Method of smart scene management using big data pattern analysis

ABSTRACT

An automation system including sensors that detect threats within a secured area, a plurality of prospective events defined within a memory of the automation system, each event including at least a physical change in an environment of the secured area, a time of execution of the physical change and a corresponding actuator that causes the physical change, a processor of the automation system that periodically activates the corresponding actuator at the time of each of the plurality of events, a processor that monitors each of the plurality of sensors for activation by an authorized human user and that saves a record of each activation to a cloud memory and a cloud processor that monitors the saved activation records of each sensor over a time period, determines a difference between the saved activations and the plurality of events and that modifies the plurality of events based upon the determined differences.

FIELD

This application relates to home automation systems and more particularto security systems.

BACKGROUND

Systems are known to automate the homes of people. Such system may beused to simplify the lives of people living within their homes byautomatically turning on their lights at sunset, activating a HVACsystem before the homeowner arrives home after work and/or providingsecurity within the home.

The security portion of a home automation system protects people andassets within secured areas of the home. Such systems are typicallybased upon the use of one more sensors that detect threats within theareas.

Threats to people and assets may originate from any of number ofdifferent sources. For example, a fire may kill or injure occupants whohave become trapped by a fire in a home. Similarly, carbon monoxide froma fire may kill people in their sleep.

Alternatively, an unauthorized intruder, such as a burglar, may presenta threat to assets within the area. Intruders have also been known toinjure or kill people living within the area.

In most cases, threat detectors are connected to a local control panel.In the event of a threat detected via one of the sensors, the controlpanel may sound a local audible alarm. The control panel may also send asignal to a central monitoring station.

While conventional home automation systems work well, it is sometimesdifficult or inconvenient to reprogram the automated features should theschedule of the homeowner change. Accordingly, a need exists for bettermethods and apparatus for simplifying the use of the automated featuresof a home automation system.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates a block diagram of a home automation system inaccordance herewith;

FIG. 2 illustrates information flow of the system of FIG. 1 and

FIG. 3 illustrates a set of steps that may be used by the system of FIG.1.

DETAILED DESCRIPTION

While disclosed embodiments can take many different forms, specificembodiments thereof are shown in the drawings and will be describedherein in detail with the understanding that the present disclosure isto be considered as an exemplification of the principles thereof as wellas the best mode of practicing same, and is not intended to limit theapplication or claims to the specific embodiment illustrated.Alternatively, the home automation system may be considered to be partof the security system.

FIG. 1 depicts a home automation system 10 shown generally in accordancewith an illustrated embodiment. A security system 12 may form a portionof the home automation system.

The security system may include a number of sensors 14, 16 that detectthreats within a secured geographic area (e.g., a home) 18. The sensorsmay be embodied in any of a number of different forms. For example, atleast some of the sensors may be limit switches placed on the doorsand/or windows that provide entrance into and egress from the securedarea. Other of the sensors may be passive infrared (PIR) detectorsplaced within an interior of the space in order to detect intruders whohave been able to circumvent the sensors located along the periphery.Still other of the sensors may be closed circuit television (CCTV)cameras with motion detection capabilities.

Other of the sensors may be environmental detectors. For example, thesesensors may detect fire, smoke or natural gas.

The sensors may be monitored by a control panel 20. Upon activation ofone of the sensors, the control panel may send an alarm message to acentral monitoring station 22. The central monitoring station mayrespond by summoning the appropriate help (e.g., police, firedepartment, etc.).

The home automation (and security system) may be controlled via a userinterface 24. To arm the security system, an authorized human user mayenter a personal identification number (PIN) and function key through akeyboard 26 to arm and/or disarm the system. Status information may beshown on a display 28.

Included within the home automation system may be one or more actuators30, 32. The actuators may control environmental aspects of the securedarea. For example, some of the actuators may activate and deactivatelights. Other of the actuators may control heating, ventilating and airconditioning (HVAC) units. Still other actuators may activate anddeactivate home entertainment systems.

The actuators may be controlled via the user interface and controlpanel. In this regard, the actuators may be directly controlled by theuser interface or via one or more timers and associated control moduleswithin the control panel.

The home automation system may also include a cloud monitoring andcontrol system 40 connected to the home automation system via theInternet 42. The cloud system monitors the security system anddynamically modifies control of the actuators based upon the detectedactivities of authorized human users of the secured area.

Included within the control panel, the user interface, each of thesensors and actuators and the cloud system may be control circuitry thataccomplishes the functionality described herein. The control circuitrymay include one or more processor apparatus (processors) 44, 46, eachoperating under control of one or more computer programs 48, 50 loadedfrom a non-transient computer readable medium (memory) 52. As usedherein reference to a step performed by a computer program is alsoreference to the processor that executed that step.

For example, a status processor may monitor the user interface forinstructions from a user. For example, upon entry of an arm command, thestatus processor may enter an armed station. Upon entry of a PIN anddisarm command, the status processor may enter disarmed state.

Similarly, an alarm processor may monitor the status processor andsensors. In the armed state, the alarm processor may monitor the sensorsfor threats. Upon detection of a threat, the alarm processor may composean alarm message including at least an identifier of the system (e.g.,an address, account number, identifier of the type of sensor, anidentifier of the sensor, a location of the sensor within the securedarea and a time).

One or more automation processors may control the actuators via acorresponding actuator file 52, 54. Each actuator file may contain anidentifier of the corresponding actuator and a corresponding event foractivating the actuator and for deactivating the actuator. The event maybe a time of day, week or month or some other event.

The actuator files may be created via information entered through theuser interface or provided by the cloud system. For example, the usermay enter an identifier of an actuator of a light within a particularroom or area of the secured area and a time for activation anddeactivation of the light. The time for activation may be the time thatthe user returns from work each day. The time for deactivation may benormal time that the user goes to bed.

Another actuator file may be associated with the HVAC system of thehome. The actuator may activate the HVAC system when the user returnsfrom work in the evening and deactivates the HVAC system in the morningwhen the user leaves for work. Alternatively, the actuator may be athermostat that lowers a set point of the thermostat for heating whenthe user leaves for work or raises the set point for air condition whenthe user leaves for work in the morning.

Under an illustrated embodiment, the events triggered by the detectedactivities of authorized users of the secured area are processed by acloud processor 56 to modify or supplement the control of theenvironment within the secured area. In this regard, activation of theactuators creates different environmental scenes based upon the numberand types of actuators activated. In general, an automation processoroperates under control of an actuator file to create the desiredenvironmental scene (e.g., turning on a light at 6 pm, etc.). In thisregard, an actuator file identifies an actuator and how that actuator isbe used.

In order to modify and create actuator files, events within the securedarea may be detected by a monitoring processor and saved into a cloudmemory 58 through the Internet. Events may be detected via the sensorsor via the control panel. In this regard, the control panel in somecases may operate as a sensor to detect user activity. For example, inthe armed state, when the authorized user returns home and entershis/her PIN and a disarm key, the panel is used to sense return of anauthorized user to the secured area. The monitoring processor detectsthis event and saves a record of the event into the cloud memory in amanner similar to any other sensor event.

Similarly, in the disarmed state, the threat sensors are not used fordetecting threats. In the disarmed state, the threat sensors may be usedto detect events triggered by authorized users of the secured area. Forexample, each time the user opens a door or enters a particular room, alimit switch or motion detector is activated and detected by themonitoring processor. Upon detection of the event, a record of the eventis saved to the cloud memory.

The cloud processor retrieves detected events from the cloud memory andbegins processing the data over predetermined time periods for repeatingevents that suggest modification of an existing environmental scene orthe creation of a new scene. For example, each time an authorized userreturns home from work, the time of entry of a disarm instruction may benoted and compared to times of entry of disarm commands on otherworkdays. Over some time period (e.g., a week, a month, etc.) an averagetime of day of entry of the disarm command is determined. The averagetime of entry of the disarm command is compared with a content of theactuator files. For example, if an actuator file is programmed by a userto activate an air conditioning unit at 5 pm and the average time ofentry of the disarm command is 6 pm, then the cloud processor determinesthat the actuator file controlling the time of activation of the airconditioner should be changed from 5 pm to 6 pm.

In order to accomplish this change, the cloud processor or associatedprocessor generates a change request for presentation to the user on theuser interface. If the user accepts change, then a change processorchanges the actuator file to reflect the 6 pm activation time for theair conditioner.

In another example, an authorized user may remain at home duringweekdays with the security system in an alarm stay state. In this case,the security system only monitors sensors along a periphery of thesecured area. In this situation, the monitoring processor may detect thenormal activities of the authorized user within the interior of thesecured area. For example, if the user is an early riser and activates aparticular light every morning at a particular time, then the averagetime of that activation is determined over some appropriate time period.The cloud processor then searches the actuator files for an activitythat corresponds to this detected event (i.e., activation of thatparticular light). If a corresponding file cannot be found for thisactuator, then the cloud processor creates a new actuator file foractivating the light at the determined average time.

In general, prior security products have included life safety featuresand in some cases, have also supported other life style featuresincluding home automation features such as lighting control, thermostatcontrol, vertical blind control, etc. for smart energy utilization andfor enhancing the user's comfort and convenience. These kinds of homeautomation features are handled by static scene configuration featuresprovided through a user interface. A static scene in this case meanssomething that happens the same way every day (e.g., turning on a lightat 5 pm and turning it off at 6 pm). However static scenes have a numberof limitations. For example, the installer has to understand the fullscope of the requirements (e.g., desired event timings, desired eventactions required by the use, etc.) of the user within the premises inadvance of initial installation or updates. If there is a change in thedesired event timing, or desired event actions between updates, then theinstaller or user is required to manually modify the static scenethrough the control panel every time there is a change.

The existence of static scenes or features do not allow for the easyaddition of new features. They must be handled manually. If theprerequisite conditions justifying the static scene configurations thenchange, the configurations may be rendered obsolete.

These limitations are overcome by the system of FIG. 1 by using patternstudy from existing inputs devices such as motion sensors and cameras.In the past, scene management in security products have been providedwith a set of planned or desired events which will lead to a set ofactions which are all preconfigured as static scenes. Using the systemof FIG. 1, it is possible to intelligently modify/add/delete existingstatic scenes in security products by understanding a user's activity inthe premises during a preconfigured period using the detectedevents/point data provided and, therefore, available within a memory inthe cloud. The user's activity pattern over the time period is formedbased on observations and study from the existing cameras and motionsensors in the premises using Big Data analysis.

Using the system of FIG. 1, it is possible to achieve smart energyutilization in the premises by properly modifying and/or deleting thedesired event actions of the static scenes as per the user patternsobserved for a predefined period. Using the system of FIG. 1, it ispossible to provide more comfort and convenience to the user byautomatically modifying the desired event actions of the static scenesas per the user pattern observed for a predefined period.

Using the system of FIG. 1, it is possible to provide more comfort andconvenience to the user by automatically identifying any new desiredevent actions which are missing in the existing static scene schema.These can be proposed for user confirmation and subsequently added tothe scene. The system of FIG. 1 is based upon the use of Big Datapattern analysis of data from the sensors of the security system and canbe used for adding/modifying/disabling the existing static scenes of thehome automation system.

For example, FIGS. 2 and 3 depict the method of implementing the smartscene management. The events detected by sensors and other activitiesdetected within the secured premises are pushed to the cloud and apattern study is conducted in the cloud around the context of thepreviously entered static scenes. The patterns derived from study of thedata and deviations observed from that study will lead to modificationsand suggestions for changes to the existing scenes and to the creationof new scenes.

The home automation system or security panel will often have a number ofpreconfigured static scenes to perform a desired set of actions based onset of anticipated events. Over a preconfigured period, a pattern studywill be done using data from existing cameras and sensors within thepremises. In the pattern study, a number of relevant reference pointsare identified. First, a set of user events associated with the existingstatic scenes are identified. Second, deviations observed consistentlyover the preconfigured period are noted. For example, the actual timesof arming and disarming of the security panel is captured and anydeviations from the preconfigured static scene noted. Based on thisstudy, a proposed modification is generated and send to the user forconfirmation. Upon user confirmation, the panel executes the modifiedscenes based on the pattern study.

New scenes can be added to the system. In the premises, there are alwaysa few desired event actions that are manually entered by the user aftera particular user event has occurred and which are found to be notpresent in the list of static scenes. These user event actions can bedetected by the system and proposed for addition to existing scenes.

The home automation system and/or security panel will always have anumber of preconfigured static scenes that cause a set of actions to beperformed based on a predefined set of expected events. Over apreconfigured period, the pattern study is done with the use of existingcameras and sensors in the premises. In the pattern study a number ofpoints are identified. First, a set of events detected by one or more ofthe sensors or detected by the panel over the observation time areidentified and which are not directly associated with any of theexisting scenes. Second, a set of desired actions performed by the panelover the observation time are identified which are not directlyassociated with any of the existing scenes. Based on this pattern study,proposed modified scenes are prepared and intimated to the user forconfirmation.

Based upon this process, unnecessary scenes can be deleted or disabled.In this situation, the security product initially operates with thestatic scenes configured and operating. After the pattern study for apreconfigured period has been performed, the study will reveal that aset of desired actions performed by the panel are not required based onthe study of events occurring at the premises.

For example, at the time of installation, a set of lights near aswimming pool may be configured to be ON for a particular time period.But, the Pattern study revealed that no motion has been observed nearthat swimming pool area during that period of time. As a consequence,the pattern study module will propose deleting/disabling the unnecessaryevent actions from the preconfigured scenes.

The system may also improve smart energy utilization within thepremises. For example, by modifying the existing scenes based on thereal use pattern detected in the home and receiving permission from theuser, unnecessary event actions in the home can be deleted. The patternof smart energy utilization can be implemented in the home with minimalinvolvement by the user. For example the home lights and airconditioning may be configured to be ON at 6 pm. But, in use, the useractually arrives home by about 8 pm in most cases. As a result, thesystem automatically modifies the light and air condition time to 8 pm.In this way Smart energy utilization can be easily and quickly achievedin the premises.

User comfort and convenience are improved by the results of the patternstudy. For example, based on the pattern study, new event actions can beproposed as new actuator files for inclusion with the existing staticscenes. This improves user comfort and convenience.

In general, the system includes an automation system that protects asecured geographic area, a plurality of sensors of the automation systemthat detect threats within the secured area, a plurality of prospectiveevents defined within a memory of the automation system, each eventincluding at least a physical change in an environment of the securedarea, a time of execution of the physical change and a correspondingactuator that causes the physical change, a processor of the automationsystem that periodically activates the corresponding actuator at thetime of each of the plurality of events, a processor that monitors eachof the plurality of sensors for activation by an authorized human userand that saves a record of each activation to a cloud memory and a cloudprocessor that monitors the saved activation records of each sensor overa time period, determines a difference between the saved activations andthe plurality of events and that modifies the plurality of events basedupon the determined differences.

Alternatively, the system includes a home automation system thatautomates a plurality of functions within a home, a security system ofthe home automation system that protects a secured geographic area ofthe home, a plurality of sensors of the security system that detectthreats or a presence of an authorized human user within the securedarea, a plurality of prospective events otherwise controlled by theauthorized human user defined within a memory of the security system,each event including at least a physical change in an environment of thesecured area, a time of execution of the physical change and acorresponding actuator that causes the physical change, a processor ofthe home automation system that periodically activates the correspondingactuator at the time of each of the plurality of events, a processorthat monitors each of the plurality of sensors for activation by theauthorized human user and that saves a record of each activation to acloud memory and a cloud processor that monitors the saved activationrecords of each sensor over a time period, determines a differencebetween the saved activations and the plurality of events and thatmodifies the plurality of events based upon the determined differences.

Alternatively, the system includes a home automation system thatautomates a plurality of functions within a home, a security system ofthe home automation system that protects a secured geographic area ofthe home, a processor of the security system that detects eventsassociated with a presence of an authorized human user within thesecured area and saves a record of each event to a cloud memory, atleast one prospective event that physically changes a portion of anenvironment of the secured area saved within a memory of the securitysystem, the at least one event including at least a prospective time ofthe physical change and an identifier of a corresponding actuator thatcauses the physical change, a processor of the home automation systemthat periodically activates the corresponding actuator at the time ofthe at least one event and a cloud processor that processes the savedrecords over a time period, determines a difference between the savedrecords associated with the presence of the human user and the at leastone prospective event and that modifies the at least one prospectiveevent based upon the determined difference. Based on monitored sensors,the cloud processor can find an altogether new pattern as well, whichthe cloud processor suggests to the authorized human user forconsideration in addition to the plurality of the prospective eventswhich upon selection by the human user leads to a proposal foractivations of at least some of the corresponding actuators forconsideration by the human user as an addition to the saved activationsof the prospective events.

From the foregoing, it will be observed that numerous variations andmodifications may be effected without departing from the spirit andscope hereof. It is to be understood that no limitation with respect tothe specific apparatus illustrated herein is intended or should beinferred. It is, of course, intended to cover by the appended claims allsuch modifications as fall within the scope of the claims. Further,logic flows depicted in the figures do not require the particular ordershown, or sequential order, to achieve desirable results. Other stepsmay be provided, or steps may be eliminated, from the described flows,and other components may be add to, or removed from the describedembodiments.

1-20. (canceled)
 21. A method comprising: a processor retrievingrespective data from each of a plurality of sensors within a securedarea from a predetermined period of time; the processor identifying abehavioral pattern from the respective data from each of the pluralityof sensors; and responsive to identifying the behavioral pattern, theprocessor creating an environmental scene for the secured area.
 22. Themethod of claim 21 wherein the environmental scene identifies anactuator associated with the secured area and a time for automaticallyactivating, deactivating, or modifying the actuator.
 23. The method ofclaim 22 further comprising: the processor scheduling the actuator to beautomatically activated, deactivated, or modified at the time.
 24. Themethod of claim 23 wherein automatically activating, deactivating, ormodifying the actuator at the time preempts a user manually activating,deactivating, or modifying the actuator in a manner consistent with thebehavioral pattern.
 25. The method of claim 21 further comprising: theprocessor identifying a repeating event from the respective data fromeach of the plurality of sensors.
 26. The method of claim 25 furthercomprising: the processor identifying different times at which therepeating event occurs during the predetermined period of time and anaverage time of the different times.
 27. The method of claim 26 furthercomprising: the processor scheduling an actuator associated with thesecured area to be automatically activated, deactivated, or modified atthe average time.
 28. The method of claim 21 further comprising: theprocessor comparing the behavioral pattern to a plurality ofpreconfigured scenes; and responsive to failing to identify a matchbetween the behavioral pattern and any of the plurality of preconfiguredscenes, the processor creating environmental scene.
 29. The method ofclaim 21 further comprising: the processor identifying the behavioralpattern from the respective data from each of the plurality of sensorsunassociated with any of a plurality of preconfigured static scenes. 30.The method of claim 21 further comprising: the processor soliciting userconfirmation for the environmental scene; and responsive to the userconfirmation, the processor scheduling the environmental scene.
 31. Asystem comprising: a processor in communication with a plurality ofsensors within a secured area; and a memory device in communication withthe processor, wherein the memory device stores respective data fromeach of the plurality of sensors, wherein the processor retrieves therespective data from each of the plurality of sensor for a predeterminedperiod of time, wherein the processor identifies a behavioral patternfrom the respective data from each of the plurality of sensors, andresponsive to identifying the behavioral pattern, the processor createsan environmental scene for the secured area.
 32. The system of claim 31wherein the environmental scene identifies an actuator associated withthe secured area and a time for automatically activating, deactivating,or modifying the actuator.
 33. The system of claim 32 wherein theprocessor schedules the actuator to be automatically activated,deactivated, or modified at the time.
 34. The system of claim 33 whereinautomatically activating, deactivating, or modifying the actuator at thetime preempts a user manually activating, deactivating, or modifying theactuator in a manner consistent with the behavioral pattern.
 35. Thesystem of claim 31 wherein the processor identifies a repeating eventfrom the respective data from each of the plurality of sensors.
 36. Thesystem of claim 35 wherein the processor identifies different times atwhich the repeating event occurs during the predetermined period of timeand an average time of the different times.
 37. The system of claim 36wherein the processor schedules an actuator associated with the securedarea to be automatically activated, deactivated, or modified at theaverage time.
 38. The system of claim 31 wherein the processor comparesthe behavioral pattern to a plurality of preconfigured scenes, andwherein responsive to failing to identify a match between the behavioralpattern and any of the plurality of preconfigured scenes, the processorcreates environmental scene.
 39. The system of claim 31 wherein theprocessor identifies the behavioral pattern from the respective datafrom each of the plurality of sensors unassociated with any of aplurality of preconfigured static scenes.
 40. The system of claim 31wherein the processor solicits user confirmation for the environmentalscene and, responsive to the user confirmation, schedules theenvironmental scene.