 illustrates an example of a system to check your utility bills for errors using the utility monitoring and analytics security management system; [0015] Figure 10 illustrates an example of a system to detect unusual behavior of your building utility security usage and costs using the utility monitoring and analytics security management system;
[0016] Figure 11 illustrates an example of comparing your property against others / your own utility usage user interfaces of the utility monitoring and analytics security management system;
[0017] Figure 12 illustrates an example of setting utility security goals / develop utility monitoring security plan user interfaces of the utility monitoring and analytics security management system;
[0018] Figure 13 illustrates an example of a utility security monitoring certification checklist summary user interface of the utility monitoring and analytics security management system;
[0019] Figure 14 illustrates an example of a building performance for insurance / financial assessment report user interface of the utility monitoring and analytics security management system;
[0020] Figure 15 illustrates an example of a local governmental building ordinances report user interface of the utility monitoring and analytics security management system;
[0021] Figure 16 illustrates an example of identifying fraudulent / suspicious activity using machine learning / AI user interface of the utility monitoring and analytics security management system;
[0022] Figure 17 illustrates an example of quantative data capture of the utility monitoring and analytics security management system;
[0023] Figure 18 illustrates an example of data analysis process of the utility monitoring and analytics security management system;
[0024] Figure 19 illustrates an example of data output process of the utility monitoring and analytics security management system;
[0025] Figure 20 illustrates an example of the utility monitoring report process of the utility monitoring and analytics security management system; [0026] Figure 21 illustrates an example of the utility analysis report process of the utility monitoring and analytics security management system;
[0027] Figure 22 illustrates an example of the abnormalities / potential security problems report process of the utility monitoring and analytics security management system;
[0028] Figure 23 illustrates an example of the property utility comparison report process of the utility monitoring and analytics security management system;
[0029] Figure 24 illustrates an example of the utility security monitoring certification report process of the utility monitoring and analytics security management system;
[0030] Figure 25 illustrates an example of the property performance for insurance report process of the utility monitoring and analytics security management system;
[0031] Figure 26 illustrates an example of the local governmental building ordinance reporting process of the utility monitoring and analytics security management system;
[0032] Figure 27 illustrates an example of the machine learning / AI detected fraudulent / suspicious activity report process of the utility monitoring and analytics security management system;
[0033] Figures 28A-28B illustrate an example of a company main utility monitoring dashboard user interface of the utility monitoring and analytics security management system; and
[0034] Figure 29 illustrates an example of a manufacturing line (an example of a business process) that may be managed by the system.
DETAILED DESCRIPTION OF ONE OR MORE EMBODIMENTS
[0035] The disclosure is particularly applicable to a web-based system that implements the Utility Monitoring and Analytics Security and Business Process Management System and Method, and it is in this context that the disclosure will be described. It will be appreciated, however, that the system and method has greater utility since it can be implemented in other manners/using different architectures, and may be used for other purposes that those specifically described below for the specific implementation. Furthermore, the system may be used to monitor and provide analytics for any business process in which it is desirable to provide the predictive analytics, the production performance, the cost of ownership etc. for the business process and the individual elements of the business process.
[0036] A Utility Monitoring and Analytics Security Management System and Method is provided for parties, such as channel partners and/or property owners/operators, and provides these parties with a comprehensive monitoring (real-time or historical), analysis and reporting system to help them gain an improved realization of their utility usage, costs, and metrics including the security monitoring of their utility resources, billing errors, operational or equipment problems as well as environmental and societal impacts of their building’s activities with the ability to manage and report on these parameters in a way that can alert the user to fraudulent activity or misuse of a building’s utilities. The system may include automated data entry from related utility service providers such as energy, water, waste, etc., other data sources such as weather data, applicable property data sources such as occupancy etc, powerful utility analytic metrics and analysis processes, TCP/IP communications capabilities or communication capabilities over cellular networks, a World Wide Web (WWW)-based interface with a Software-as-a-Service (SaaS) architecture, and an Application Programming Interface (API) to communications with other external communication devices and individual Intemet-of-Thing (IoT) sensors and systems and other value added services. The system also includes a real-time data retrieval and dissemination process and system which permits real-time utility data and analysis to be communicated immediately within the system. The utility monitoring and analytics security management system has an artificial intelligence (AI) decision engine that has a comparison mechanism and action planner to give the user real-world next step actions and alerts to pre-defmed trigger points and recommendations for the optimum security analysis output.
[0037] The system and method may also be used for any business process in which sensors, such as IoT sensors, measure characteristics of a portion of the business process (an amount of energy consumed by a motor), a throughput of input materials into the process and/or the output of the business process and the system determines a correlation between the business process output and the characteristics of the business process. The system may generate predictive analysis of production capabilities and energy production costs of the process based on the data from the sensors. The system also may determine a downtime of the process based on the data from the sensors and may determine production problems for the process based on the data from the sensors. The system also may determine a total cost of ownership of an element of the process based on the data from the sensors.
[0038] Figure l is a block diagram of an implementation of the utility monitoring and analytics security management system 50. The system 50 may have one or more computing devices 52, such as computing devices 52a, 52b, ...52n as shown in Figure 1) that establish contact with, communicate with and exchange data with a utility monitoring and analytics security management unit 58 over a link 56. Each computing device 52 may be a device with one or more processing unit(s), memory, storage, wireless or wired connectivity capabilities and a display sufficient to permit the computing device 52 to interact with the utility monitoring and analytics security management unit 58 as described below. For example, each computing device 52 may be a desktop computer, a laptop computer, a tablet computer, a smartphone (Apple iPhone, RIM Blackberry, phones that run the Android operating system), a terminal and the like since the implementation of the system is not limited to any particular computing device. In one implementation, each computing device 52 may have a browser 54 that allows the user of the computing device to interact with the utility monitoring and analytics security management unit 58 as described below. In other implementations, the processing unit on each computing device 52 may execute a web browser application or a small downloadable application that can be stored on the computing device and then executed by the processing unit. The link 56 may be a digital data link, that may be wired or wireless, and may be digital cellular network or a computer network since the implementation of the system is not limited to any particular link.
[0039] The utility monitoring and analytics security management unit 58 may be, in one embodiment, one or more server computers that execute a plurality of line of computer code to implement the functions and operations of the utility monitoring and analytics security management unit 58 as described below. The utility monitoring and analytics security management unit 58 may also be implemented in hardware or a combination of hardware and software. In one implementation, the utility monitoring and analytics security management unit 58 may utilize, for example, a LAMP stack software bundle or other implementation that allows multiple computing devices in the client environment to be connected to a PHP/MySQL managed database and website user interface (commonly referred to as a Software as a Service, or SaaS). The utility monitoring and analytics security management unit 58 also may be implemented in a standalone computer system architecture, a mainframe type architecture, a downloadable application architecture and the like since the system is not limited to any particular architecture implementation.
[0040] In the implementation shown in Figure 1, the utility monitoring and analytics security management unit 58 may further comprise a web server 60 (that may be software or hardware) that coordinates interactions with the computing devices, receives data from the computing devices and generates outputs, such as web pages, that are delivered to each computing device as needed, a management unit 64 that manages the overall operation of the utility monitoring and analytics security management unit 58, controls the web server 60, manages the user data and manages a security monitoring business development analysis unit 66. The utility monitoring and analytics security management unit 58 may be coupled to a store 68, such as one or more databases for example, that stores the user data of the system, stored security upgrade projects, the analyzed data and the like. The units 60-66 and store 68 may be implemented in hardware or software.
[0041] Figure 2 is a flowchart of a method 70 for utility monitoring and analytics security management using, for example, the system in Figure 1 for each user of the system when the user wants to receive an output from the system. In general, the system captures user profile data about their property data (including, but not limited to business property size and use, strategic security goals, utility consumption data, etc) and implements a computational process to analyze their historical utility data to current data via internet enabled energy, water or other utility type meters / IoT sensors to alert the user of any potential abnormal or security related activities associated with the building’s utilities.
[0042] In the method, a user enters property details into the system (72). During the data input process 72, the system may query a user about the one or more desired outputs of the system (such as a particular chart to show a particular security aspect such as energy usage) and the system may then request data from the user about the desired outputs wherein the requested data may include qualitative data and quantitative data. In addition to the user physically entering data into the system, the system also is capable of other input methods including file imports, an API to receive data from other systems, sub-meters, IoT sensors, billing systems and the like. The meters used will primarily be ‘off the shelf internet enabled energy, water or other utility type meters that have a user configurable API that the utility monitoring and analytics security management system will use to make a connection with and poll via an internet request at varying increments of time to write / read data to / from the meter as necessary to get the quantity and quality of data we need to produce effective analysis and alerts on usage and cost security issues. These meters could be single ‘whole building’ utility meters, individual utility meters serving specific areas of a location or user installed ‘sub-meters’ on an individual circuit or a combination there of. To retrieve more granular data, the utility monitoring and analytics security management system can use IoT sensors on individual pieces of equipment that uses a utility stream for operation. This might include, pumps, motors, lighting, how water boilers, HVAC systems, plumbing systems etc. The sensors would be internet enabled ‘off the shelf type sensors with an API that that we will use to make a connection with and poll via an internet request at varying increments of time to write / read data to / from the sensor as necessary to get the quantity and quality of data we need to produce effective analysis and alerts on usage and cost security issues.
[0043] Once the data has been input, the system may perform data analysis (74). During the data analysis, the system may, for example, serve insights into their utility data, such as alerts or data trends, to the user via his/her computing device and also provide potential causes of the insights. The system may also perform a data output process (76) in which the system generates the desired outputs for the particular user. The data output may include system reports on the appropriate metrics (based on the user’s desired outputs). The system may have an API that allows the system (and the data outputs of the system) to be broadly adopted/used by other systems that can interface with the utility monitoring and analytics security management system 50.
[0044] Figure 3 A-B illustrate examples of the output data of the utility monitoring and analytics security management system. Figure 3 A illustrates a data output (shown as a web page in this example) in which the system is displaying electrical cost analysis output over a twenty four month period for a specific customer’s building along with associated metrics. The system also may show a variety of other outputs including the main dashboard, suspicious activity report, overall building performance report, a carbon footprint, etc. Figure 3B illustrates a data output (shown as a web page in this example) in which the system is displaying electrical usage analysis output over a twenty four month period for a specific customer’s building along with associated metrics. The system also may display waste, water, etc as well as some qualitative input (e.g., type of business, goal, etc.). Figure 4 is a flowchart illustrating more details of a method 100 for utility monitoring and analytics security management using, for example, the system in Figure 1 that incorporates the processes 72-76 described above with more details. The processes described below may be carried out by the system shown in Figure 1, using web pages, forms and the like. The user provides account login details (102) in which the user, who wants to become a user/member of the utility monitoring and analytics security management system, provides/inputs basic profile information, including, for example, user details, property name, geographic location of property, industry, # employees, etc.. Once the user has provided the basic profile information, the user can login to the system (104) over a link using the computing device in which the computing device interacts with the web server of the unit. In an example implementation of the system, the system may be known as Verdafero - Utility Monitoring & Analytics Platform, which is a trademark of the owner of this patent application. The login may be done in a typical manner, securely, using appropriate SSL and/or other security standards.
[0045] As part of the process 100, the user may enter building profile information for the building for utility and security monitoring (104) and the utility data feed (106) for the utilities to be monitoring for the building. The data may include building size, year built, construction type, use, utilities used and utility provider. The user may also set up the utility data feed analysis criterion (108), examples of which may be, but not limited to, billing error analysis, utility usage change analysis, utility cost change analysis, trend analysis, building comparison analysis and then the process could proceed through processes 72-76 as shown.
[0046] Once the user in logged into the system, the user is asked to respond to a question (which is part of the data input process) and that process is shown in more detail in Figure 5. As shown in Figure 5, the user is asked “What would you like to do?” by the system. In one implementation, the user has the options to: 1) monitor building utility usage / costs (the details of the data input for this item as shown in Figure 6);
2) improve building utility performance (the details of the data input for this item as shown in Figure 7);
3) produce a utility overview report (the details of the data input for this item as shown in Figure 8);
4) check your utility bill for errors (the details of the data input for this item as shown in Figure 9);
5) detect unusual behavior within your utility usage (the details of the data input for this item as shown in Figure 10);
6) compare your building’s performance against others (the details of the data input for this item as shown in Figure 11);
7) set utility security goals / develop a utility security plan (the details of the data input for this item as shown in Figure 12);
8) get utility security monitoring certified (the details of the data input for this item as shown in Figure 13);
9) report building performance for insurance / financial assessment (the details of the data input for this item as shown in Figure 14);
10) adhere to local governmental building ordinances (the details of the data input for this item as shown in Figure 15);
1 l)use machine learning / AI to identify subtle fluctuations within the data over time that may be indicative of fraudulent / suspicious activity (the details of the data input for this item as shown in Figure 16);
12) The data input may also include quantative data capture that is described in more detail with reference to Figure 17. The data from all of the data input processes above are stored in the system under the user profile.
[0047] If the user selects to monitor their utility usage, the data input process shown in
Figure 6 is performed. To monitor the utility usage, the system asks the user to enter the utility providers (waste, water, watts and others) into the system and then the process proceeds to the process shown in Figure 17 in which the system does quantitative data capture that includes energy data, water data, transportation data, fuel data and waste data as well as any influencing factors such as weather or occupancy data.
[0048] The qualitative data capture process 1700 shown in Figure 17 may be used by various processes as described below. In the data capture process 1700 various pieces of data about each utility, such as electric, gas, water, heating fuel, renewable energy and/or other utilities may be captured by the process. Examples of the type of data captured for each utility may be, but not limited to, electrical current, voltage, power data, gas flow rate and volume data, water flow rate and volume data and biomass weight, volume, calorific data and trash volume, weight data etc.
[0049] If the user wants to improve building utility performance, the data input process shown in Figure 7 is performed. The system, as shown in Figure 7, asks which utility (which include the ones shown in Figure 7 such as waste, water, transportation, etc. that are referred to hereafter as the “utility areas”) the user would like to improve its performance and then suggests to carry out an audit on that utility to establish ways to improve performance. Examples of these audits may include, but not limited to, electrical energy audits, gas audits, waste audits of differing levels providing differing levels of analysis and insight. Once completed, the system goes to the quantitative data capture process shown in Figure 17.
[0050] If the user wants to report their findings in the form of a utility overview report, the data input process shown in Figure 8 is performed. During the process, the system determines the type of report that the user wants, such as a carbon footprint report, comparison report or a different report, and generates the report output for the user. Once completed, the system goes to the quantitative data capture process shown in Figure 17. Depending on the user selected report, the system may have a reporting algorithm to analyze the data and format that data such that an overview report can be displayed and printed. Other Verdafero developed algorithms may be used to detect and report usage / cost change alerts over time or changes in the utility rate which can call out several problem factors for further attention.
[0051] If the user wants to check the utility bills for errors, the data input process shown in Figure 9 is performed. During the process, the system determines if there has been a billing error, or some other type of miscalculation within the billing data and generates the analysis output for the user. Once completed, the system goes to the quantitative data capture process shown in Figure 17. For example, as part of the billing error analysis the system can compare the usage and cost over the same periods this year and last year to determine if there is a dramatic increase in cost per unit of utility. If this change is outside a predetermined value it may indicate, amongst other things, a potential error or miscalculation in the utility bill.
[0052] If the user wants to be alerted to abnormalities / potential security problems / unusual behavior within your utility usage the analysis of their utility usage, the data input process shown in Figure 10 is performed. During the process, the system runs unusual behavior analysis on the chosen utility which may include, for example, using our trending analysis algorithm to compare a user’s historically usage pattern against their current usage pattern to identify any abnormalities which could indicate potential security problems or unusual behavior and generates the alert output for the user. Once completed, the system goes to the quantitative data capture process shown in Figure 17.
[0053] If the user wants to compare your building’s performance against others, the data input process shown in Figure 11 is performed. During the process, the system runs the comparison analysis which may include, for example, using our energy usage analysis algorithm, including normalizing to any external influencing factors such as weather or occupancy etc, to calculate the energy use intensity of the user’s building to compare the particular building’s utility data with comparable buildings in Verdafero’s database or accessible to Verdafero through multiple sources and generates a comparison analysis report output for the user. Once the data gathering about the certifications is completed, the system goes to the quantitative data capture process shown in Figure 17.
[0054] If the user wants to set utility security goals / develop utility monitoring security plan, the data input process shown in Figure 12 is performed. During the process, the system inquires as to whether the user / property has existing security goals or a utility monitoring security plan. If the property does not have an existing security goals or a utility monitoring security plan, the system can guide the user through a process of questions designed to analyze their current situational utility monitoring security plan against predefined standards and guide them to select predefined comprehensive utility security goals and / or develop a comprehensive utility monitoring security plan specific to their individual needs. Once the data gathering about the certifications is completed, the system goes to the quantitative data capture process shown in Figure 17.
[0055] If the user wants to get utility security monitoring certified, the data input process shown in Figure 13 is performed. During the process, the system asks the user about what certification that would like to receive. The certification standards could be from, but not limited to, a list of industry recognized security certifications or Verdafero defined security certifications depending on the user’s preference. Given these inputs and based on Verdafero’ s utility monitoring algorithm analysis of their utility data the system can produce the necessary reporting documentation required by the certifying body in several required output formats and, if desired, have it sent to the certifying body for review. Once the data gathering about the education is completed, the system goes to the quantitative data capture process shown in Figure 17.
[0056] If the user wants to report building performance for insurance / financial assessment purposes, the data input process shown in Figure 14 is performed. During the process, the system asks the user about what insurance / financial institution they would like to report their building’s performance to or to what standards and analysis these institutions are specifically requiring. Given this input and based on Verdafero’ s utility monitoring algorithm analysis the system can produce the necessary documentation required by the institution in a desired output format and, if desired, have it sent to the institution for review. Once the data gathering about the education is completed, the system goes to the quantitative data capture process shown in Figure 17.
[0057] If the user wants to adhere to local governmental building ordinances, the data input process shown in Figure 15 is performed. During the process, the system asks the user about what local governmental building ordinance they would like to report their building’s performance to. Given this input and based on Verdafero’ s utility monitoring algorithm analysis and possible communications with other external software systems like the Environmental Protection Agency’s ENERGY STAR, the Verdafero system can produce the necessary documentation required by the ordinance body in a desired output format and, if desired, have it sent to the ordinance body for review or interface with the ordinance body’s system of choice and report the building’s performance. Once the data gathering about the education is completed, the system goes to the quantitative data capture process shown in Figure 17.
[0058] If the user wants to identify fraudulent / suspicious activity using machine learning / AI, the data input process shown in Figure 16 is performed. During the process, the system asks the user which utility they would like to analyze for fraudulent / suspicious activity? Given this input the system can run analysis to identify subtle fluctuations within the data over time that may be indicative of fraudulent / suspicious activity and report the findings to the user. The process continually monitors the utility usage over time, short or longer periods, and using the AI engine, and based on identified patterns extracted from Verdafero’s utility monitoring AI algorithm analysis, identifies potential fraudulent / suspicious activities that have not been seen in the past, such as usage spikes during unoccupied times of the day, higher load profiles at unexpected times, be it singular or regular occurrences. If these spikes / abnormalities identified as non-suspicious the AI engine can learn to incorporate these non- suspicious events as normal behavior for future events. Once the data gathering about the education is completed, the system goes to the quantitative data capture process shown in Figure 17.
[0059] During the quantitative data capture process shown in Figure 17, the system captures data about the one or more utility monitoring areas as shown and the quantitative data is stored in the system indexed against the user’s profile. The data is automatically captured via computer scanning of paper or PDF utility bills via character recognition software, via direct connection to internet enabled smart utility meters, off the shelf internet enabled sub-meters or internet enabled IoT sensing device on individual pieces of equipment etc. Verdafero will read/write to each wed-enabled device through the devices specified API and store the information in our desired format on our servers in preparation for analysis in our machine learning / AI analysis algorithm.
[0060] Returning to Figure 4, once the data input is completed, the process moves onto the data analysis process 74 that is shown in more detail in Figure 18. During the analysis process, the system implements an analysis algorithm to take into account internal or external factors, that may influence utility usage to determine a list of utility security priorities for the particular user / business based on the input data. Based on the predefined user security priorities set by the building owner / operator or security personnel assisting the building owner / operator such as, “send an alert if usage increase is in access of 25% over a certain time period” or “if the trend analysis indicates an event or set of events that lie outside a set normal pattern alert the user to its existence”, the system can determine if one or more utility monitoring areas may be outside the scope of normal behavior, based on the historical Verdafero analysis algorithm and other Verdafero data analysis algorithms, may prioritize the alerts and recommendations, and/or provide links to products/services related to the recommendations/projects to investigate these abnormalities further. The links to possible products / services related to the recommendations / projects may be based upon an AI decision engine that taking into account the building’s location, use and other relevant data and alerting factors, can present the user the most useful product / service solutions to their problem. Examples of this may be a catastrophic water leak detected on the top floor of the building requiring immediate attention from a qualified plumber. Following the system detection of this leak it would immediately identify an appropriate plumber, from a user predefined list or public database, and present the user with necessary details. Thus, as shown in Figure 18, the system can make security recommendations in one, a few, many or all of the one or more utility monitoring areas. For each utility monitoring area, the system may provide a project list of one or more projects in that utility monitoring area to investigate as the cause of the alert and/or a list of service providers to help with investigating the cause of the alert.
[0061] The system may permit the projects to be sorted by: profile such as the type of building (such as industry vertical or similar); ownership status of facilities, 3rd party hosting, etc.; security projects & security certifications already completed; security goals for organization, such as alert if electricity changes by x% and/or if water changes by x%; and/or other utility analysis abnormality.
[0062] As shown in Figure 4, once the data analysis is completed for the particular user / property, the process moves onto the data output process 76. During the data output process, the system allows the particular user to select the one or more desired outputs and the reports output A/R. In the data output process, the user may be presented with views (dashboard) and / or print, .pdf, etc. of: * Utility Monitoring Report; Security performance details (metrics); Overall Security Health Report; and/or Status details A/R. Thus, during the data output process, the user may select a report (as shown in Figure 19) that may include: a utility monitoring report (the details of which process to generate the report are shown in Figure 20); a utility analysis report (the details of which process to generate the report are shown in Figure 21); an abnormalities / potential security problems report (the details of which process to generate the report are shown in Figure 22); a property utility comparison report (the details of which process to generate the report are shown in Figure 23); a utility security monitoring certificate report (the details of which process to generate the report are shown in Figure 24); a property performance for insurance assessment report (the details of which process to generate the report are shown in Figure 25); a local governmental building ordinance report (the details of which process to generate the report are shown in Figure 26); a machine learning / AI detected fraudulent / suspicious activity report (the details of which process to generate the report are shown in Figure 27); and other reports that the system can generate or that can be created by the user.
[0063] During the utility monitoring report process as shown in Figure 20, the system determines if the user wants a utility security summary and can provide that to the user (an example of which is contained in Appendix A which is incorporated herein by reference) or an in-depth report related to the one or more utility monitoring areas and can then provide those reports.
[0064] During the utility analysis report process as shown in Figure 21, the system determines if the user wants a utility analysis report summary and can provide that to the user or an in-depth report related to the one or more utility monitoring areas and can then provide those reports.
[0065] During the abnormalities / potential security problems report process shown in Figure 22, the system determines if the user wants a abnormalities / potential security problems report summary and can provide that to the user or an in-depth report related to the one or more utility monitoring areas and can then provide those reports.
[0066] During the property utility comparison report process shown in Figure 23, the system determines if the user wants a property utility comparison report summary and can provide that to the user or an in-depth report related to the one or more utility monitoring areas and can then provide those reports.
[0067] During the utility security monitoring certificate report process shown in Figure 24, the system determines if the user wants a utility security monitoring certificate report summary and can provide that to the user or an in-depth report related to the one or more utility monitoring areas and can then provide those reports.
[0068] During the property performance for insurance report process shown in Figure 25, the system determines if the user wants a property performance for insurance report summary and can provide that to the user or an in-depth report related to the one or more utility monitoring areas and can then provide those reports.
[0069] During the property performance for a local governmental building ordinance report process shown in Figure 26, the system determines if the user wants a local governmental building ordinance report summary and can provide that to the user or an in-depth report related to the one or more utility monitoring areas and can then provide those reports.
[0070] During the machine learning / AI detected fraudulent / suspicious activity report process shown in Figure 27, the system determines if the user wants a machine learning / AI detected fraudulent / suspicious activity report summary and can provide that to the user or an in-depth report related to the one or more utility monitoring areas and can then provide those reports. The machine learning / AI detected fraudulent / suspicious activity report summary consists of a high-level overview through graphical interfaces and associated descriptive detail of if your property portfolio or individual facility may have been subject to fraud / suspicious behavior within its utility use. The machine learning / AI detected fraudulent / suspicious activity report detailed report consists of an in-depth view through graphical interfaces and associated descriptive detail if your property portfolio, individual facility has been subject to fraud / suspicious behavior within its utility use down to the , meters or sensors level so you can pin point the affected party.
[0071] Figures 28A-28B illustrate an example of a company main utility monitoring dashboard user interface of the utility monitoring and analytics security management system. The user interface may include a summary portion 100 (that also allows the user to select a category to navigate to quickly), a utility monitoring summary portion 102 that has the key statistics for each utility monitoring category, a reports and certification portion 104 that displays the reports and certifications for the particular business whose user is viewing the user interface and a projects and planning portion 106 that displays the projects for the business. The company main utility monitoring dashboard user interface thus permits the user who is viewing the user interface to get a good overview of the utility monitoring progress of the business.
[0072] The system includes a multi-level UI approach with varying levels of interactivity between the user and the system. At the top level the user will interact with the system to visualize the portfolio level analysis. The user can then go to the next level of analysis and interact with the data analysis for a facility or group of facilities. The user can then go to the next level of analysis and interact with the data analysis for an individual utility meters within a facility. The user can then go to the next level of analysis and interact with the data analysis for an individual utility sub-meters under a meter within the facility. The user can then go to the next level of analysis and interact with the individual utility sensors under a sub-meter under a meter within a facility. At each level of analysis, the user can set appropriate alert thresholds or run rate, trending, deeper data normalization analysis if necessary.
[0073] Once the user has entered the basic information above, the user is presented with a sample performance dashboard that shows average estimated monthly utility usage and cost that is calculated based on: Industry and type of space, Square footage, Number of employees and Location. [0074] The user is then asked questions to assess the amount their business has done to secure their utilities including actions taken to actively monitor their utilities, reduce utility usage. For each question, the user provides qualitative assessment of how much they have done (nothing, a little, some actions, a lot). The user is also asked questions about their existing physical infrastructure security systems, if any. Based on answers to questions about actions they’ve taken, user is presented with sample utility monitoring planning dashboard that has a set of projects in areas of electricity, water, waste, natural gas and transport are recommended based on: answers to qualitative assessment of actions already taken, industry and type of space.
[0075] The user is then asked questions to assess type of security reporting and tracking they have done of utility monitoring performance including: reporting to third party organizations, voluntarily or as part of security requirements. Based on answers to reporting questions, reports and certifications dashboard presented in which the user is shown certifications they might be eligible for based on industry and the user is shown additional information to be tracked to meet security standards for reporting or certification.
[0076] The user is also shown a complete dashboard with information about average company of their size, industry, space type with utility monitoring indicators they should be tracking, certifications and reports they could produce, security projects and planning they could undertake to improve utility security and specific next steps they should take based on their security goals including: reporting to stakeholders, reducing security risks / environmental impact and making a utility security monitoring plan.
Business Process Management Use Case of System
[0077] In addition to the utility monitoring and analytics security use case described above, the system shown in Figure 1 may be used for managing a variety business processes and the energy consumption of the elements of the business process as described above. For example, the system may be used to monitor and control a product line process (shown in Figure 29) or the cups of coffee sold by a store as described below in more detail. It should be understood that the system may be used to monitor and manage energy consumption for any business process in which it is desirable to be able to monitor and control that business process. [0078] Figure 29 illustrates an example of a manufacturing line 2900 (an example of a business process) that may be managed by the system 58. The manufacturing line may have an input 2902, at least two motors 2904, 2906 and a belt so that input materials at the input are turned into an output. As shown in Figure 29, the manufacturing line may have a plurality of Internet or Things (IoT) sensors 2908 at various points along the manufacturing line. In the example in Figure 29, the IoT sensors 2908 may be at the input, adjacent each motor at predetermined intervals along the production line and at the output. Each IoT sensor 2908 measures some characteristic of the point in the manufacturing line and communicates that data to the system 58 over a communication path that may be wired or wireless. For example, the input and output IoT sensor 2908 may measure the amount of input material or output, respectively while each motor IoT sensor 2908 may capture data about the energy usage of that motor. The system can be operated with fewer or more IoT sensors 2908 than those shown in Figure 29. The various data captured by the IoT sensors 2908 along the manufacturing line may be collectively known as production line data that is input into the system 58.
[0079] Thus, if the manufacturing line in Figure 29 is a paper production process, the system 58 can effectively track and monitor a production line process such as paper production.
With IoT sensors 2908 connected to various parts of the system to constantly monitor the production line output as well as the energy used by the production line motors / drives, the system can determine correlation functions between the amount of paper produced, over a set time, and the energy consumed by the motors / drives. Having developed this correlation function, the system 58 is able to carry out several important analytical functions on this data to help the user in several ways.
[0080] First, the system may perform predictive analytics using the production line data and the correlation. Thus, the system 58 can be used for predictive analytics to help the user better predict their production capabilities and energy production costs associated with any change in production output, ie: predict expected energy use per unit of increase or decrease in production output. Second, the system may also perform downtime analysis since, given the real time IoT monitoring nature of the system 58 on a production line 2900, the user can be alerted to any unexpected downtime failures through the drop in either output or energy consumption by the motor, for example. Third, the system may detect production problems since the system 58 can alert the user immediately when/if there is a production problem when either the production output changes dramatically or when the energy consumption associated without production changes dramatically and does not follow the correlated energy / production function.
[0081] The system 58, for the production system data may determine a total cost of ownership for the equipment. Total cost of ownership (TCO) is vital for both user and equipment vendors / installers in order to effectively verify the efficacy of newly installed equipment as part of any upgrade or new installation. End users are increasingly requesting, as part of any agreements, that installers give energy efficiency and cost reduction guarantees as part of the TCO for equipment upgrades or installations. The ability to track and verify energy efficiency and cost reductions over agreed time periods are vitally important to demonstrate the effectiveness of the new equipment upgrades. This enables the end user to understand their true costs and also enables the vendor to verify their energy savings and calculate the real TCO.
[0082] The system 58, using the correlation, can present the user with better analysis on energy used per unit of production. Given that there is interest by some end users to better understand the real total cost of ownership of any energy efficient equipment installed, such as new motors or drives, the system 58 can calculate the energy per unit of production which can then be accurately compared to the energy per unit of production for the old motors and drives. Rather than just looking at the overall energy bill over the course of a week, month or year on the production line and comparing it to the prior week, month or year when the older equipment was installed, the system 58 can accurately calculate the total cost of ownership for the production line with the new power equipment installed.
[0083] In the cups of coffee sold business process example, the system 58 can effectively track and monitor a business process such as cups of drip coffee sold in a coffee shop. With IoT sensors connected to production equipment in the coffee shop to monitor the volume of drip coffee produced as well as the energy consumed by the coffee production equipment (grinders, hot water boilers etc), the system 58 can develop a correlation function to understand the direct relationship between volume of drip coffee produced versus amount of water used or energy consumed to produce the coffee. There may even be the opportunity to differentiate between types of coffee produced. Having developed this correlation function, the system 58 will be able to carry out several important analytical functions on this data to help the user in several ways.
[0084] For example, the system may perform predictive analysis for the coffee shop and the system 58 can be used to help the user better understand their drip coffee production capabilities and energy production costs associated with any change in drip coffee production output, i.e. : predict expected energy use per unit of increased or decreased in drip coffee production output. The system may also determine downtime and given the real time IoT monitoring nature of the system 58 on a drip coffee production line, the user could be alerted to any unexpected downtime through the drop in either output or energy consumption from the coffee production equipment. The system 58 may also determine production problems and alert the user immediately if there is a production problem when either the production output changes dramatically or when the energy consumption associated without production changes dramatically and does not follow the correlated energy / production function.
[0085] The system 58 may also determine a total cost of ownership (TCO) for the equipment which is vital for both user and equipment vendors / installers in order to effectively verify the efficacy of newly installed equipment as part of any upgrade or new installation. End users are increasingly requesting, as part of any agreements, that installers give energy efficiency and cost reduction guarantees as part of the TCO for equipment upgrades or installations. The ability to track and verify energy efficiency and cost reductions over agreed time periods are vitally important to demonstrate the effectiveness of the new equipment upgrades. This enables the end user to understand their true costs and also enables the vendor to verify their energy savings and calculate the real TCO.
[0086] The system for a coffee shop, using the correlation function, can present the user with better analysis on energy used per unit volume of drip coffee produced. Given that there is interest by some end users to better understand the real total cost of ownership of any energy efficient equipment installed, such as new coffee machine or new production process, the system 58 can calculate the energy per unit of coffee production which can then be accurately compared to the energy per unit of coffee production for the old equipment. Rather than just looking at the overall energy bill over the course of a week, month or year on the coffee production shop and comparing it to the prior week, month or year when the older equipment was installed the system 58 can accurately calculate the total cost of ownership for the coffee production line with the new equipment installed.
[0087] The foregoing description, for purpose of explanation, has been described with reference to specific embodiments. However, the illustrative discussions above are not intended to be exhaustive or to limit the disclosure to the precise forms disclosed. Many modifications and variations are possible in view of the above teachings. The embodiments were chosen and described in order to best explain the principles of the disclosure and its practical applications, to thereby enable others skilled in the art to best utilize the disclosure and various embodiments with various modifications as are suited to the particular use contemplated.
[0088] The system and method disclosed herein may be implemented via one or more components, systems, servers, appliances, other subcomponents, or distributed between such elements. When implemented as a system, such systems may include an/or involve, inter alia, components such as software modules, general-purpose CPU, RAM, etc. found in general- purpose computers. In implementations where the innovations reside on a server, such a server may include or involve components such as CPU, RAM, etc., such as those found in general-purpose computers.
[0089] Additionally, the system and method herein may be achieved via implementations with disparate or entirely different software, hardware and/or firmware components, beyond that set forth above. With regard to such other components (e.g., software, processing components, etc.) and/or computer-readable media associated with or embodying the present inventions, for example, aspects of the innovations herein may be implemented consistent with numerous general purpose or special purpose computing systems or configurations. Various exemplary computing systems, environments, and/or configurations that may be suitable for use with the innovations herein may include, but are not limited to: software or other components within or embodied on personal computers, servers or server computing devices such as routing/connectivity components, hand-held or laptop devices, multiprocessor systems, microprocessor-based systems, set top boxes, consumer electronic devices, network PCs, other existing computer platforms, distributed computing environments that include one or more of the above systems or devices, etc.
[0090] In some instances, aspects of the system and method may be achieved via or performed by logic and/or logic instructions including program modules, executed in association with such components or circuitry, for example. In general, program modules may include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular instructions herein. The inventions may also be practiced in the context of distributed software, computer, or circuit settings where circuitry is connected via communication buses, circuitry or links. In distributed settings, control/instructions may occur from both local and remote computer storage media including memory storage devices.
[0091] The software, circuitry and components herein may also include and/or utilize one or more type of computer readable media. Computer readable media can be any available media that is resident on, associable with, or can be accessed by such circuits and/or computing components. By way of example, and not limitation, computer readable media may comprise computer storage media and communication media. Computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data. Computer storage media includes, but is not limited to,
RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical storage, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and can accessed by computing component. Communication media may comprise computer readable instructions, data structures, program modules and/or other components. Further, communication media may include wired media such as a wired network or direct-wired connection, however no media of any such type herein includes transitory media. Combinations of the any of the above are also included within the scope of computer readable media.
[0092] In the present description, the terms component, module, device, etc. may refer to any type of logical or functional software elements, circuits, blocks and/or processes that may be implemented in a variety of ways. For example, the functions of various circuits and/or blocks can be combined with one another into any other number of modules. Each module may even be implemented as a software program stored on a tangible memory (e.g., random access memory, read only memory, CD-ROM memory, hard disk drive, etc.) to be read by a central processing unit to implement the functions of the innovations herein. Or, the modules can comprise programming instructions transmitted to a general purpose computer or to processing/graphics hardware via a transmission carrier wave. Also, the modules can be implemented as hardware logic circuitry implementing the functions encompassed by the innovations herein. Finally, the modules can be implemented using special purpose instructions (SIMD instructions), field programmable logic arrays or any mix thereof which provides the desired level performance and cost.
[0093] As disclosed herein, features consistent with the disclosure may be implemented via computer-hardware, software and/or firmware. For example, the systems and methods disclosed herein may be embodied in various forms including, for example, a data processor, such as a computer that also includes a database, digital electronic circuitry, firmware, software, or in combinations of them. Further, while some of the disclosed implementations describe specific hardware components, systems and methods consistent with the innovations herein may be implemented with any combination of hardware, software and/or firmware. Moreover, the above-noted features and other aspects and principles of the innovations herein may be implemented in various environments. Such environments and related applications may be specially constructed for performing the various routines, processes and/or operations according to the invention or they may include a general-purpose computer or computing platform selectively activated or reconfigured by code to provide the necessary functionality. The processes disclosed herein are not inherently related to any particular computer, network, architecture, environment, or other apparatus, and may be implemented by a suitable combination of hardware, software, and/or firmware. For example, various general-purpose machines may be used with programs written in accordance with teachings of the invention, or it may be more convenient to construct a specialized apparatus or system to perform the required methods and techniques. [0094] Aspects of the method and system described herein, such as the logic, may also be implemented as functionality programmed into any of a variety of circuitry, including programmable logic devices ("PLDs"), such as field programmable gate arrays ("FPGAs"), programmable array logic ("PAL") devices, electrically programmable logic and memory devices and standard cell-based devices, as well as application specific integrated circuits. Some other possibilities for implementing aspects include: memory devices, microcontrollers with memory (such as EEPROM), embedded microprocessors, firmware, software, etc. Furthermore, aspects may be embodied in microprocessors having software-based circuit emulation, discrete logic (sequential and combinatorial), custom devices, fuzzy (neural) logic, quantum devices, and hybrids of any of the above device types. The underlying device technologies may be provided in a variety of component types, e.g., metal-oxide semiconductor field-effect transistor ("MOSFET") technologies like complementary metal- oxide semiconductor ("CMOS"), bipolar technologies like emitter-coupled logic ("ECL"), polymer technologies (e.g., silicon-conjugated polymer and metal-conjugated polymer-metal structures), mixed analog and digital, and so on.
[0095] It should also be noted that the various logic and/or functions disclosed herein may be enabled using any number of combinations of hardware, firmware, and/or as data and/or instructions embodied in various machine-readable or computer-readable media, in terms of their behavioral, register transfer, logic component, and/or other characteristics. Computer- readable media in which such formatted data and/or instructions may be embodied include, but are not limited to, non-volatile storage media in various forms (e.g., optical, magnetic or semiconductor storage media) though again does not include transitory media. Unless the context clearly requires otherwise, throughout the description, the words "comprise," "comprising," and the like are to be construed in an inclusive sense as opposed to an exclusive or exhaustive sense; that is to say, in a sense of "including, but not limited to." Words using the singular or plural number also include the plural or singular number respectively. Additionally, the words "herein," "hereunder," "above," "below," and words of similar import refer to this application as a whole and not to any particular portions of this application. When the word "or" is used in reference to a list of two or more items, that word covers all of the following interpretations of the word: any of the items in the list, all of the items in the list and any combination of the items in the list. [0096] Although certain presently preferred implementations of the invention have been specifically described herein, it will be apparent to those skilled in the art to which the invention pertains that variations and modifications of the various implementations shown and described herein may be made without departing from the spirit and scope of the invention. Accordingly, it is intended that the invention be limited only to the extent required by the applicable rules of law.
[0097] While the foregoing has been with reference to a particular embodiment of the disclosure, it will be appreciated by those skilled in the art that changes in this embodiment may be made without departing from the principles and spirit of the disclosure, the scope of which is defined by the appended claims.

Claims

Claims:
1. A business utility monitoring and analytics security system, comprising: one or more computing devices; a utility monitoring and analytics security management unit that is capable of communicating with the one or more computing devices over a link; a plurality of utility meters located adjacent a property that perform real time capturing of utility data for the property; and the utility monitoring and analytics security management unit capturing property profile data of the property and receiving the utility data over the link from the plurality of utility meters, performing an analysis of the property profile data and utility data to benchmark the utility usage of the property, generating a utility security benchmark report for the property and delivering the utility security benchmark report to a user who manages the property.
2. The system of claim 1, wherein the utility usage of the property is one of a comparison of the utility usage of the property against a building of a similar size and use and a score of the utility usage of the property.
3. The system of claim 2, wherein a desired utility usage levels and a desired utility usage costs are set as thresholds for alerts usage, costs or rates cross these thresholds.
5. The system of claim 4, wherein the utility monitoring and analytics security management unit generates an alert report based on the thresholds.
6. The system of claim 1, wherein the utility monitoring and analytics security management unit generates an alert.
7. The system of claim 6, wherein a set of recommended best practices is a cause of the alert.
8. The system of claim 6, wherein the utility monitoring and analytics security management unit generates a set of actions to verify the cause of the alert.
9. The system of claim 6 further comprising a marketplace for vendors to aid the property user with a resolution of the utility alert.
10. The system of claim 1, wherein the utility monitoring and analytics security management unit is one of one or more server computers, a standalone computer, a mainframe and a downloadable application that is downloaded to the computing device.
11. The system of claim 10, wherein each computing device is one of a desktop computer, a laptop computer, a smartphone and a terminal computer.
12. The system of claim 11, wherein each computing device has a browser application.
13. The system of claim 11, wherein each computing device further comprises a cloud-based application that interacts with the utility monitoring and analytics security management unit.
14. A computer implemented property utility monitoring and analytics method using one or more computing devices and a utility monitoring and analytics security management unit that is capable of communicating with the one or more computing devices over a link, the method comprising: performing real-time capturing, by plurality of utility meters located adjacent a property, capturing of utility data for the property; capturing, by a utility monitoring and analytics security management unit, property profile data of the property; receiving, by a utility monitoring and analytics security management unit, the utility data over the link from the plurality of utility meters; performing an analysis of the property profile data and utility data to benchmark the utility usage of the property; and generating a utility security benchmark report for the property and delivering the utility security benchmark report to a user who manages the property.
15. The method of claim 14 further comprising generating a set of security related utility alerts and reports based one or more user threshold values.
16. The method of claim 15 further comprising generating one or more recommendations about the utility usage and generating a set of recommended next steps for the recommendations including prioritization of the recommendations.
17. The method of claim 16, wherein the set of recommended next steps are one of a list of recommended next steps in a security area and a link to a vendor for the recommended solution.
18. The method of claim 14 further comprising generating, by the utility monitoring and analytics security management unit, a report.
19. The method of claim 18, wherein the report is one of a utility monitoring report, a utility analysis report, an abnormalities / potential security problems report, a property utility comparison report, a utility security monitoring certificate report, a property performance for insurance report, a local governmental building ordinance report, and a machine learning / AI detected fraudulent / suspicious activity report.
20. A business process monitoring and analytics system, comprising: one or more computing devices; a process monitoring and analytics management unit that is capable of communicating with the one or more computing devices over a link; a plurality of sensors located adjacent different portion of the process and adjacent one or more motor that are part of the process, each sensor producing process data; and the process monitoring and analytics management unit being configured to receive the process data over the link from the plurality of sensors and perform an analysis of the process data to generate a process analytics that is displayed to an owner of the process.
21. The system of claim 20, wherein each sensor is an internet of things (IOT) sensor.
22. The system of claim 21, wherein the plurality of sensors further comprises a first IoT sensor at an input of the process and measures a throughput of input materials to the process and a second IoT sensor at an output of the process and measures a throughput of the output of the process.
23. The system of claim 22, wherein the plurality of sensors further comprises a third IoT sensor adjacent each motor of the process that measures an energy consumption of the motor during the process.
24. The system of claim 23, wherein the process monitoring and analytics management unit is further configured to perform a predictive analysis of production capabilities and energy production costs of the process based on the data from the IoT sensors.
25. The system of claim 23, wherein the process monitoring and analytics management unit is further configured to determine a downtime of the process based on the data from the IoT sensors.
26. The system of claim 23, wherein the process monitoring and analytics management unit is further configured to determine production problems for the process based on the data from the IoT sensors.
27. The system of claim 23, wherein the process monitoring and analytics management unit is further configured to determine a total cost of ownership of an element of the process based on the data from the IoT sensors.
28. A computer implemented process monitoring and analytics method using one or more computing devices and a process monitoring and analytics management unit that is capable of communicating with the one or more computing devices over a link, the method comprising: generating, by a plurality of sensors located adjacent different portion of a process and adjacent one or more motor that are part of the process, process data; receiving, by the process monitoring and analytics management unit, the process data over the link from the plurality of sensors; and performing an analysis of the process data to generate a process analytics that is displayed to an owner of the process.
29. The method of claim 28, wherein each sensor is an internet of things (IOT) sensor.
30. The method of claim 29, wherein generating the process data further comprises measures a throughput of input materials to the process at a first IoT sensor at an input of the process and measuring a throughput of the output of the process at a second IoT sensor at an output of the process.
31. The method of claim 30, wherein generating the process data further comprises measuring an energy consumption of the motor during the process using a third IoT sensor adjacent each motor of the process.
32. The method of claim 31, wherein performing the analysis further comprises performing a predictive analysis of production capabilities and energy production costs of the process based on the data from the IoT sensors.
33. The method of claim 31, wherein performing the analysis further comprises determining a downtime of the process based on the data from the IoT sensors.
34. The method of claim 31, wherein performing the analysis further comprises determining production problems for the process based on the data from the IoT sensors.
35. The method of claim 31, wherein performing the analysis further comprises determining a total cost of ownership of an element of the process based on the data from the IoT sensors.
PCT/US2020/058396 2019-10-31 2020-10-30 Utility monitoring, analytics security management and business process management system and method WO2021087386A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US16/671,114 US20210018335A1 (en) 2011-07-13 2019-10-31 Utility monitoring and analytics security management system and method
US16/671,114 2019-10-31

Publications (1)

Publication Number Publication Date
WO2021087386A1 true WO2021087386A1 (en) 2021-05-06

Family

ID=75715381

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2020/058396 WO2021087386A1 (en) 2019-10-31 2020-10-30 Utility monitoring, analytics security management and business process management system and method

Country Status (1)

Country Link
WO (1) WO2021087386A1 (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100064001A1 (en) * 2007-10-10 2010-03-11 Power Takeoff, L.P. Distributed Processing
US20100283606A1 (en) * 2009-05-08 2010-11-11 Boris Tsypin Building energy consumption analysis system
US20150355036A1 (en) * 2014-06-04 2015-12-10 Magnum Energy Solutions, LLC Environmental condition surveillance and methods thereof

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100064001A1 (en) * 2007-10-10 2010-03-11 Power Takeoff, L.P. Distributed Processing
US20100283606A1 (en) * 2009-05-08 2010-11-11 Boris Tsypin Building energy consumption analysis system
US20150355036A1 (en) * 2014-06-04 2015-12-10 Magnum Energy Solutions, LLC Environmental condition surveillance and methods thereof

Similar Documents

Publication Publication Date Title
Schiemann et al. Carbon disclosure, contextual factors, and information asymmetry: The case of physical risk reporting
JP6592474B2 (en) Providing resource usage information for each application
Brown-Liburd et al. Big Data and audit evidence
Liu et al. Big questions in AIS research: Measurement, information processing, data analysis, and reporting
US8744894B2 (en) Method and system for assessing, managing, and monitoring information technology risk
US9305278B2 (en) System and method for compiling intellectual property asset data
US20130085814A1 (en) Supply Chain Optimization Using a Supply Chain Performance Management Tool
US7937321B2 (en) Managed service for detection of anomalous transactions
US20220067110A1 (en) Real-time outage analytics and reliability benchmarking
US20160012541A1 (en) Systems and methods for business reclassification tiebreaking
Liu et al. Case-based insights into rework costs of residential building projects in China
Kuenkaikaew Predictive Audit Analytics: Evolving to a new era
CN101859269A (en) The system that is used for monitoring technology assembly efficiency
US20090228337A1 (en) Method for evaluating compliance
Satapathy An analysis for service quality enhancement in electricity utility sector of India by SEM
US20210018335A1 (en) Utility monitoring and analytics security management system and method
Ahuja et al. Data analytics criteria of IoT enabled smart energy meters (SEMs) in smart cities
AU2021200291A1 (en) Apparatuses, computer-implemented methods, and computer program products for improved monitored building environment monitoring and scoring
Lee et al. Review and perspectives on data sharing and privacy in expanding electricity access
Kambham et al. Predicting personality traits using smartphone sensor data and app usage data
Lee et al. Datasets on South Korean manufacturing factories’ electricity consumption and demand response participation
Chen et al. Do perceived operational impacts affect the portfolio of carbon‐abatement technologies?
WO2021087386A1 (en) Utility monitoring, analytics security management and business process management system and method
Zou et al. Product recalls and supply base innovation
Efkarpidis et al. Technoeconomic Review of Smart Metering Applications

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20881895

Country of ref document: EP

Kind code of ref document: A1

DPE1 Request for preliminary examination filed after expiration of 19th month from priority date (pct application filed from 20040101)
NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20881895

Country of ref document: EP

Kind code of ref document: A1