Building management system with timeseries based assurance services

ABSTRACT

A building system for assurance services with timeseries, the building system including one or more memory devices configured to store instructions thereon that, when executed by one or more processors, cause the one or more processors to monitor a building asset for one or more events and generate a plurality of performance timeseries for the building asset based on the one or more events, determine an actionable insight for the building asset by cross-correlating the plurality of performance timeseries, and perform at least one of generating a work-order for the building asset based on the actionable insight and causing a display device of a user device to display the work-order or communicating with the building asset and causing the building asset to perform one or more operations based on the actionable insight.

CROSS-REFERENCE TO RELATED PATENT APPLICATION

This application claims the benefit of and priority to U.S. Provisional Patent Application No. 62/737,881 filed Sep. 27, 2018. The entirety of this patent application is incorporated by reference herein.

BACKGROUND

The present disclosure relates generally to identity management and/or assurance services. In some embodiments, the present disclosure relates to identity management and/or assurance services for building management systems. In some such embodiments, the present disclosure relates to a timeseries services platform for a building management system. A building management system (BMS) is, in general, a system of devices configured to control, monitor, and manage equipment in or around a building or building area. A BMS can include, for example, a HVAC system, a security system, a lighting system, a fire alerting system, any other system that is capable of managing building functions or devices, or any combination thereof.

A BMS can collect data from sensors and other types of building equipment. Data can be collected over time and combined into streams of timeseries data. Each sample of the timeseries data can include a timestamp and a data value. Some BMSs store raw timeseries data in a relational database without significant organization or processing at the time of data collection. Applications that consume the timeseries data are typically responsible for retrieving the raw timeseries data from the database and generating views of the timeseries data that can be presented via a chart, graph, or other user interface. These processing steps are typically performed in response to a request for the timeseries data, which can significantly delay data presentation at query time.

SUMMARY

One implementation of the present disclosure is a building system for assurance services with timeseries. The building system includes one or more memory devices configured to store instructions thereon that, when executed by one or more processors, cause the one or more processors to monitor a building asset for one or more events and generate performance timeseries for the building asset based on the one or more events, determine an actionable insight for the building asset by cross-correlating the performance timeseries, and perform at least one of generating a work-order for the building asset based on the actionable insight and causing a display device of a user device to display the work-order or communicating with the building asset and causing the building asset to perform one or more operations based on the actionable insight.

In some embodiments, cross-correlating the performance timeseries includes determining whether one or more first events of a first performance timeseries of the performance timeseries occurring at one or more first points in time are followed by one or more second events of a second performance timeseries of the performance timeseries occurring at one or more second points in time within a predefined amount of time of the one or more first points in time.

In some embodiments, the building asset is one of a heating, ventilation, and air conditioning (HVAC) device, a fire suppression device, or a security device.

In some embodiments, the instructions cause the one or more processors to cross-correlate the performance timeseries by analyzing the performance timeseries with a set of rules, wherein each rule of the set of rules is associated with a particular actionable insight of multiple actionable insights.

In some embodiments, the performance timeseries include at least one of a software version timeseries indicating a software version of the building asset at multiple times, an operating status timeseries indicating whether the building asset is online or offline at the times, or an asset health timeseries indicating an asset health of the building asset at the multiple times.

In some embodiments, the instructions cause the one or more processors to generate a virtual timeseries from the performance timeseries, wherein the virtual timeseries indicates an overall compliance of the building asset with one or more requirements based on the performance timeseries.

In some embodiments, the instructions cause the one or more processors to retrieve location information of the building asset and other building assets from the one or more memory devices, retrieve a building map indicating areas of a building, and generate a user interface based on the building map and the location information, wherein the user interface includes the building map and indicators of the building asset and the other building assets on the building map.

In some embodiments, the instructions cause the one or more processors to monitor other building assets for one or more other events and generate other performance timeseries for each of the other building assets based on the one or more other events, generate a risk score for each of the other building assets based on the other performance timeseries, and generate a particular risk score for the building asset based on the performance timeseries.

In some embodiments, the instructions cause the one or more processors to generate a list, the list including the building asset and the other building assets, wherein the list is ordered based on the particular risk score of the building asset and the risk score of each of the other building assets and cause the user device to display the list.

In some embodiments, the instructions cause the one or more processors to generate a other work-orders for the building asset and generate a work-order timeseries for the building asset based on the other work-orders.

In some embodiments, the instructions cause the one or more processors to determine the actionable insight for the building asset by cross-correlating the performance timeseries and further based on the work-order timeseries.

In some embodiments, the actionable insight indicates one or more operations for the building asset to perform. In some embodiments, the instructions cause the one or more processors to communicate with the building asset and cause the building asset to perform the one or more operations.

In some embodiments, the one or more operations include at least one of updating network configuration of one or more network ports of the building asset, updating one or more operating settings of the building asset, or updating software of the building asset.

Another implementation of the present disclosure is a method of assurance services with timeseries. The method includes monitoring, by one or more processing circuits, a building asset for one or more events and generate a performance timeseries for the building asset based on the one or more events, determining, by the one or more processing circuits, an actionable insight for the building asset by cross-correlating the performance timeseries, and performing, by the one or more processing circuits, at least one of generating a work-order for the building asset based on the actionable insight and causing a display device of a user device to display the work-order or communicating with the building asset and causing the building asset to perform one or more operations based on the actionable insight.

In some embodiments, cross-correlating the performance timeseries includes determining whether one or more first events of a first performance timeseries of the performance timeseries occurring at one or more first points in time are followed by one or more second events of a second performance timeseries of the performance timeseries occurring at one or more second points in time within a predefined amount of time of the one or more first points in time.

In some embodiments, cross-correlating the performance timeseries includes analyzing the performance timeseries with a set of rules, wherein each rule of the set of rules is associated with a particular actionable insight of actionable insights.

In some embodiments, the performance timeseries include at least one of a software version timeseries indicating a software version of the building asset at times, an operating status timeseries indicating whether the building asset is online or offline at the times, or an asset health timeseries indicating an asset health of the building asset at the times.

In some embodiments, the method includes generating, by the one or more processing circuits, a virtual timeseries from the performance timeseries, wherein the virtual timeseries indicates an overall compliance of the building asset with one or more requirements based on the performance timeseries.

In some embodiments, the method includes generating, by the one or more processing circuits, other work-orders for the building asset and generating, by the one or more processing circuits, a work-order timeseries for the building asset based on the other work-orders. In some embodiments, the determining, by the one or more processing circuits, the actionable insight for the building asset includes cross-correlating the performance timeseries and further based on the work-order timeseries.

Another implementation of the present disclosure is a building system for assurance services with timeseries. The building system includes a building asset located within a building, wherein the building asset communicates with a building gateway device, a building gateway configured to communicate with the building asset and an assurance service, and an assurance services system. The assurance system is configured to communicate with the building gateway, the assurance services system including one or more memory devices configured to store instructions thereon that, when executed by one or more processors, cause the one or more processors to monitor, via the building gateway, the building asset for one or more events and generate performance timeseries for the building asset based on the one or more events, determine an actionable insight for the building asset by cross-correlating the performance timeseries, and perform at least one of generating a work-order for the building asset based on the actionable insight and causing a display device of a user device to display the work-order or communicating with the building asset and causing the building asset to perform one or more operations based on the actionable insight.

BRIEF DESCRIPTION OF THE DRAWINGS

Various objects, aspects, features, and advantages of the disclosure will become more apparent and better understood by referring to the detailed description taken in conjunction with the accompanying drawings, in which like reference characters identify corresponding elements throughout. In the drawings, like reference numbers generally indicate identical, functionally similar, and/or structurally similar elements.

FIG. 1 is a drawing of a building equipped with a building management system (BMS) and a HVAC system, according to some embodiments.

FIG. 2 is a schematic of a waterside system which can be used as part of the HVAC system of FIG. 1, according to some embodiments.

FIG. 3 is a block diagram of an airside system which can be used as part of the HVAC system of FIG. 1, according to some embodiments.

FIG. 4 is a block diagram of a BMS which can be used in the building of FIG. 1, according to some embodiments.

FIG. 5 is a block diagram of another BMS which can be used in the building of FIG. 1, including a data collector, data platform services, applications, and a dashboard layout generator, according to some embodiments.

FIG. 6 is a block diagram of a timeseries service which can be implemented as some of the data platform services shown in FIG. 5, according to some embodiments.

FIG. 7 is a block diagram of an identity management system including an identity management service and an entity service, according to some embodiments.

FIG. 8 is a block diagram of an assurance service, according to some embodiments.

FIG. 9 is a block diagram of the assurance service of FIG. 8 implemented as a cloud-based module, according to some embodiments.

FIG. 10 is a drawing showing various benefits associated with the assurance service of FIG. 8, according to some embodiments.

FIG. 11 is another block diagram of the assurance service of FIG. 8 including a rules engine for processing timeseries, according to some exemplary embodiments.

FIG. 12 is a flow diagram of a process of generating work-order for a building asset with the rules engine of FIG. 11 by cross-correlating timeseries associated with the building asset, according to an exemplary embodiment.

DETAILED DESCRIPTION Overview

Referring generally to the FIGURES, systems and methods for timeseries based assurance services are shown, according to various exemplary embodiments. The assurance service can be configured to operate building assets, or instruct technicians to service building assets, in order to keep the building assets in compliance with one or more requirements. For example, requirements may be that the building asset operates for its intended purpose, meets various data privacy requirements, meets regulation codes, etc. The assurance service can be configured to generate the operations and/or instructions based on timeseries data generated based on the performance of the building asset. Building assets can be various different devices or systems of a building that operate within (or in association with) the building. For example, HVAC devices and systems, fire suppression devices and systems, as well as surveillance and security devices systems may be building assets.

The assurance service can be configured to utilize timeseries data to gain more detailed information on the performance of the building asset. More specifically, the assurance service can cross-correlate the performance timeseries against each other to determine the actions. In this regard, the assurance service can quickly and accurately identify improvements for the building asset. If a building asset spends a substantial amount of time being configured or serviced by a technician, this may have negative effects on a building. For example, a surveillance camera being serviced results in the loss of a camera feed during the service time, a thermostat being serviced may result in uncomfortable temperature conditions for a building while the thermostat is being serviced, etc.

The cross-correlation of timeseries data for a building asset allows the assurance service to generate actions that quickly resolve problems that the building asset has encountered and/or quickly implement improvements to the building asset. In some cases, the actions are carried out by a technician through a work-order based system. Based on the availability of technicians, it may be beneficial to dispatch a technician to a building only once or a minimum number of times. This may conserve the resources of the technician and allow the technician to visit a large number of sites if the technician only needs to service building assets a single time. The cross-correlation of the timeseries data for the building asset can result in actionable insights that are used to generate work-orders that efficiently utilize technician time due to their accuracy in identifying necessary actions to be performed on the building asset.

Furthermore, the cross-correlation of timeseries can result in low computational resource use of the assurance service. For example, because the assurance service can accurately identify actions to perform on the building asset, the assurance service only needs to process the timeseries data a single time (or only a low number of times) instead of making multiple sequential action determinations, each of which do not resolve the underlying problems of the building asset.

The cross-correlation of timeseries data can identify one or multiple events of one timeseries and identify how those events of one timeseries are related to one or multiple events of a second timeseries. In this regard, the assurance service can generate multiple different timeseries of the building asset monitoring different performance indicators of the building asset. For example, one performance timeseries may be a firmware version timeseries indicating the firmware of the building asset at multiple different times. Furthermore, another timeseries may be a health timeseries indicating the health of the building asset, e.g., a timeseries indicating of how frequent the building asset encounters a fault. In this regard, by cross-correlating the timeseries, changes in firmware version relating to device health can be identified to appropriate select software updates or other actions to perform on the building asset to improve the performance of the building asset.

Building HVAC Systems and Building Management Systems

Referring now to FIGS. 1-4, several building management systems (BMS) and HVAC systems in which the systems and methods of the present disclosure can be implemented are shown, according to some embodiments. In brief overview, FIG. 1 shows a building 10 equipped with a HVAC system 100. FIG. 2 is a block diagram of a waterside system 200 which can be used to serve building 10. FIG. 3 is a block diagram of an airside system 300 which can be used to serve building 10. FIG. 4 is a block diagram of a BMS which can be used to monitor and control building 10.

Building and HVAC System

Referring particularly to FIG. 1, a perspective view of a building 10 is shown. Building 10 is served by a BMS. A BMS is, in general, a system of devices configured to control, monitor, and manage equipment in or around a building or building area. A BMS can include, for example, a HVAC system, a security system, a lighting system, a fire alerting system, any other system that is capable of managing building functions or devices, or any combination thereof.

The BMS that serves building 10 includes a HVAC system 100. HVAC system 100 can include a plurality of HVAC devices (e.g., heaters, chillers, air handling units, pumps, fans, thermal energy storage, etc.) configured to provide heating, cooling, ventilation, or other services for building 10. For example, HVAC system 100 is shown to include a waterside system 120 and an airside system 130. Waterside system 120 may provide a heated or chilled fluid to an air handling unit of airside system 130. Airside system 130 may use the heated or chilled fluid to heat or cool an airflow provided to building 10. An exemplary waterside system and airside system which can be used in HVAC system 100 are described in greater detail with reference to FIGS. 2-3.

HVAC system 100 is shown to include a chiller 102, a boiler 104, and a rooftop air handling unit (AHU) 106. Waterside system 120 may use boiler 104 and chiller 102 to heat or cool a working fluid (e.g., water, glycol, etc.) and may circulate the working fluid to AHU 106. In various embodiments, the HVAC devices of waterside system 120 can be located in or around building 10 (as shown in FIG. 1) or at an offsite location such as a central plant (e.g., a chiller plant, a steam plant, a heat plant, etc.). The working fluid can be heated in boiler 104 or cooled in chiller 102, depending on whether heating or cooling is required in building 10. Boiler 104 may add heat to the circulated fluid, for example, by burning a combustible material (e.g., natural gas) or using an electric heating element. Chiller 102 may place the circulated fluid in a heat exchange relationship with another fluid (e.g., a refrigerant) in a heat exchanger (e.g., an evaporator) to absorb heat from the circulated fluid. The working fluid from chiller 102 and/or boiler 104 can be transported to AHU 106 via piping 108.

AHU 106 may place the working fluid in a heat exchange relationship with an airflow passing through AHU 106 (e.g., via one or more stages of cooling coils and/or heating coils). The airflow can be, for example, outside air, return air from within building 10, or a combination of both. AHU 106 may transfer heat between the airflow and the working fluid to provide heating or cooling for the airflow. For example, AHU 106 can include one or more fans or blowers configured to pass the airflow over or through a heat exchanger containing the working fluid. The working fluid may then return to chiller 102 or boiler 104 via piping 110.

Airside system 130 may deliver the airflow supplied by AHU 106 (i.e., the supply airflow) to building 10 via air supply ducts 112 and may provide return air from building 10 to AHU 106 via air return ducts 114. In some embodiments, airside system 130 includes multiple variable air volume (VAV) units 116. For example, airside system 130 is shown to include a separate VAV unit 116 on each floor or zone of building 10. VAV units 116 can include dampers or other flow control elements that can be operated to control an amount of the supply airflow provided to individual zones of building 10. In other embodiments, airside system 130 delivers the supply airflow into one or more zones of building 10 (e.g., via supply ducts 112) without using intermediate VAV units 116 or other flow control elements. AHU 106 can include various sensors (e.g., temperature sensors, pressure sensors, etc.) configured to measure attributes of the supply airflow. AHU 106 may receive input from sensors located within AHU 106 and/or within the building zone and may adjust the flow rate, temperature, or other attributes of the supply airflow through AHU 106 to achieve setpoint conditions for the building zone.

Waterside System

Referring now to FIG. 2, a block diagram of a waterside system 200 is shown, according to some embodiments. In various embodiments, waterside system 200 may supplement or replace waterside system 120 in HVAC system 100 or can be implemented separate from HVAC system 100. When implemented in HVAC system 100, waterside system 200 can include a subset of the HVAC devices in HVAC system 100 (e.g., boiler 104, chiller 102, pumps, valves, etc.) and may operate to supply a heated or chilled fluid to AHU 106. The HVAC devices of waterside system 200 can be located within building 10 (e.g., as components of waterside system 120) or at an offsite location such as a central plant.

In FIG. 2, waterside system 200 is shown as a central plant having a plurality of subplants 202-212. Subplants 202-212 are shown to include a heater subplant 202, a heat recovery chiller subplant 204, a chiller subplant 206, a cooling tower subplant 208, a hot thermal energy storage (TES) subplant 210, and a cold thermal energy storage (TES) subplant 212. Subplants 202-212 consume resources (e.g., water, natural gas, electricity, etc.) from utilities to serve thermal energy loads (e.g., hot water, cold water, heating, cooling, etc.) of a building or campus. For example, heater subplant 202 can be configured to heat water in a hot water loop 214 that circulates the hot water between heater subplant 202 and building 10. Chiller subplant 206 can be configured to chill water in a cold water loop 216 that circulates the cold water between chiller subplant 206 building 10. Heat recovery chiller subplant 204 can be configured to transfer heat from cold water loop 216 to hot water loop 214 to provide additional heating for the hot water and additional cooling for the cold water. Condenser water loop 218 may absorb heat from the cold water in chiller subplant 206 and reject the absorbed heat in cooling tower subplant 208 or transfer the absorbed heat to hot water loop 214. Hot TES subplant 210 and cold TES subplant 212 may store hot and cold thermal energy, respectively, for subsequent use.

Hot water loop 214 and cold water loop 216 may deliver the heated and/or chilled water to air handlers located on the rooftop of building 10 (e.g., AHU 106) or to individual floors or zones of building 10 (e.g., VAV units 116). The air handlers push air past heat exchangers (e.g., heating coils or cooling coils) through which the water flows to provide heating or cooling for the air. The heated or cooled air can be delivered to individual zones of building 10 to serve thermal energy loads of building 10. The water then returns to subplants 202-212 to receive further heating or cooling.

Although subplants 202-212 are shown and described as heating and cooling water for circulation to a building, it is understood that any other type of working fluid (e.g., glycol, CO2, etc.) can be used in place of or in addition to water to serve thermal energy loads. In other embodiments, subplants 202-212 may provide heating and/or cooling directly to the building or campus without requiring an intermediate heat transfer fluid. These and other variations to waterside system 200 are within the teachings of the present disclosure.

Each of subplants 202-212 can include a variety of equipment configured to facilitate the functions of the subplant. For example, heater subplant 202 is shown to include a plurality of heating elements 220 (e.g., boilers, electric heaters, etc.) configured to add heat to the hot water in hot water loop 214. Heater subplant 202 is also shown to include several pumps 222 and 224 configured to circulate the hot water in hot water loop 214 and to control the flow rate of the hot water through individual heating elements 220. Chiller subplant 206 is shown to include a plurality of chillers 232 configured to remove heat from the cold water in cold water loop 216. Chiller subplant 206 is also shown to include several pumps 234 and 236 configured to circulate the cold water in cold water loop 216 and to control the flow rate of the cold water through individual chillers 232.

Heat recovery chiller subplant 204 is shown to include a plurality of heat recovery heat exchangers 226 (e.g., refrigeration circuits) configured to transfer heat from cold water loop 216 to hot water loop 214. Heat recovery chiller subplant 204 is also shown to include several pumps 228 and 230 configured to circulate the hot water and/or cold water through heat recovery heat exchangers 226 and to control the flow rate of the water through individual heat recovery heat exchangers 226. Cooling tower subplant 208 is shown to include a plurality of cooling towers 238 configured to remove heat from the condenser water in condenser water loop 218. Cooling tower subplant 208 is also shown to include several pumps 240 configured to circulate the condenser water in condenser water loop 218 and to control the flow rate of the condenser water through individual cooling towers 238.

Hot TES subplant 210 is shown to include a hot TES tank 242 configured to store the hot water for later use. Hot TES subplant 210 may also include one or more pumps or valves configured to control the flow rate of the hot water into or out of hot TES tank 242. Cold TES subplant 212 is shown to include cold TES tanks 244 configured to store the cold water for later use. Cold TES subplant 212 may also include one or more pumps or valves configured to control the flow rate of the cold water into or out of cold TES tanks 244.

In some embodiments, one or more of the pumps in waterside system 200 (e.g., pumps 222, 224, 228, 230, 234, 236, and/or 240) or pipelines in waterside system 200 include an isolation valve associated therewith. Isolation valves can be integrated with the pumps or positioned upstream or downstream of the pumps to control the fluid flows in waterside system 200. In various embodiments, waterside system 200 can include more, fewer, or different types of devices and/or subplants based on the particular configuration of waterside system 200 and the types of loads served by waterside system 200.

Airside System

Referring now to FIG. 3, a block diagram of an airside system 300 is shown, according to some embodiments. In various embodiments, airside system 300 may supplement or replace airside system 130 in HVAC system 100 or can be implemented separate from HVAC system 100. When implemented in HVAC system 100, airside system 300 can include a subset of the HVAC devices in HVAC system 100 (e.g., AHU 106, VAV units 116, ducts 112-114, fans, dampers, etc.) and can be located in or around building 10. Airside system 300 may operate to heat or cool an airflow provided to building 10 using a heated or chilled fluid provided by waterside system 200.

In FIG. 3, airside system 300 is shown to include an economizer-type air handling unit (AHU) 302. Economizer-type AHUs vary the amount of outside air and return air used by the air handling unit for heating or cooling. For example, AHU 302 may receive return air 304 from building zone 306 via return air duct 308 and may deliver supply air 310 to building zone 306 via supply air duct 312. In some embodiments, AHU 302 is a rooftop unit located on the roof of building 10 (e.g., AHU 106 as shown in FIG. 1) or otherwise positioned to receive both return air 304 and outside air 314. AHU 302 can be configured to operate exhaust air damper 316, mixing damper 318, and outside air damper 320 to control an amount of outside air 314 and return air 304 that combine to form supply air 310. Any return air 304 that does not pass through mixing damper 318 can be exhausted from AHU 302 through exhaust damper 316 as exhaust air 322.

Each of dampers 316-320 can be operated by an actuator. For example, exhaust air damper 316 can be operated by actuator 324, mixing damper 318 can be operated by actuator 326, and outside air damper 320 can be operated by actuator 328. Actuators 324-328 may communicate with an AHU controller 330 via a communications link 332. Actuators 324-328 may receive control signals from AHU controller 330 and may provide feedback signals to AHU controller 330. Feedback signals can include, for example, an indication of a current actuator or damper position, an amount of torque or force exerted by the actuator, diagnostic information (e.g., results of diagnostic tests performed by actuators 324-328), status information, commissioning information, configuration settings, calibration data, and/or other types of information or data that can be collected, stored, or used by actuators 324-328. AHU controller 330 can be an economizer controller configured to use one or more control algorithms (e.g., state-based algorithms, extremum seeking control (ESC) algorithms, proportional-integral (PI) control algorithms, proportional-integral-derivative (PID) control algorithms, model predictive control (MPC) algorithms, feedback control algorithms, etc.) to control actuators 324-328.

Still referring to FIG. 3, AHU 302 is shown to include a cooling coil 334, a heating coil 336, and a fan 338 positioned within supply air duct 312. Fan 338 can be configured to force supply air 310 through cooling coil 334 and/or heating coil 336 and provide supply air 310 to building zone 306. AHU controller 330 may communicate with fan 338 via communications link 340 to control a flow rate of supply air 310. In some embodiments, AHU controller 330 controls an amount of heating or cooling applied to supply air 310 by modulating a speed of fan 338.

Cooling coil 334 may receive a chilled fluid from waterside system 200 (e.g., from cold water loop 216) via piping 342 and may return the chilled fluid to waterside system 200 via piping 344. Valve 346 can be positioned along piping 342 or piping 344 to control a flow rate of the chilled fluid through cooling coil 334. In some embodiments, cooling coil 334 includes multiple stages of cooling coils that can be independently activated and deactivated (e.g., by AHU controller 330, by BMS controller 366, etc.) to modulate an amount of cooling applied to supply air 310.

Heating coil 336 may receive a heated fluid from waterside system 200 (e.g., from hot water loop 214) via piping 348 and may return the heated fluid to waterside system 200 via piping 350. Valve 352 can be positioned along piping 348 or piping 350 to control a flow rate of the heated fluid through heating coil 336. In some embodiments, heating coil 336 includes multiple stages of heating coils that can be independently activated and deactivated (e.g., by AHU controller 330, by BMS controller 366, etc.) to modulate an amount of heating applied to supply air 310.

Each of valves 346 and 352 can be controlled by an actuator. For example, valve 346 can be controlled by actuator 354 and valve 352 can be controlled by actuator 356. Actuators 354-356 may communicate with AHU controller 330 via communications links 358-360. Actuators 354-356 may receive control signals from AHU controller 330 and may provide feedback signals to controller 330. In some embodiments, AHU controller 330 receives a measurement of the supply air temperature from a temperature sensor 362 positioned in supply air duct 312 (e.g., downstream of cooling coil 334 and/or heating coil 336). AHU controller 330 may also receive a measurement of the temperature of building zone 306 from a temperature sensor 364 located in building zone 306.

In some embodiments, AHU controller 330 operates valves 346 and 352 via actuators 354-356 to modulate an amount of heating or cooling provided to supply air 310 (e.g., to achieve a setpoint temperature for supply air 310 or to maintain the temperature of supply air 310 within a setpoint temperature range). The positions of valves 346 and 352 affect the amount of heating or cooling provided to supply air 310 by cooling coil 334 or heating coil 336 and may correlate with the amount of energy consumed to achieve a desired supply air temperature. AHU controller 330 may control the temperature of supply air 310 and/or building zone 306 by activating or deactivating coils 334-336, adjusting a speed of fan 338, or a combination of both.

Still referring to FIG. 3, airside system 300 is shown to include a building management system (BMS) controller 366 and a client device 368. BMS controller 366 can include one or more computer systems (e.g., servers, supervisory controllers, subsystem controllers, etc.) that serve as system level controllers, application or data servers, head nodes, or master controllers for airside system 300, waterside system 200, HVAC system 100, and/or other controllable systems that serve building 10. BMS controller 366 may communicate with multiple downstream building systems or subsystems (e.g., HVAC system 100, a security system, a lighting system, waterside system 200, etc.) via a communications link 370 according to like or disparate protocols (e.g., LON, BACnet, etc.). In various embodiments, AHU controller 330 and BMS controller 366 can be separate (as shown in FIG. 3) or integrated. In an integrated implementation, AHU controller 330 can be a software module configured for execution by a processor of BMS controller 366.

In some embodiments, AHU controller 330 receives information from BMS controller 366 (e.g., commands, setpoints, operating boundaries, etc.) and provides information to BMS controller 366 (e.g., temperature measurements, valve or actuator positions, operating statuses, diagnostics, etc.). For example, AHU controller 330 may provide BMS controller 366 with temperature measurements from temperature sensors 362-364, equipment on/off states, equipment operating capacities, and/or any other information that can be used by BMS controller 366 to monitor or control a variable state or condition within building zone 306.

Client device 368 can include one or more human-machine interfaces or client interfaces (e.g., graphical user interfaces, reporting interfaces, text-based computer interfaces, client-facing web services, web servers that provide pages to web clients, etc.) for controlling, viewing, or otherwise interacting with HVAC system 100, its subsystems, and/or devices. Client device 368 can be a computer workstation, a client terminal, a remote or local interface, or any other type of user interface device. Client device 368 can be a stationary terminal or a mobile device. For example, client device 368 can be a desktop computer, a computer server with a user interface, a laptop computer, a tablet, a smartphone, a PDA, or any other type of mobile or non-mobile device. Client device 368 may communicate with BMS controller 366 and/or AHU controller 330 via communications link 372.

Building Management System

Referring now to FIG. 4, a block diagram of a building management system (BMS) 400 is shown, according to some embodiments. BMS 400 can be implemented in building 10 to automatically monitor and control various building functions. BMS 400 is shown to include BMS controller 366 and a plurality of building subsystems 428. Building subsystems 428 are shown to include a building electrical subsystem 434, an information communication technology (ICT) subsystem 436, a security subsystem 438, a HVAC subsystem 440, a lighting subsystem 442, a lift/escalators subsystem 432, and a fire safety subsystem 430. In various embodiments, building subsystems 428 can include fewer, additional, or alternative subsystems. For example, building subsystems 428 may also or alternatively include a refrigeration subsystem, an advertising or signage subsystem, a cooking subsystem, a vending subsystem, a printer or copy service subsystem, or any other type of building subsystem that uses controllable equipment and/or sensors to monitor or control building 10. In some embodiments, building subsystems 428 include waterside system 200 and/or airside system 300, as described with reference to FIGS. 2-3.

Each of building subsystems 428 can include any number of devices, controllers, and connections for completing its individual functions and control activities. HVAC subsystem 440 can include many of the same components as HVAC system 100, as described with reference to FIGS. 1-3. For example, HVAC subsystem 440 can include a chiller, a boiler, any number of air handling units, economizers, field controllers, supervisory controllers, actuators, temperature sensors, and other devices for controlling the temperature, humidity, airflow, or other variable conditions within building 10. Lighting subsystem 442 can include any number of light fixtures, ballasts, lighting sensors, dimmers, or other devices configured to controllably adjust the amount of light provided to a building space. Security subsystem 438 can include occupancy sensors, video surveillance cameras, digital video recorders, video processing servers, intrusion detection devices, access control devices and servers, or other security-related devices.

Still referring to FIG. 4, BMS controller 366 is shown to include a communications interface 407 and a BMS interface 409. Interface 407 may facilitate communications between BMS controller 366 and external applications (e.g., monitoring and reporting applications 422, enterprise control applications 426, remote systems and applications 444, applications residing on client devices 448, etc.) for allowing user control, monitoring, and adjustment to BMS controller 366 and/or subsystems 428. Interface 407 may also facilitate communications between BMS controller 366 and client devices 448. BMS interface 409 may facilitate communications between BMS controller 366 and building subsystems 428 (e.g., HVAC, lighting security, lifts, power distribution, business, etc.).

Interfaces 407, 409 can be or include wired or wireless communications interfaces (e.g., jacks, antennas, transmitters, receivers, transceivers, wire terminals, etc.) for conducting data communications with building subsystems 428 or other external systems or devices. In various embodiments, communications via interfaces 407, 409 can be direct (e.g., local wired or wireless communications) or via a communications network 446 (e.g., a WAN, the Internet, a cellular network, etc.). For example, interfaces 407, 409 can include an Ethernet card and port for sending and receiving data via an Ethernet-based communications link or network. In another example, interfaces 407, 409 can include a Wi-Fi transceiver for communicating via a wireless communications network. In another example, one or both of interfaces 407, 409 can include cellular or mobile phone communications transceivers. In one embodiment, communications interface 407 is a power line communications interface and BMS interface 409 is an Ethernet interface. In other embodiments, both communications interface 407 and BMS interface 409 are Ethernet interfaces or are the same Ethernet interface.

Still referring to FIG. 4, BMS controller 366 is shown to include a processing circuit 404 including a processor 406 and memory 408. Processing circuit 404 can be communicably connected to BMS interface 409 and/or communications interface 407 such that processing circuit 404 and the various components thereof can send and receive data via interfaces 407, 409. Processor 406 can be implemented as a general purpose processor, an application specific integrated circuit (ASIC), one or more field programmable gate arrays (FPGAs), a group of processing components, or other suitable electronic processing components.

Memory 408 (e.g., memory, memory unit, storage device, etc.) can include one or more devices (e.g., RAM, ROM, Flash memory, hard disk storage, etc.) for storing data and/or computer code for completing or facilitating the various processes, layers and modules described in the present application. Memory 408 can be or include volatile memory or non-volatile memory. Memory 408 can include database components, object code components, script components, or any other type of information structure for supporting the various activities and information structures described in the present application. According to some embodiments, memory 408 is communicably connected to processor 406 via processing circuit 404 and includes computer code for executing (e.g., by processing circuit 404 and/or processor 406) one or more processes described herein.

In some embodiments, BMS controller 366 is implemented within a single computer (e.g., one server, one housing, etc.). In various other embodiments BMS controller 366 can be distributed across multiple servers or computers (e.g., that can exist in distributed locations). Further, while FIG. 4 shows applications 422 and 426 as existing outside of BMS controller 366, in some embodiments, applications 422 and 426 can be hosted within BMS controller 366 (e.g., within memory 408).

Still referring to FIG. 4, memory 408 is shown to include an enterprise integration layer 410, an automated measurement and validation (AM&V) layer 412, a demand response (DR) layer 414, a fault detection and diagnostics (FDD) layer 416, an integrated control layer 418, and a building subsystem integration later 420. Layers 410-420 can be configured to receive inputs from building subsystems 428 and other data sources, determine optimal control actions for building subsystems 428 based on the inputs, generate control signals based on the optimal control actions, and provide the generated control signals to building subsystems 428. The following paragraphs describe some of the general functions performed by each of layers 410-420 in BMS 400.

Enterprise integration layer 410 can be configured to serve clients or local applications with information and services to support a variety of enterprise-level applications. For example, enterprise control applications 426 can be configured to provide subsystem-spanning control to a graphical user interface (GUI) or to any number of enterprise-level business applications (e.g., accounting systems, user identification systems, etc.). Enterprise control applications 426 may also or alternatively be configured to provide configuration GUIs for configuring BMS controller 366. In yet other embodiments, enterprise control applications 426 can work with layers 410-420 to optimize building performance (e.g., efficiency, energy use, comfort, or safety) based on inputs received at interface 407 and/or BMS interface 409.

Building subsystem integration layer 420 can be configured to manage communications between BMS controller 366 and building subsystems 428. For example, building subsystem integration layer 420 may receive sensor data and input signals from building subsystems 428 and provide output data and control signals to building subsystems 428. Building subsystem integration layer 420 may also be configured to manage communications between building subsystems 428. Building subsystem integration layer 420 translates communications (e.g., sensor data, input signals, output signals, etc.) across a plurality of multi-vendor/multi-protocol systems.

Demand response layer 414 can be configured to optimize resource usage (e.g., electricity use, natural gas use, water use, etc.) and/or the monetary cost of such resource usage in response to satisfy the demand of building 10. The optimization can be based on time-of-use prices, curtailment signals, energy availability, or other data received from utility providers, distributed energy generation systems 424, from energy storage 427 (e.g., hot TES 242, cold TES 244, etc.), or from other sources. Demand response layer 414 may receive inputs from other layers of BMS controller 366 (e.g., building subsystem integration layer 420, integrated control layer 418, etc.). The inputs received from other layers can include environmental or sensor inputs such as temperature, carbon dioxide levels, relative humidity levels, air quality sensor outputs, occupancy sensor outputs, room schedules, and the like. The inputs may also include inputs such as electrical use (e.g., expressed in kWh), thermal load measurements, pricing information, projected pricing, smoothed pricing, curtailment signals from utilities, and the like.

According to some embodiments, demand response layer 414 includes control logic for responding to the data and signals it receives. These responses can include communicating with the control algorithms in integrated control layer 418, changing control strategies, changing setpoints, or activating/deactivating building equipment or subsystems in a controlled manner. Demand response layer 414 may also include control logic configured to determine when to utilize stored energy. For example, demand response layer 414 may determine to begin using energy from energy storage 427 just prior to the beginning of a peak use hour.

In some embodiments, demand response layer 414 includes a control module configured to actively initiate control actions (e.g., automatically changing setpoints) which minimize energy costs based on one or more inputs representative of or based on demand (e.g., price, a curtailment signal, a demand level, etc.). In some embodiments, demand response layer 414 uses equipment models to determine an optimal set of control actions. The equipment models can include, for example, thermodynamic models describing the inputs, outputs, and/or functions performed by various sets of building equipment. Equipment models may represent collections of building equipment (e.g., subplants, chiller arrays, etc.) or individual devices (e.g., individual chillers, heaters, pumps, etc.).

Demand response layer 414 may further include or draw upon one or more demand response policy definitions (e.g., databases, XML files, etc.). The policy definitions can be edited or adjusted by a user (e.g., via a graphical user interface) so that the control actions initiated in response to demand inputs can be tailored for the user's application, desired comfort level, particular building equipment, or based on other concerns. For example, the demand response policy definitions can specify which equipment can be turned on or off in response to particular demand inputs, how long a system or piece of equipment should be turned off, what setpoints can be changed, what the allowable set point adjustment range is, how long to hold a high demand setpoint before returning to a normally scheduled setpoint, how close to approach capacity limits, which equipment modes to utilize, the energy transfer rates (e.g., the maximum rate, an alarm rate, other rate boundary information, etc.) into and out of energy storage devices (e.g., thermal storage tanks, battery banks, etc.), and when to dispatch on-site generation of energy (e.g., via fuel cells, a motor generator set, etc.).

Integrated control layer 418 can be configured to use the data input or output of building subsystem integration layer 420 and/or demand response later 414 to make control decisions. Due to the subsystem integration provided by building subsystem integration layer 420, integrated control layer 418 can integrate control activities of the subsystems 428 such that the subsystems 428 behave as a single integrated supersystem. In some embodiments, integrated control layer 418 includes control logic that uses inputs and outputs from a plurality of building subsystems to provide greater comfort and energy savings relative to the comfort and energy savings that separate subsystems could provide alone. For example, integrated control layer 418 can be configured to use an input from a first subsystem to make an energy-saving control decision for a second subsystem. Results of these decisions can be communicated back to building subsystem integration layer 420.

Integrated control layer 418 is shown to be logically below demand response layer 414. Integrated control layer 418 can be configured to enhance the effectiveness of demand response layer 414 by enabling building subsystems 428 and their respective control loops to be controlled in coordination with demand response layer 414. This configuration may advantageously reduce disruptive demand response behavior relative to conventional systems. For example, integrated control layer 418 can be configured to assure that a demand response-driven upward adjustment to the setpoint for chilled water temperature (or another component that directly or indirectly affects temperature) does not result in an increase in fan energy (or other energy used to cool a space) that would result in greater total building energy use than was saved at the chiller.

Integrated control layer 418 can be configured to provide feedback to demand response layer 414 so that demand response layer 414 checks that constraints (e.g., temperature, lighting levels, etc.) are properly maintained even while demanded load shedding is in progress. The constraints may also include setpoint or sensed boundaries relating to safety, equipment operating limits and performance, comfort, fire codes, electrical codes, energy codes, and the like. Integrated control layer 418 is also logically below fault detection and diagnostics layer 416 and automated measurement and validation layer 412. Integrated control layer 418 can be configured to provide calculated inputs (e.g., aggregations) to these higher levels based on outputs from more than one building subsystem.

Automated measurement and validation (AM&V) layer 412 can be configured to verify that control strategies commanded by integrated control layer 418 or demand response layer 414 are working properly (e.g., using data aggregated by AM&V layer 412, integrated control layer 418, building subsystem integration layer 420, FDD layer 416, or otherwise). The calculations made by AM&V layer 412 can be based on building system energy models and/or equipment models for individual BMS devices or subsystems. For example, AM&V layer 412 may compare a model-predicted output with an actual output from building subsystems 428 to determine an accuracy of the model.

Fault detection and diagnostics (FDD) layer 416 can be configured to provide on-going fault detection for building subsystems 428, building subsystem devices (i.e., building equipment), and control algorithms used by demand response layer 414 and integrated control layer 418. FDD layer 416 may receive data inputs from integrated control layer 418, directly from one or more building subsystems or devices, or from another data source. FDD layer 416 may automatically diagnose and respond to detected faults. The responses to detected or diagnosed faults can include providing an alert message to a user, a maintenance scheduling system, or a control algorithm configured to attempt to repair the fault or to work-around the fault.

FDD layer 416 can be configured to output a specific identification of the faulty component or cause of the fault (e.g., loose damper linkage) using detailed subsystem inputs available at building subsystem integration layer 420. In other exemplary embodiments, FDD layer 416 is configured to provide “fault” events to integrated control layer 418 which executes control strategies and policies in response to the received fault events. According to some embodiments, FDD layer 416 (or a policy executed by an integrated control engine or business rules engine) may shut-down systems or direct control activities around faulty devices or systems to reduce energy waste, extend equipment life, or assure proper control response.

FDD layer 416 can be configured to store or access a variety of different system data stores (or data points for live data). FDD layer 416 may use some content of the data stores to identify faults at the equipment level (e.g., specific chiller, specific AHU, specific terminal unit, etc.) and other content to identify faults at component or subsystem levels. For example, building subsystems 428 may generate temporal (i.e., time-series) data indicating the performance of BMS 400 and the various components thereof. The data generated by building subsystems 428 can include measured or calculated values that exhibit statistical characteristics and provide information about how the corresponding system or process (e.g., a temperature control process, a flow control process, etc.) is performing in terms of error from its setpoint. These processes can be examined by FDD layer 416 to expose when the system begins to degrade in performance and alert a user to repair the fault before it becomes more severe.

Building Management System With Data Platform Services

Referring now to FIG. 5, a block diagram of another building management system (BMS) 500 is shown, according to some embodiments. BMS 500 can be configured to collect data samples from building subsystems 428 and generate raw timeseries data from the data samples. BMS 500 can process and transform the raw timeseries data using data platform services 520 to generate derived timeseries data. Throughout this disclosure, the term “derived timeseries data” is used to describe the result or output of a transformation or other timeseries processing operation performed by data platform services 520 (e.g., data aggregation, data cleansing, virtual point calculation, etc.). The derived timeseries data can be provided to various applications 530 and/or stored in local storage 514 or hosted storage 516 (e.g., as materialized views of the raw timeseries data). In some embodiments, BMS 500 separates data collection; data storage, retrieval, and analysis; and data visualization into three different layers. This allows BMS 500 to support a variety of applications 530 that use the derived timeseries data and allows new applications 530 to reuse the existing infrastructure provided by data platform services 520.

Before discussing BMS 500 in greater detail, it should be noted that the components of BMS 500 can be integrated within a single device (e.g., a supervisory controller, a BMS controller, etc.) or distributed across multiple separate systems or devices. For example, the components of BMS 500 can be implemented as part of a METASYS® brand building automation system, as sold by Johnson Controls Inc. In other embodiments, some or all of the components of BMS 500 can be implemented as part of a cloud-based computing system configured to receive and process data from one or more building management systems. In other embodiments, some or all of the components of BMS 500 can be components of a subsystem level controller (e.g., a HVAC controller), a subplant controller, a device controller (e.g., AHU controller 330, a chiller controller, etc.), a field controller, a computer workstation, a client device, or any other system or device that receives and processes data from building equipment.

BMS 500 can include many of the same components as BMS 400, as described with reference to FIG. 4. For example, BMS 500 is shown to include a BMS interface 502 and a communications interface 504. Interfaces 502-504 can include wired or wireless communications interfaces (e.g., jacks, antennas, transmitters, receivers, transceivers, wire terminals, etc.) for conducting data communications with building subsystems 428 or other external systems or devices. Communications conducted via interfaces 502-504 can be direct (e.g., local wired or wireless communications) or via a communications network 446 (e.g., a WAN, the Internet, a cellular network, etc.).

Communications interface 504 can facilitate communications between BMS 500 and external applications (e.g., remote systems and applications 444) for allowing user control, monitoring, and adjustment to BMS 500. Communications interface 504 can also facilitate communications between BMS 500 and client devices 448. BMS interface 502 can facilitate communications between BMS 500 and building subsystems 428. BMS 500 can be configured to communicate with building subsystems 428 using any of a variety of building automation systems protocols (e.g., BACnet, Modbus, ADX, etc.). In some embodiments, BMS 500 receives data samples from building subsystems 428 and provides control signals to building subsystems 428 via BMS interface 502.

Building subsystems 428 can include building electrical subsystem 434, information communication technology (ICT) subsystem 436, security subsystem 438, HVAC subsystem 440, lighting subsystem 442, lift/escalators subsystem 432, and/or fire safety subsystem 430, as described with reference to FIG. 4. In various embodiments, building subsystems 428 can include fewer, additional, or alternative subsystems. For example, building subsystems 428 can also or alternatively include a refrigeration subsystem, an advertising or signage subsystem, a cooking subsystem, a vending subsystem, a printer or copy service subsystem, or any other type of building subsystem that uses controllable equipment and/or sensors to monitor or control building 10. In some embodiments, building subsystems 428 include waterside system 200 and/or airside system 300, as described with reference to FIGS. 2-3. Each of building subsystems 428 can include any number of devices, controllers, and connections for completing its individual functions and control activities. Building subsystems 428 can include building equipment (e.g., sensors, air handling units, chillers, pumps, valves, etc.) configured to monitor and control a building condition such as temperature, humidity, airflow, etc.

Still referring to FIG. 5, BMS 500 is shown to include a processing circuit 506 including a processor 508 and memory 510. Processor 508 can be a general purpose or specific purpose processor, an application specific integrated circuit (ASIC), one or more field programmable gate arrays (FPGAs), a group of processing components, or other suitable processing components. Processor 508 is configured to execute computer code or instructions stored in memory 510 or received from other computer readable media (e.g., CDROM, network storage, a remote server, etc.).

Memory 510 can include one or more devices (e.g., memory units, memory devices, storage devices, etc.) for storing data and/or computer code for completing and/or facilitating the various processes described in the present disclosure. Memory 510 can include random access memory (RAM), read-only memory (ROM), hard drive storage, temporary storage, non-volatile memory, flash memory, optical memory, or any other suitable memory for storing software objects and/or computer instructions. Memory 510 can include database components, object code components, script components, or any other type of information structure for supporting the various activities and information structures described in the present disclosure. Memory 510 can be communicably connected to processor 508 via processing circuit 506 and can include computer code for executing (e.g., by processor 508) one or more processes described herein. When processor 508 executes instructions stored in memory 510, processor 508 generally configures processing circuit 506 to complete such activities.

Still referring to FIG. 5, BMS 500 is shown to include a data collector 512. Data collector 512 is shown receiving data samples from building subsystems 428 via BMS interface 502. In some embodiments, the data samples include data values for various data points. The data values can be measured or calculated values, depending on the type of data point. For example, a data point received from a temperature sensor can include a measured data value indicating a temperature measured by the temperature sensor. A data point received from a chiller controller can include a calculated data value indicating a calculated efficiency of the chiller. Data collector 512 can receive data samples from multiple different devices within building subsystems 428.

The data samples can include one or more attributes that describe or characterize the corresponding data points. For example, the data samples can include a name attribute defining a point name or ID (e.g., “B1F4R2.T-Z”), a device attribute indicating a type of device from which the data samples is received (e.g., temperature sensor, humidity sensor, chiller, etc.), a unit attribute defining a unit of measure associated with the data value (e.g., ° F., ° C., kPA, etc.), and/or any other attribute that describes the corresponding data point or provides contextual information regarding the data point. The types of attributes included in each data point can depend on the communications protocol used to send the data samples to BMS 500. For example, data samples received via the ADX protocol or BACnet protocol can include a variety of descriptive attributes along with the data value, whereas data samples received via the Modbus protocol may include a lesser number of attributes (e.g., only the data value without any corresponding attributes).

In some embodiments, each data sample is received with a timestamp indicating a time at which the corresponding data value was measured or calculated. In other embodiments, data collector 512 adds timestamps to the data samples based on the times at which the data samples are received. Data collector 512 can generate raw timeseries data for each of the data points for which data samples are received. Each timeseries can include a series of data values for the same data point and a timestamp for each of the data values. For example, a timeseries for a data point provided by a temperature sensor can include a series of temperature values measured by the temperature sensor and the corresponding times at which the temperature values were measured. An example of a timeseries which can be generated by data collector 512 is as follows:

[<key, timestamp₁, value₁>, <key, timestamp₂, value₂>, <key, timestamp₃, value₃>] where key is an identifier of the source of the raw data samples (e.g., timeseries ID, sensor ID, etc.), timestamp identifies the time at which the ith sample was collected, and value_(i) indicates the value of the ith sample.

Data collector 512 can add timestamps to the data samples or modify existing timestamps such that each data sample includes a local timestamp. Each local timestamp indicates the local time at which the corresponding data sample was measured or collected and can include an offset relative to universal time. The local timestamp indicates the local time at the location the data point was measured at the time of measurement. The offset indicates the difference between the local time and a universal time (e.g., the time at the international date line). For example, a data sample collected in a time zone that is six hours behind universal time can include a local timestamp (e.g., Timestamp=2016-03-18T14: 10: 02) and an offset indicating that the local timestamp is six hours behind universal time (e.g., Offset=−6:00). The offset can be adjusted (e.g., +1:00 or −1:00) depending on whether the time zone is in daylight savings time when the data sample is measured or collected.

The combination of the local timestamp and the offset provides a unique timestamp across daylight saving time boundaries. This allows an application using the timeseries data to display the timeseries data in local time without first converting from universal time. The combination of the local timestamp and the offset also provides enough information to convert the local timestamp to universal time without needing to look up a schedule of when daylight savings time occurs. For example, the offset can be subtracted from the local timestamp to generate a universal time value that corresponds to the local timestamp without referencing an external database and without requiring any other information.

In some embodiments, data collector 512 organizes the raw timeseries data. Data collector 512 can identify a system or device associated with each of the data points. For example, data collector 512 can associate a data point with a temperature sensor, an air handler, a chiller, or any other type of system or device. In various embodiments, data collector uses the name of the data point, a range of values of the data point, statistical characteristics of the data point, or other attributes of the data point to identify a particular system or device associated with the data point. Data collector 512 can then determine how that system or device relates to the other systems or devices in the building site. For example, data collector 512 can determine that the identified system or device is part of a larger system (e.g., a HVAC system) or serves a particular space (e.g., a particular building, a room or zone of the building, etc.). In some embodiments, data collector 512 uses or creates an entity graph when organizing the timeseries data.

Data collector 512 can provide the raw timeseries data to data platform services 520 and/or store the raw timeseries data in local storage 514 or hosted storage 516. As shown in FIG. 5, local storage 514 can be data storage internal to BMS 500 (e.g., within memory 510) or other on-site data storage local to the building site at which the data samples are collected. Hosted storage 516 can include a remote database, cloud-based data hosting, or other remote data storage. For example, hosted storage 516 can include remote data storage located off-site relative to the building site at which the data samples are collected. Local storage 514 and hosted storage 516 can be configured to store the raw timeseries data obtained by data collector 512, the derived timeseries data generated by data platform services 520, and/or directed acyclic graphs (DAGs) used by data platform services 520 to process the timeseries data.

Still referring to FIG. 5, BMS 500 is shown to include data platform services 520. Data platform services 520 can receive the raw timeseries data from data collector 512 and/or retrieve the raw timeseries data from local storage 514 or hosted storage 516. Data platform services 520 can include a variety of services configured to analyze, process, and transform the raw timeseries data. For example, data platform services 520 are shown to include a security service 522, an analytics service 524, an entity service 526, and a timeseries service 528. Security service 522 can assign security attributes to the raw timeseries data to ensure that the timeseries data are only accessible to authorized individuals, systems, or applications. Entity service 526 can assign entity information to the timeseries data to associate data points with a particular system, device, or space. Timeseries service 528 and analytics service 524 can apply various transformations, operations, or other functions to the raw timeseries data to generate derived timeseries data.

In some embodiments, timeseries service 528 aggregates predefined intervals of the raw timeseries data (e.g., quarter-hourly intervals, hourly intervals, daily intervals, monthly intervals, etc.) to generate new derived timeseries of the aggregated values. These derived timeseries can be referred to as “data rollups” since they are condensed versions of the raw timeseries data. The data rollups generated by timeseries service 528 provide an efficient mechanism for applications 530 to query the timeseries data. For example, applications 530 can construct visualizations of the timeseries data (e.g., charts, graphs, etc.) using the pre-aggregated data rollups instead of the raw timeseries data. This allows applications 530 to simply retrieve and present the pre-aggregated data rollups without requiring applications 530 to perform an aggregation in response to the query. Since the data rollups are pre-aggregated, applications 530 can present the data rollups quickly and efficiently without requiring additional processing at query time to generate aggregated timeseries values.

In some embodiments, timeseries service 528 calculates virtual points based on the raw timeseries data and/or the derived timeseries data. Virtual points can be calculated by applying any of a variety of mathematical operations (e.g., addition, subtraction, multiplication, division, etc.) or functions (e.g., average value, maximum value, minimum value, thermodynamic functions, linear functions, nonlinear functions, etc.) to the actual data points represented by the timeseries data. For example, timeseries service 528 can calculate a virtual data point (pointID₃) by adding two or more actual data points (pointID₁ and pointID₂) (e.g., pointID₃=pointID₁+pointID₂). As another example, timeseries service 528 can calculate an enthalpy data point (pointID₄) based on a measured temperature data point (pointID₅) and a measured pressure data point (pointID₆) (e.g., pointID₄=enthalpy(pointID₅, pointID₆)). The virtual data points can be stored as derived timeseries data.

Applications 530 can access and use the virtual data points in the same manner as the actual data points. Applications 530 do not need to know whether a data point is an actual data point or a virtual data point since both types of data points can be stored as derived timeseries data and can be handled in the same manner by applications 530. In some embodiments, the derived timeseries are stored with attributes designating each data point as either a virtual data point or an actual data point. Such attributes allow applications 530 to identify whether a given timeseries represents a virtual data point or an actual data point, even though both types of data points can be handled in the same manner by applications 530. These and other features of timeseries service 528 are described in greater detail with reference to FIG. 6.

In some embodiments, analytics service 524 analyzes the raw timeseries data and/or the derived timeseries data to detect faults. Analytics service 524 can apply a set of fault detection rules to the timeseries data to determine whether a fault is detected at each interval of the timeseries. Fault detections can be stored as derived timeseries data. For example, analytics service 524 can generate a new fault detection timeseries with data values that indicate whether a fault was detected at each interval of the timeseries. The fault detection timeseries can be stored as derived timeseries data along with the raw timeseries data in local storage 514 or hosted storage 516.

Still referring to FIG. 5, BMS 500 is shown to include several applications 530 including an energy management application 532, monitoring and reporting applications 534, and enterprise control applications 536. Although only a few applications 530 are shown, it is contemplated that applications 530 can include any of a variety of applications configured to use the derived timeseries generated by data platform services 520. In some embodiments, applications 530 exist as a separate layer of BMS 500 (i.e., separate from data platform services 520 and data collector 512). This allows applications 530 to be isolated from the details of how the derived timeseries are generated. In other embodiments, applications 530 can exist as remote applications that run on remote systems or devices (e.g., remote systems and applications 444, client devices 448).

Applications 530 can use the derived timeseries data to perform a variety data visualization, monitoring, and/or control activities. For example, energy management application 532 and monitoring and reporting application 534 can use the derived timeseries data to generate user interfaces (e.g., charts, graphs, etc.) that present the derived timeseries data to a user. In some embodiments, the user interfaces present the raw timeseries data and the derived data rollups in a single chart or graph. For example, a dropdown selector can be provided to allow a user to select the raw timeseries data or any of the data rollups for a given data point. Several examples of user interfaces that can be generated based on the derived timeseries data are described in U.S. patent application Ser. No. 15/182,579 filed Jun. 14, 2016, and U.S. Provisional Patent Application No. 62/446,284 filed Jan. 13, 2017. The entire disclosures of both these patent applications are incorporated by reference herein.

Enterprise control application 536 can use the derived timeseries data to perform various control activities. For example, enterprise control application 536 can use the derived timeseries data as input to a control algorithm (e.g., a state-based algorithm, an extremum seeking control (ESC) algorithm, a proportional-integral (PI) control algorithm, a proportional-integral-derivative (PID) control algorithm, a model predictive control (MPC) algorithm, a feedback control algorithm, etc.) to generate control signals for building subsystems 428. In some embodiments, building subsystems 428 use the control signals to operate building equipment. Operating the building equipment can affect the measured or calculated values of the data samples provided to BMS 500. Accordingly, enterprise control application 536 can use the derived timeseries data as feedback to control the systems and devices of building subsystems 428.

Timeseries Data Platform Service

Referring now to FIG. 6, a block diagram illustrating timeseries service 528 in greater detail is shown, according to some embodiments. Timeseries service 528 is shown to include a timeseries web service 602, an events service 603, a timeseries processing engine 604, and a timeseries storage interface 616. Timeseries web service 602 can be configured to interact with web-based applications to send and/or receive timeseries data. In some embodiments, timeseries web service 602 provides timeseries data to web-based applications. For example, if one or more of applications 530 are web-based applications, timeseries web service 602 can provide derived timeseries data and raw timeseries data to the web-based applications. In some embodiments, timeseries web service 602 receives raw timeseries data from a web-based data collector. For example, if data collector 512 is a web-based application, timeseries web service 602 can receive data samples or raw timeseries data from data collector 512.

Timeseries storage interface 616 can be configured to store and read samples of various timeseries (e.g., raw timeseries data and derived timeseries data) and eventseries (described in greater detail below). Timeseries storage interface 616 can interact with local storage 514 and/or hosted storage 516. For example, timeseries storage interface 616 can retrieve timeseries data from a local timeseries database 628 within local storage 514 or from a hosted timeseries database 636 within hosted storage 516. In some embodiments, timeseries storage interface 616 reads samples from a specified start time or start position in the timeseries to a specified stop time or a stop position in the timeseries. Similarly, timeseries storage interface 616 can retrieve eventseries data from a local eventseries database 629 within local storage 514 or from a hosted eventseries database 637 within hosted storage 516. Timeseries storage interface 616 can also store timeseries data in local timeseries database 628 or hosted timeseries database 636 and can store eventseries data in local eventseries database 629 or hosted eventseries database 637. Advantageously, timeseries storage interface 616 provides a consistent interface which enables logical data independence.

In some embodiments, timeseries storage interface 616 stores timeseries as lists of data samples, organized by time. For example, timeseries storage interface 616 can store timeseries in the following format:

-   [<key, timestamp₁,value₁>, <key, timestamp₂, value₂>, <key,     timestamp₃, value₃>]     where key is an identifier of the source of the data samples (e.g.,     timeseries ID, sensor ID, etc.), timestamp_(i) identifies a time     associated with the ith sample, and value_(i) indicates the value of     the ith sample.

In some embodiments, timeseries storage interface 616 stores eventseries as lists of events having a start time, an end time, and a state. For example, timeseries storage interface 616 can store eventseries in the following format:

-   -   [<eventID₁, start_timestamp₁, end_timestamp₁, state₁>, . . . ,         <eventID_(N), start_timestamp_(N), end_timestamp_(N),         state_(N)>]         where eventID_(i) is an identifier of the ith event,         start_timestamp_(i) is the time at which the ith event started,         end_timestamp_(i) is the time at which the ith event ended,         state describes a state or condition associated with the ith         event (e.g., cold, hot, warm, etc.), and N is the total number         of events in the eventseries.

In some embodiments, timeseries storage interface 616 stores timeseries and eventseries in a tabular format. Timeseries storage interface 616 can store timeseries and eventseries in various tables having a column for each attribute of the timeseries/eventseries samples (e.g., key, timestamp, value). The timeseries tables can be stored in local timeseries database 628 and/or hosted timeseries database 636, whereas the eventseries tables can be stored in local eventseries database 629 and/or hosted eventseries database 637. In some embodiments, timeseries storage interface 616 caches older data to local storage 514 or hosted storage 516 but stores newer data in RAM. This may improve read performance when the newer data are requested for processing.

In some embodiments, timeseries storage interface 616 omits one or more of the attributes when storing the timeseries samples. For example, timeseries storage interface 616 may not need to repeatedly store the key or timeseries ID for each sample in the timeseries. In some embodiments, timeseries storage interface 616 omits timestamps from one or more of the samples. If samples of a particular timeseries have timestamps at regular intervals (e.g., one sample each minute), timeseries storage interface 616 can organize the samples by timestamps and store the values of the samples in a row. The timestamp of the first sample can be stored along with the interval between the timestamps. Timeseries storage interface 616 can determine the timestamp of any sample in the row based on the timestamp of the first sample and the position of the sample in the row.

In some embodiments, timeseries storage interface 616 stores one or more samples with an attribute indicating a change in value relative to the previous sample value. The change in value can replace the actual value of the sample when the sample is stored in local timeseries database 628 or hosted timeseries database 636. This allows timeseries storage interface 616 to use fewer bits when storing samples and their corresponding values. Timeseries storage interface 616 can determine the value of any sample based on the value of the first sample and the change in value of each successive sample.

In some embodiments, timeseries storage interface 616 creates containers or data objects in which samples of timeseries data and/or eventseries data can be stored. The containers can be JSON objects or other types of containers configured to store one or more timeseries samples and/or eventseries samples. Timeseries storage interface 616 can be configured to add samples to the containers and read samples from the containers. For example, timeseries storage interface 616 can receive a set of samples from data collector 512, timeseries web service 602, events service 603, and/or timeseries processing engine 604. Timeseries storage interface 616 can add the set of samples to a container and send the container to local storage 514 or hosted storage 516.

Timeseries storage interface 616 can use containers when reading samples from local storage 514 or hosted storage 516. For example, timeseries storage interface 616 can retrieve a set of samples from local storage 514 or hosted storage 516 and add the samples to a container. In some embodiments, the set of samples include all samples within a specified time period (e.g., samples with timestamps in the specified time period) or eventseries samples having a specified state. Timeseries storage interface 616 can provide the container of samples to timeseries web service 602, events service 603, timeseries processing engine 604, applications 530, and/or other components configured to use the timeseries/eventseries samples.

Still referring to FIG. 6, timeseries processing engine 604 is shown to include several timeseries operators 606. Timeseries operators 606 can be configured to apply various operations, transformations, or functions to one or more input timeseries to generate output timeseries and/or eventseries. The input timeseries can include raw timeseries data and/or derived timeseries data. Timeseries operators 606 can be configured to calculate aggregate values, averages, or apply other mathematical operations to the input timeseries. In some embodiments, timeseries operators 606 generate virtual point timeseries by combining two or more input timeseries (e.g., adding the timeseries together), creating multiple output timeseries from a single input timeseries, or applying mathematical operations to the input timeseries. In some embodiments, timeseries operators 606 perform data cleansing operations or deduplication operations on an input timeseries. In some embodiments, timeseries operators 606 use the input timeseries to generate eventseries based on the values of the timeseries samples. The output timeseries can be stored as derived timeseries data in local storage 514 and/or hosted storage 516. Similarly, the eventseries can be stored as eventseries data in local storage 514 and/or hosted storage 516.

In some embodiments, timeseries operators 606 do not change or replace the raw timeseries data, but rather generate various “views” of the raw timeseries data. The views can be queried in the same manner as the raw timeseries data. For example, samples can be read from the raw timeseries data, transformed to create the view, and then provided as an output. Because the transformations used to create the views can be computationally expensive, the views can be stored as “materialized views” in local timeseries database 628 or hosted timeseries database 636. These materialized views are referred to as derived timeseries data throughout the present disclosure.

Timeseries operators 606 can be configured to run at query time (e.g., when a request for derived timeseries data is received) or prior to query time (e.g., when new raw data samples are received, in response to a defined event or trigger, etc.). This flexibility allows timeseries operators 606 to perform some or all of their operations ahead of time and/or in response to a request for specific derived data timeseries. For example, timeseries operators 606 can be configured to pre-process one or more timeseries that are read frequently to ensure that the timeseries are updated whenever new data samples are received. However, timeseries operators 606 can be configured to wait until query time to process one or more timeseries that are read infrequently to avoid performing unnecessary processing operations.

In some embodiments, timeseries operators 606 are triggered in a particular sequence defined by a directed acyclic graph (DAG). The DAG may define a workflow or sequence of operations or transformations to apply to one or more input timeseries. For example, the DAG for a raw data timeseries may include a data cleansing operation, an aggregation operation, and a summation operation (e.g., adding two raw data timeseries to create a virtual point timeseries). The DAGs can be stored in a local DAG database 630 within local storage 514, in a hosted DAG database 638 within hosted storage 516, or internally within timeseries processing engine 604. DAGs can be retrieved by workflow manager 622 and used to determine how and when to process incoming data samples. Exemplary systems and methods for creating and using DAGs are described in greater detail below.

Timeseries operators 606 can perform aggregations for dashboards, cleansing operations, logical operations for rules and fault detection, machine learning predictions or classifications, call out to external services, or any of a variety of other operations which can be applied to timeseries data. The operations performed by timeseries operators 606 are not limited to sensor data. Timeseries operators 606 can also operate on event data or function as a billing engine for a consumption or tariff-based billing system.

Timeseries operators 606 are shown to include a sample aggregator 608, a virtual point calculator 610, a weather point calculator 612, a fault detector 614, and an eventseries generator 615. In some embodiments, timeseries operators 606 are configured to perform some or all of the functions described in U.S. Provisional Patent Application No. 62/457,654 filed Feb. 10, 2017, U.S. patent application Ser. No. 15/644,519 filed Jul. 7, 2017, U.S. patent application Ser. No. 15/644,560 filed Jul. 7, 2017, and/or U.S. patent application Ser. No. 15/644,581 filed Jul. 7, 2017. The entire disclosure of each of these patent applications is incorporated by reference herein.

Still referring to FIG. 6, timeseries processing engine 604 is shown to include a DAG optimizer 618. DAG optimizer 618 can be configured to combine multiple DAGs or multiple steps of a DAG to improve the efficiency of the operations performed by timeseries operators 606. For example, suppose that a DAG has one functional block which adds “Timeseries A” and “Timeseries B” to create “Timeseries C” (i.e., A+B=C) and another functional block which adds “Timeseries C” and “Timeseries D” to create “Timeseries E” (i.e., C+D=E). DAG optimizer 618 can combine these two functional blocks into a single functional block which computes “Timeseries E” directly from “Timeseries A,” “Timeseries B,” and “Timeseries D” (i.e., E=A+B+D). Alternatively, both “Timeseries C” and “Timeseries E” can be computed in the same functional block to reduce the number of independent operations required to process the DAG.

In some embodiments, DAG optimizer 618 combines DAGs or steps of a DAG in response to a determination that multiple DAGs or steps of a DAG will use similar or shared inputs (e.g., one or more of the same input timeseries). This allows the inputs to be retrieved and loaded once rather than performing two separate operations that both load the same inputs. In some embodiments, DAG optimizer 618 schedules timeseries operators 606 to nodes where data is resident in memory in order to further reduce the amount of data required to be loaded from timeseries databases 628 and 636.

Timeseries processing engine 604 is shown to include a directed acyclic graph (DAG) generator 620. DAG generator 620 can be configured to generate one or more DAGs for each raw data timeseries. Each DAG may define a workflow or sequence of operations which can be performed by timeseries operators 606 on the raw data timeseries. When new samples of the raw data timeseries are received, workflow manager 622 can retrieve the corresponding DAG and use the DAG to determine how the raw data timeseries should be processed. In some embodiments, the DAGs are declarative views which represent the sequence of operations applied to each raw data timeseries. The DAGs may be designed for timeseries rather than structured query language (SQL).

In some embodiments, DAGs apply over windows of time. For example, the timeseries processing operations defined by a DAG may include a data aggregation operation that aggregates a plurality of raw data samples having timestamps within a given time window. The start time and end time of the time window may be defined by the DAG and the timeseries to which the DAG is applied. The DAG may define the duration of the time window over which the data aggregation operation will be performed. For example, the DAG may define the aggregation operation as an hourly aggregation (i.e., to produce an hourly data rollup timeseries), a daily aggregation (i.e., to produce a daily data rollup timeseries), a weekly aggregation (i.e., to produce a weekly data rollup timeseries), or any other aggregation duration. The position of the time window (e.g., a specific day, a specific week, etc.) over which the aggregation is performed may be defined by the timestamps of the data samples of timeseries provided as an input to the DAG.

In operation, sample aggregator 608 can use the DAG to identify the duration of the time window (e.g., an hour, a day, a week, etc.) over which the data aggregation operation will be performed. Sample aggregator 608 can use the timestamps of the data samples in the timeseries provided as an input to the DAG to identify the location of the time window (i.e., the start time and the end time). Sample aggregator 608 can set the start time and end time of the time window such that the time window has the identified duration and includes the timestamps of the data samples. In some embodiments, the time windows are fixed, having predefined start times and end times (e.g., the beginning and end of each hour, day, week, etc.). In other embodiments, the time windows may be sliding time windows, having start times and end times that depend on the timestamps of the data samples in the input timeseries.

Identity Management Using Smart Entities

Referring now to FIG. 7, a block diagram of an identity management system 700 is shown, according to an exemplary embodiment. Identity management system 700 is shown to include an identity management service 702 and an entity service 730. In some embodiments, identity management service 702 and entity service 730 are types of data platform services 520 within building management system 500. In some embodiments, identity management service 702 and entity service 730 include some or all of the features and/or functionality of the data platform described in U.S. Provisional Patent Application No. 62/564,247 filed Sep. 27, 2017, the entire disclosure of which is incorporated by reference herein. Identity management service 702 can be configured to perform various identity management functions. For example, identity management service 702 is shown to include an identity correlation module 704, an identity recognition module 706, an identity verification module 708, an identity syndication module 710, an identity consolidation module 712, a real-time decision making module 714, an identity analytics module 716, and an identity learning module 718. In various implementations, identity management service 702 can include fewer, additional, or different modules than illustrated in FIG. 7.

Entity service 730 may be the same as or similar to entity service 526 shown in FIG. 5. Entity service 730 can be configured to generate and manage a plurality of interconnected smart entities and store the smart entities in entity database 734. The smart entities may include object entities representing a plurality of people or physical devices and data entities representing data associated with the people or physical devices. The smart entities may be interconnected by relational objects indicating relationships between the object entities and the data entities. In some embodiments, each of the object entities includes a plurality of stored identity attributes. In some embodiments, entity service 730 performs some or all of the smart entity creation and management functions described in detail in U.S. Provisional Patent Application No. 62/611,974 filed Dec. 29, 2017, and U.S. Provisional Patent Application No. 62/611,984 filed Dec. 29, 2017, the entire disclosures of which are incorporated by reference herein.

Modules 704-718 can be configured to receive and consolidate identity attributes to generate an entity representing a person (i.e., person entity 732). In some embodiments, person entity 732 is a type of object entity stored in entity database 734. The identity attributes can be received from various systems or devices including, for example, a mobile device 720, an information technology (IT) system 722, internet of things (IoT) sensors 724, building equipment 726, and a security system 728. Identity attributes from mobile device 720 may include a mobile device ID (e.g., a MAC address, a Wi-Fi address, a device serial number, etc.), biometric attributes collected by mobile device 720 (e.g., a fingerprint, a voice print, an iris scan, a face scan, etc.), data from mobile device 720 uniquely identifying a user (e.g., a login identity to which the user has authenticated on the mobile device, such as a logged-in identity from an application or website/web portal), or other attributes uniquely identifying a particular mobile device or user associated with a mobile device. Identity attributes from IT system 722 may include a person's username, password, access privileges, human resources ID, directory ID, telephone number, office location, role, authorized areas, or other attributes associated with a particular user profile managed by IT system 722. Identity attributes from sensors such as IoT sensors 724 may include images/video from cameras, data from biometric sensors, data collected by wearable devices (e.g., skin temperature, heartbeat, movement, etc.) or other attributes that are associated with a user and may be used, alone or in combination with other attributes, to confirm the identity of the user. Identity attributes from building equipment 726 and security system 728 may include a card ID, a fingerprint, a face scan, an iris scan, images/video from cameras, or other types of identifying information. In some embodiments, some or all of the attributes are stored in an encrypted form to prevent access of private attributes by unauthorized parties/systems. In some such embodiments, the system does not allow for access of the attributes by external systems, but rather receives queries including data to be compared with the stored attributes and responds to the queries with response messages (e.g., indicating whether or not the data received with the queries matches the stored data, whether access should be granted or denied, etc.).

Identity management service 702 can consolidate and write identity attributes to person entity 732 to create a single entity (e.g., a data object or object entity) that includes all of the identity attributes associated with a particular person. Person entity 732 can be stored in an entity database 734 and accessed by identity management service 702 to perform various identity management functions such as identity recognition, real-time decision making (e.g., access control), identity analytics, and identity learning. Advantageously, person entity 732 is a smart entity that contains all of the identity attributes associated with a person regardless of the system or device from which the identity attributes were collected. This allows identity management service 702 to perform a variety of different identity management functions using only the information contained within person entity 732. Several examples of the functions performed by identity management service 702 are described in detail below.

In some embodiments, identity management service 702 uses person entity 732 and the identity attributes contained therein to recognize, verify, and/or authenticate a person's identity. For example, security system 728 can request authorization from identity management service 702 in response to a person scanning an access card at a card reader of security system 728. Security system 728 can read a card ID from the access card and provide the card ID to identity management service 702. Identity management service 702 can use the card ID to identify a particular person entity 732 that contains a card ID attribute matching the card ID received from security system 728. Identity management service 702 can read other attributes of person entity 732 to identify the person's authorization, access privileges, role, and the like. If the person is authorized to access a particular space associated with the card reader, identity management service 702 can send an “allow access” signal to security system 728 to allow the person to access the building space. Conversely, if the person is not authorized to access the space associated with the card reader, identity management service 702 can send a “deny access” signal to security system 728 to deny the person access to the building space.

In some embodiments, identity management service 702 uses multiple identity attributes of person entity 732 to perform multifactor authentication or identity verification. For example, identity management service 702 can receive a first identity attribute from one of mobile device 720, IT system 722, IoT sensors 724, building equipment 726, or security system 728. The first identity attribute can be any of the identity attributes stored in person entity 732 (e.g., name, role, employee ID, card ID, username, password, etc.). Identity management service 702 can use the first identity attribute to identify a particular person entity 732 that contains the first identity attribute. Identity management service 702 can then read a second identity attribute from person entity 732. The second identity attribute can be any of the identity attributes stored in person entity 732 (other than the first identity attribute).

Identity management service 702 can compare the second identity attribute with data obtained from one or more of mobile device 720, IT system 722, IoT sensors 724, building equipment 726, or security system 728 to determine whether the second identity attribute is also satisfied. In various embodiments, the second identity attribute can be collected automatically or provided by the person in response a prompt from identity management service 702. For example, if the first identity attribute is a card ID received from a card reader at a particular location within a building, the second identity attribute may be an image of a person collected by a camera at the same location as the card reader or a mobile device ID broadcast by a mobile device at the same location as the card reader. If the second identity attribute is also satisfied (i.e., the second identity attribute matches an identity attribute in the same person entity 732 as the first identity attribute), identity management service 702 may allow access or report a successful identity verification or authorization.

In some embodiments, identity management service 702 uses the identity attributes stored in person entity 732 to automatically grant a person access to a system, device, or space within a building without requiring the person to actively scan an ID card or enter a username or password. For example, identity management service 702 can track the locations of people within a building using location data reported by mobile devices 720 carried by the people, IoT sensor data provided by IoT sensors 724, and/or camera data from security system 728. Several examples of systems and methods for determining the locations of people within a building are described in detail in U.S. patent application Ser. No. 14/263,639 filed Apr. 28, 2014, the entire disclosure of which is incorporated by reference herein.

Identity management service 702 can use the identity attributes stored in person entity 732 to determine the authorization of each person. For example, person entity 732 may identify one or more building spaces (e.g., floors, rooms, zones, etc.), systems (e.g., HVAC systems, security systems, lighting systems, etc.), or devices (e.g., HVAC devices, lighting devices, card readers, etc.) that the person is authorized to access. In some embodiments, person entity 732 identifies the person's role (e.g., service technician, office administrator, nurse, etc.) and identity management service 702 automatically determines the person's authorization based on the identified role.

Identity management service 702 can use the location information for a person in the building to determine whether the person is approaching an access point (e.g., a door, entrance, exit, etc.). If the identity attributes in the corresponding person entity 732 for that person indicate that the person is authorized to pass through the access point, identity management service 702 can automatically open or unlock the access point to allow the person access without requiring the person to scan an ID card or enter a key code at the access point. In some embodiments, identity management service 702 automatically opens or unlocks the access point before the person reaches the access point (e.g., while the user is approaching the access point) to prevent any delay upon reaching the access point.

Similarly, identity management service 702 can use the location information for a person in the building to determine whether the person is located at a computer workstation, IT system, a particular device of building equipment, or other IT access point. If the identity attributes in the corresponding person entity 732 for that person indicate that the person is authorized to access a system or device via the IT access point, identity management service 702 can automatically login the person or provide access to the building equipment to allow access without requiring the person to enter a username, password, or other login credential. In some embodiments, identity management service 702 automatically logs the person into the IT access point before the person reaches the IT access point (e.g., while the user is approaching the IT access point) to prevent any delay upon reaching the IT access point.

In some embodiments, identity management service 702 uses multifactor authentication to verify the person's identity before allowing access. For example, identity management service 702 can collect two or more identity attributes from mobile device 720, IT system 722, IoT sensors 724, building equipment 726, or security system 728 at the location of a person. If all of the identity attributes match the same person entity 732, identity management service 702 can confirm that the person's identity has been verified using multiple identity attributes. Identity management service 702 can then automatically open or unlock a physical access point or provide access to an IT access point upon successful multifactor authentication or verification. In some embodiments, identity management service 702 may utilize attributes from two separate systems to increase security (e.g., one data item from mobile device 720 and another item from building equipment 726 or security system 728). This may help prevent against unauthorized access in the event the security of one of the devices is compromised.

Assurance Services

Referring now to FIG. 8, a block diagram of an assurance service 800 is shown, according to an exemplary embodiment. In some embodiments, assurance service 800 is one of data platform services 520 within building management system 500. In some embodiments, assurance service 800 includes some or all of the features and/or functionality of the data platform described in U.S. Patent Application No. 62/564,247 filed Sep. 27, 2017, the entire disclosure of which is incorporated by reference herein. Assurance service 800 can be configured to perform device health monitoring and on-demand, offline, and online asset management through IoT technologies. Assurance service 800 is shown to include an identity and security service 802, a device management service 804, a transportation and messaging service 806, a device shadow/manifest service 808, a package service 810, an asset and backup service 812, a manual upload service 814, assurance widgets 816, and an assurance agent 818.

Identity and security service 802 can be configured to ensure that each device of building equipment 726 and user has the ability to access configuration backups. For example, identity and security service 802 can monitor identity and authorization attributes associated with each user and with each device of building equipment 726 and can determine whether the set of identity and authorization attributes are sufficient to access configuration backups. Identity and security service 802 can also ensure that each user has the ability to command building equipment 726. In some embodiments, identity and security service 802 includes some or all of the features or functionality of identity management service 702, as described with reference to FIG. 7.

Device management service 804 can perform secure device registration. For example, device management service 804 can communicate with building equipment 726 installed at a customer site to register each device of building equipment 726 with data platform services 520. In some embodiments, the device registration performed by device management service 804 is the same as or similar to the device registration described in U.S. patent application Ser. No. 15/639,880 filed Jun. 30, 2017, the entire disclosure of which is incorporated by reference herein. For example, device management service 804 can be configured to create a virtual representation of each device of building equipment 726 within data platform services 520. In some embodiments, the virtual device representations are smart entities that include attributes characterizing the corresponding physical devices of building equipment 726. Device management service 804 can associate each device of building equipment 726 with a particular customer, department, and/or user. Device management service 804 can send and request firmware updates on-demand when building equipment 726 are connected.

Transportation and messaging service 806 can be configured to facilitate bidirectional communications between assurance service and building equipment 726 installed at a customer site. In some embodiments, transportation and messaging service 806 provides real-time alarm and event messaging. For example, transportation and messaging service 806 can provide alarms or events from building equipment 726 to data platform services 520 in real time. Transportation and messaging service 806 can also provide real-time command and control functionality for building equipment 726. For example, transportation and messaging service 806 can provide commands and control signals from applications 530 or data platform services 520 to building equipment 726 in real-time. In some embodiments, transportation and messaging service 806 is configured to discover building equipment 726 and request firmware upgrades for building equipment 726.

Device shadow/manifest service 808 can be configured to synchronize configuration settings, parameters, and other device-specific information between building equipment 726 and data platform services 520. In some embodiments, the synchronization occurs asynchronously. Device shadow/manifest service 808 can be configured to manage device properties dynamically. The device properties, configuration settings, parameters, and other device-specific information can be synchronized between building equipment 726 and the smart entities created by and stored within data platform services 520. In some embodiments, device shadow/manifest service 808 is configured to monitor the health of building equipment 726 and perform on-demand, online, or offline asset management through IoT technologies.

In some embodiments, device shadow/manifest service 808 is configured to manage a manifest for each device of building equipment 726. The manifest may include a set of relationships between building equipment 726 and various entities and/or the various entities and other entities. Further, the manifest may indicate a set of entitlements for the device of building equipment 726 and/or entitlements of the various entities and/or other entities. The set of entitlements may allow a device of building equipment 726 and/or a user of the device to perform certain actions with building equipment 726 such as adjusting a temperature setpoint, turning a connected system on and/or off, running certain pieces of software, requesting software updates, etc. In some embodiments, the entity is at least one of a group (e.g., a technician group, a home residents group, a guest group, a building manager group, etc.), a user (e.g., Technician Bill, Dad, User A, User B, etc.), and a device (Mobile Device 1, Smartphone A, Computer 4, Actuator 9, etc.).

Package service 810 can be configured to identify software releases published by a developer or vendor of building equipment 726. For example, package service 810 can monitor a remote system or server for new versions of software for building equipment 726. When a new software version is available, package service 810 may generate an alert or notification. In some embodiments, package service 810 compares the installed version of software on building equipment 726 with the version of software available at the remote system or server to determine whether the software version is new relative to the installed version. In some embodiments, package service 810 can push the configurations of building equipment 726 as a compressed data object that will be stored reliably and securely at data platform services 520.

In some embodiments, package service 810 is configured to install, backup, and restore device configurations, device parameters, device software, or other adjustable parameters of building equipment 726. For example, package service 810 can perform on-demand, offline, and online backups of device configurations and released software packages. Package service 810 can perform remote provisioning of building equipment 726 and can perform version control for backup configurations and software. Package service 810 can handle ownership and replacement of each device of building equipment 726 with new devices.

Asset and backup service 812 can be configured to connect to applications 530 to facilitate communication between assurance service 800 and applications 530. For example, asset and backup service 812 can interface with monitoring and reporting service 534 to generate and present a user interface that lists all of the assets (i.e., devices of building equipment 726) installed at a customer site or facility. In some embodiments, the user interface identifies each asset and indicates whether the configuration of the asset has been backed up at data platform services 520.

Manual upload service 814 can be configured to perform a manual backup of device configuration parameters, software, firmware, and other adjustable settings for building equipment 726. The manual backup may be the same as or similar to the automatic backups performed by other components of assurance service 800. However, the manual backups can be triggered on-demand by a service technician or other user. In some embodiments, manual upload service 814 is configured to manually register a device of building equipment 726 with data platform services 520 and can upload various types of data associated with the registered device. For example, manual upload service 814 can upload a heartbeat timeseries that indicates whether the device is online and communicating, logs collected by the device, and/or configuration settings for the device.

Assurance widgets 816 can be configured to generate various user interface elements (i.e., widgets) that include information associated with devices of building equipment 726 and/or assurance service 800. The widgets may function as extensions or components of user interfaces generated by applications 530. For example, the widgets can include a list view of connected assets including asset details and an indication of whether a backup for each asset exists on data platform services 520. Assurance widgets 816 can remotely operate building equipment 726. For example, assurance widgets 816 can send a remote update request to building equipment 726 and can send registered commands to building equipment 726 securely. Assurance widgets 816 can also display real-time alarm and event data from building equipment 726.

Assurance agent 818 can be configured to interface with services 802-814, assurance widgets 816, and building equipment 726. In some embodiments, assurance agent 818 is configured to register building equipment 726, backup software and configuration settings, and communicate status information to services 802-814 and assurance widgets 816. Assurance agent 818 can send a request to building equipment 726 to perform a device discovery process to identify all of the devices of building equipment 726 located at the customer site. An example of a device discovery process which can be triggered by assurance agent 818 is described in detail in U.S. patent application Ser. No. 15/179,894 filed Jun. 10, 2016, the entire disclosure of which is incorporated by reference herein. Assurance agent 818 can also update the software of building equipment 726 and restore the configuration settings of building equipment 726. Assurance agent 818 can send device heartbeat timeseries, send logs, send configuration settings, send alerts, and relay commands to and from building equipment 726.

In some embodiments, assurance agent 818 uses the data stored in entity database 734 to perform its various functions. As described above, entity database 734 may store a plurality of interconnected smart entities. The smart entities may include object entities representing the plurality of devices of building equipment and data entities representing data associated with the plurality of devices of building equipment. The smart entities may be interconnected by relational objects indicating relationships between the object entities and the data entities. Each object entity may include a stored attribute indicating a version of software installed on a device of the building equipment represented by the object entity.

Assurance agent 818 can be configured to automatically detect a version of software installed on each of the devices of building equipment by reading the stored attributes of the object entities in entity database 734. Assurance agent 818 can automatically update the software installed on one or more of the devices of building equipment in response to a determination that the version of software installed on the one or more of the devices of building equipment is not a latest version of the software.

Referring now to FIG. 9, a block diagram illustrating assurance service 800 is shown, according to some embodiments. In some implementations, assurance service 800 can be implemented as a cloud-based system that communicates with building assets through a gateway located in the same building as the building asset. Accordingly, FIG. 9 shows assurance service 800 in communication with an on-premise gateway 920 that is in communication with an example building asset 910. Building asset 910 may be any of the HVAC devices described above (e.g., chillers, fans, etc.) in addition to security assets (e.g., video cameras, access control, etc.), fire protection assets (e.g., fire alarms, sprinklers, etc.), and other types of building assets (e.g., building equipment 726). Assurance service 800 enables efficient tagging, mapping, monitoring, and servicing of building assets, as described in more detail below.

Building asset 910 is shown to include a tag 911. A consistent and robust tagging process can be implemented in BMS 500 to define a set of standards used to tag different types of building assets. Tag 911 can convey various information about building asset 910 such as an asset identifier (e.g., IP address, MAC address, serial number), an asset type (e.g., model number), and an asset location (e.g. building, space). Building assets can be tagged using Wi-Fi, infrared radiation (IR), Global Positioning System (GPS), Bluetooth Low Energy (BLE), Near-field communication (NFC), Radio-frequency identification (RFID), or barcode (e.g., QR code) technologies, or any combination thereof. In some embodiments, tag 911 is used by device management service 804 to register building asset 910.

Building asset 910 is also shown to include firmware and software 912. Building asset 910 may have various versions and types of firmware and software installed and can communicate this information to assurance service 800. If software/firmware 912 is out of date, building asset 910 may be vulnerable to a variety of security risks and performance may suffer.

Building asset 910 is also shown to include a current state 913, health data 914, and compliance data 915. Current state 913 may be a current operating state of building asset 910. For example, if building asset 910 is a chiller (e.g., chiller 102), current state 913 may include current operating parameters of the chiller (e.g., output water temperature, energy usage, refrigerant type). Health data 914 can convey various information related to the performance and condition of building asset 910. Health data 914 can vary depending on the type of asset and can include information such as probability of asset failure (e.g., chiller safety shutdown) and criticality of the asset (e.g., interdependence of other assets). Compliance data 915 includes information critical to compliance with regulatory standards such as the General Data Protection Regulation (GDPR).

Data related to tag 911, software/firmware 912, current state 913, health data 914, and compliance data 915 can be transmitted to on-premise gateway 920 via a network interface 916 of building asset 910. Network interface 916 can include any type of wireless and/or wired communications interface. For example, building asset 910 can transmit data to gateway 920 via BACnet or Modbus communications protocols. Building asset 910 can also transmit data about network interface 916 itself to gateway 920. For example, gateway 920 can detect if network interface 916 has any open network ports that should be closed.

Gateway 920 is shown to include a data collector 922 and a data converter 924. Data collector 922 can be configured to receive the data related to tag 911, software/firmware 912, current state 913, health data 914, and compliance data 915 as well as other data associated with building asset 910. Data collector 922 can also receive data from assurance service 800 such as commands and messages (e.g., control signals). Data converter 924 can be configured to convert data received by data collector 922 between various communications protocols. For example, data converter 924 can receive data in BACnet or Modbus format from building asset 910 and generate timeseries and/or eventseries data (e.g., data samples) as described above for transmission to assurance service 800. For example, in various embodiments, gateway 920 (e.g., data converter 924) can generate multiple timeseries pertaining to a particular asset, such as asset health timeseries, asset state timeseries, asset compliance (e.g., firmware version) timeseries, etc. Data converter 924 can also convert commands and messages received from assurance service 800 into appropriate BACnet or Modbus commands for transmission to building asset 910. Gateway 920 can also be configured to detect when new building assets are connected to a building network and relay information associated with the new assets (e.g., tag 911) to assurance service 800.

Assurance service 800 is shown to include a data enrichment module 821, a risk assessment module 822, historical records 823, a dashboard interface 824, and a map interface 825. Data enrichment module 821 can be configured to enrich the timeseries and/or eventseries data associated with building asset 910 with information related to building spaces and customers. For example, the asset health/state/compliance timeseries may be received (e.g., as samples) and used to enrich other timeseries pertaining to a particular asset, either by modifying the other timeseries or by cross-correlating the separate timeseries. The enriched timeseries/samples may then be stored and be available to other parts of the system.

For example, the enriched or “virtual” timeseries can be constructed from multiple other timeseries of the building asset 910 to create an overall compliance timeseries that indicates the overall compliance of the building asset 910 at multiple points in time. For example, for a software timeseries representing the version of the software/firmware 912 at multiple points in time, a health timeseries indicating the overall health of the building asset 910 at the multiple points in time, and an operational timeseries indicating operating setting values of the building asset 910 at the multiple points in time, an overall compliance timeseries can be generated indicating a level at each of the multiple points in time indicating how well the building asset 910 was in compliance with one or more requirements.

The data enrichment module 821 can be configured to utilize a compliance model and/or a rule set to determine the overall compliance timeseries from the other timeseries. The compliance level at one particular time of the overall compliance timeseries can be based on values of the other performance timeseries at the same particular time. For example, the levels of the overall compliance timeseries can be based on whether the building asset 910 was running the most up-to-date software, whether the building asset 910 was healthy and was not experiencing faults, and whether the operating settings were resulting in appropriate operating results or energy usage.

Risk assessment module 822 can be configured to generate a risk score (e.g., 1-100) for building asset 910 at any point in time t by applying the enriched timeseries and/or eventseries data to a risk model. Assurance service 800 can store enriched timeseries and/or eventseries data, health data 914, compliance data 915, and calculated risk stores as historical records 823 (e.g., in local storage 514 or hosted storage 516).

Additionally, assurance service 800 can provide dashboard interface 824 to users of BMS 500 that allows the user to view all building assets and their associated risk scores and initiate appropriate corrective actions. Users may sort all building assets by risk score to identify assets that are at the highest level of risk. For example, a user may access dashboard interface 824 and see that a chiller has a very high risk score. As a result, the user may schedule a maintenance event associated with the chiller, change a setpoint to reduce stress on the chiller, and/or turn the chiller off before a safety shutdown occurs. Assurance service 800 can also provide a map interface 825 that allows users to view exactly where assets are located within a building. In some embodiments, map interface 825 precisely places building assets in a two-dimensional space using geospatial points and then converts this two-dimensional placement to a three-dimensional building information model (BIM). The assurance service 800 can be configured to store various maps of the building along with the locations of the asset 910 or other assets. The assurance service 800 can retrieve the various maps and/or locations from storage and generate the map interface 825 by overlaying indications of the assets on the building map. An example of a building map is shown in FIG. 10.

Risk assessment module 822 can be configured to determine the risk score associated with building asset 910 based on a variety of factors. For example, the risk score may be low if current state 913 is known, health data 914 indicates that the asset is healthy, software/firmware 912 is up to date, and network interface 916 does not have any open network ports that should be closed. In contrast, the risk score may be high if current state 913 is unknown (or has not been updated for a long period of time), health data 914 indicates that the asset is unhealthy, software/firmware 912 is outdated, and network interface 916 has open network ports that should be closed. In some embodiments, the risk score may be calculated or determined based on a composite of state of the asset, health of the asset, and compliance of the asset. For example, in some embodiments, each of state, health, and compliance may be assigned a particular risk score, and the risk score for the asset may be determined at least in part on a composite of the individual risk scores. In some embodiments, the risk score for the asset may be determined based on a comparison of the individual risk scores (e.g., based on a highest risk score from among the state, health, and compliance scores). In some embodiments, the composite risk score may be non-numerical; for example, the composite risk score may be descriptive of a relative risk on a scale of risk levels (e.g., low, medium, high) and may be determined based on similar relative levels for the individual risk associated with state, health, and compliance.

Turning now to FIG. 10, a drawing showing various layers and benefits associated with assurance service 800 is shown, according to some embodiments. FIG. 10 is shown to include a physical domain 1010 that includes a plurality of physical building assets (e.g., building asset 910). Some examples of these physical building assets are depicted in list 1012. These assets may include both HVAC assets and security assets. For example, the HVAC devices may include chillers, heat pumps, vents, and fans. The security assets may include video cameras, access controllers, access control readers, biometric access readers, and emergency phones.

FIG. 10 is also shown to include a plurality of layers associated with a digital domain that is related physical domain 1010. The digital domain can use virtual representations of the physical assets to deliver various benefits to users of BMS 500. For example, the digital domain is shown to include an asset tagging, mapping, monitoring, and servicing layer 1020. As described above, each building asset can include a tag 911 that identifies relevant information about the asset. Building assets can also be mapped to precise locations within a building and presented to users via map interface 825. This mapping functionality can be aided by data enrichment module 821 that enriches timeseries and/or eventseries data with information about building spaces associated with a given building asset. Assurance service 800 can also deliver advance monitoring and servicing functionality associated with building assets. As described above, assurance service 800 can store enriched timeseries and/or eventseries data as well as risk scores generated by risk assessment module 822. As a result, users of BMS 500 can efficiently and effectively monitor information related to software/firmware 912, current state 913, health data 914, and compliance data 915 for all building assets. The insight provided by this asset monitoring functionality can drive more efficient servicing of building assets as described in more detail below.

The digital domain as shown in FIG. 10 also includes a compliance layer 1030, a cyber-security layer 1040, a cost efficiency layer 1050, and a runtime efficiency layer 1060. Each of these layers represents additional benefits facilitated by assurance service 800. It should be noted that the functionality described with respect to FIGS. 9-10 can overlap with other components of BMS 500 such as data platform services 520 and applications 530. For example, assurance service 800 can provide an interface for other components of BMS 500 to query information related to the enriched timeseries/eventseries data described above.

Compliance layer 1030 allows users of BMS 500 to easily and efficiently determine if any building assets are out of compliance. Assurance service 800 can be configured to curate and correlate various information received form building assets and apply this information to a set of rules to determine if any assets are out of compliance. Assurance service 800 can analyze information received from building asset 910 related to tag 911, software/firmware 912, current state 913, health data 914 (e.g., a health index), and/or compliance data 915 to make such a determination. GDPR, for example, defines various rules related to personally identifiable information (PII) and other privacy concerns. These rules can include a video retention time period, an incidence response time, right to consent, right to data portability, data redaction, etc. As an example, assurance service 800 may determine that video data from one or more security cameras has not been deleted for over three months. Accordingly, assurance service 800 can notify a user of BMS 500 that the building is out of compliance. As a result, users of BMS 500 may avoid significant fines and penalties that may be associated with regulatory violations.

Cyber-security layer 1040 allows users of BMS 500 to protect themselves from a variety of cyber-security risks. Cybercrime may result in theft of PII, payment data, healthcare information, intellectual property, and other malicious attacks (e.g., denial-of-service attacks) that can be detrimental to the victims. Assurance service 800 can provide users of BMS 500 with protection from such attacks by providing advanced monitoring and servicing functionality. For example, as described above, assurance service 800 can receive information form building assets related to current versions of software and firmware as well as any open network ports that should not be open. Assurance service 800 can quickly diagnose these vulnerabilities and fix them by updating firmware/software and closing network ports that should not be open. Moreover, assurance service 800 can monitor device heuristics and quarantine any building assets that demonstrate suspicious behavior (e.g., by disabling switch ports). Assurance service 800 can also send notifications to network security personnel and monitor service access, authentication types, and physical logical security rules.

Cost efficiency layer 1050 and runtime efficiency layer 1060 allow users of BMS 500 to effectively manage and minimize costs associated with building assets as well as optimize the performance and uptime of building assets. For example, assurance service 800 can facilitate a transition to prognostics as compared to diagnostics. Assurance service 800 can also automate service ticketing, attempt to diagnose and fix issues remotely before sending technicians or other personnel, and notify personnel of maintenance events including all information relevant to a given problem. Assurance service 800 can also calculate operational run rates and replacement costs for equipment budgeting appropriations and notify users of software licensing renewals/expirations. Assurance service 800 allows users of BMS 500 to monitor and manage building assets and associated key performance indicators (KPIs) throughout the entire life cycle.

Referring now to FIG. 11, assurance service 800 is shown to include a rules engine 1104 for cross-correlating timeseries 1102 of a building asset 910, according to some embodiments. Assurance service 800 communicates with building asset 910 and further with a user device 1112. Building asset 910, as previously described, may be a building device located within a building or otherwise associated with a building. Building asset 910 can be an HVAC device, a fire suppression device, or a security device as described herein.

User device 1112 can communicate with assurance service 800 and receive work-orders, e.g., work-order 1110, from assurance service 800. User device 1112 can be the same as or similar to client devices 448 as described with reference to FIGS. 4-5 as described herein. User device 1112 can include a user interface including a display, e.g., a light emitting diode (LED) display, a liquid crystal display (LCD), an electroluminescent display (ELD), etc. In some embodiments, assurance service 800 causes the display of the user device to display interfaces, e.g., an interface including work-order 1110 and/or any of the other interfaces as described with reference to FIGS. 8-10.

Assurance service 800 includes processor(s) 1114 and memory device(s) 1116. Memory device(s) 1116 can be transitory and/or non-transistor storage mediums configured to store instructions. The instructions, when executed by processor(s) 1114, can cause processor(s) 1114 to perform the various operations, e.g., the operations described with reference to assurance service 800. Processor(s) 1114 and/or memory device(s) 1116 can form one or multiple processing circuits. The processing circuit may be the same as or similar to processing circuit 506. Processor(s) 1114 can be the same as or similar to processor 508. Memory device(s) 1116 can be the same as or similar to memory 510.

Assurance service 800 includes connector 1100. Connector 1100 can be configured to interface with building asset 910. In some embodiments, connector 1100 monitors building asset 910 for various events or indications of status information. For example, connector 1100 can sniff data stored by building asset 910 or otherwise transmitted over various networks by building asset 910. In some embodiments, the events can be data indicating power status (device turned on, device turned off), indicating operating status (e.g., encountered fault, fault types, etc.), memory usage of memory devices of building asset 910, processor usage of a processor of building asset 910, indications of software updates, indications of operating software versions, indications of operating settings, etc. The events may be time correlated data items, i.e., may indicate performance of building asset 910 at a point in time. For example, connector 1100 may receive an event from building asset 910 indicating that at a particular point in time, building asset 910 is operating on a particular piece of a firmware. Similarly, the event may indicate that building asset 910 lost power at a particular time.

Based on the events, connector 1100 can generate and/or update performance timeseries 1102. Performance timeseries 1102 may be indicative of the performance of the building asset 910. The performance timeseries 1102 may be direct or indirect data timeseries of building asset 910, e.g., raw data values generated by the building asset 910 (e.g., operational settings, fault indicators, software version identifiers, etc.) or virtual values generated from data of the building asset 910 (e.g., a risks score, a compliance score, a health score, etc.) Connector 1100 could create a device health timeseries based on health events received from building asset 910, the health events may indicate a health value at each of multiple times. Connector 1100 can compile the multiple events into a single timeseries where the events are ordered based on when in time the events occurred. Performance timeseries 1102 can be software or firmware timeseries indicating a software or firmware version at each of multiple points in time. Performance timeseries 1102 may be an operating status of building asset 910, for example, an operating status, e.g., online or offline, at multiple points in time, operating settings of building asset 910 at multiple points in time (e.g., temperature setpoint, humidity setpoint, valve position, a length of time that a surveillance video storage system stores historical video, etc.).

Rules engine 1104, based on performance timeseries 1102 can generate an actionable insight. The actionable insight may indicate one or more operations that can be performed by building asset 910 and/or by a technician to change the performance of building asset 910 to meet operating requirements and/or overcome operating faults or other operating problems. The actionable insights may be indications to service building asset 910, for example, change batteries of building asset 910, update software of building asset 910, replace motors of a compressor, change operating settings of building asset 910 (e.g., new zoom of a camera, new temperature setpoint of a thermostat, etc.). The actionable insight may be any direct or indirect conclusion that can be determined from the performance timeseries 1102. The actionable insight may be a defined action to be performed (e.g., change batteries) or an indirect conclusion or action for a technician to perform (e.g., review operating log for abnormal behavior).

Rules engine 1104 can apply a set of rules to performance timeseries 1102 and/or work-order timeseries 1106. The rules can be timeseries correlating rules that may identify values or timeseries 1102 and/or work-order timeseries 1106 occurring at particular times relative to each other. By correlating the timeseries, a greater level of insight may be gained by correlating the timeseries. For example, one rule may indicate that if building asset 910 changes operating from a first firmware version to a second version (indicated by a firmware timeseries) and, within a predefined amount of time of changing software versions, goes offline multiple times (indicated by an operating status timeseries), building asset 910 should be rolled back to the firmware version indicated by the firmware timeseries that building asset 910 was operating at before encountering errors and going offline.

Another rule may indicate that if building asset 910 was reverted from a new firmware version to an old firmware version (indicated by the firmware performance timeseries) and within a predefined amount of time of the rollback, building asset 910 continues to experience errors (e.g., indicated by a health timeseries or an operating timeseries) the device may be physically damaged or require user review. The rule may indicate that a user should manually inspect the building asset.

The rules may also analyze work-order timeseries 1106. The work-order timeseries 1106 may indicate what operates have be performed on building asset 910 overtime. In this regard, if one or more actions have been performed on building asset 910 to correct or improve the performance of building asset 910 but are been unsuccessful in correcting or improving the performance of building asset 910, rules engine 1104 can select a new actionable insight that considers past actions taken on building asset 910. For example, one rule may indicate that if a battery powered thermostat goes offline periodically (indicated by an operational timeseries) and the thermostat has been rolled back to a previous timeseries (indicated by work-order timeseries 1106), the battery powered thermostat should have its battery replaced.

Work-order generator 1108 can be configured to generate work-order 1110 and/or work-order timeseries 1106. Work-order 1110 may indicate one or more instructions for performing the actionable insight identified by rules engine 1104. Work-order generator 1108 can keep a record of each work-order generated by work-order generator 1108, e.g., work-order timeseries 1106. Work-order generator 1108 may generate work-order timeseries 1106 with indications of when work-orders are generated and the type of work-order generated. In some embodiments, work-order timeseries 1106 includes indications of when work-orders are completed and/or closed and what type of work-order was completed and/or closed. Work-order 1110 can be communicated by assurance service 800 to user device 1112 for display on the display device of user device 1112. In some embodiments, work-order generator 1108 pushes the work order to a particular technician or technician team based on the type of work-order 1110 and the expertise of the various technicians and/or technician teams.

Referring now to FIG. 12, a process 1200 of generating work-order for a building asset with rules engine 1104 by cross-correlating timeseries associated with the building asset is shown, according to an exemplary embodiment. In some embodiments, the assurance service 800 is configured to perform some and/or all of the steps of process 1200. In some embodiments, the steps of the process 1200 are instructions stored on memory device(s) 1116 and are executed by processor(s) 1114.

In step 1202, connector 1100 monitors building asset 910 for events. As previously mentioned, the events may be software version changes, operating settings, health values, etc. Connector 1100 can be configured to generate multiple performance timeseries indicating a series of events and/or statuses at various points in time, in step 1204. Connector 1100 can feed the performance timeseries into rules engine 1104 for processing and correlation.

In step 1206, rules engine 1104 can process the multiple performance timeseries generated in step 1204 to determine an actionable insight for building asset 910. Rules engine 1104 can apply one or multiple different rules that cross-correlate the performance timeseries. If a rule is triggered by the performance timeseries, an actionable insight associated with the triggered rule can be selected by rules engine 1104. In some embodiments, each of the multiple rules is associated with one actionable insight. If multiple rules are triggered, rules engine 1104 may include a rules priority, i.e., a priority of rules that indicate which rules are associated with an actionable insight that should be performed first to select a single rule from the multiple triggered rules. The single rule may be a rule associated with a highest priority. Rules engine 1104 may pass the actionable insight determined by rules engine 1104 to work-order generator 1108.

In step 1208, work-order generator 1108 can generate a work-order based on the actionable insight determined in step 1206. Furthermore, work-order generator 1108 can dispatch the work-order to the appropriate technician and/or technician team, e.g., to user device 1112. In step 1210, work-order generator 1108 can generate or update a work-order timeseries and feed the work-order into rules engine 1104. In some embodiments, the work-order timeseries is updated to include an indication of the work-order generated in step 1208. In this regard, further execution of rules engine 1104 can take into consideration work-orders generated and/or attempted to resolve faults and/or realize performance improvements.

Configuration of Exemplary Embodiments

The construction and arrangement of the systems and methods as shown in the various exemplary embodiments are illustrative only. Although only a few embodiments have been described in detail in this disclosure, many modifications are possible (e.g., variations in sizes, dimensions, structures, shapes and proportions of the various elements, values of parameters, mounting arrangements, use of materials, colors, orientations, etc.). For example, the position of elements can be reversed or otherwise varied and the nature or number of discrete elements or positions can be altered or varied. Accordingly, all such modifications are intended to be included within the scope of the present disclosure. The order or sequence of any process or method steps can be varied or re-sequenced according to alternative embodiments. Other substitutions, modifications, changes, and omissions can be made in the design, operating conditions and arrangement of the exemplary embodiments without departing from the scope of the present disclosure.

The present disclosure contemplates methods, systems and program products on any machine-readable media for accomplishing various operations. The embodiments of the present disclosure can be implemented using existing computer processors, or by a special purpose computer processor for an appropriate system, incorporated for this or another purpose, or by a hardwired system. Embodiments within the scope of the present disclosure include program products comprising machine-readable media for carrying or having machine-executable instructions or data structures stored thereon. Such machine-readable media can be any available media that can be accessed by a general purpose or special purpose computer or other machine with a processor. By way of example, such machine-readable media can comprise RAM, ROM, EPROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to carry or store desired program code in the form of machine-executable instructions or data structures and which can be accessed by a general purpose or special purpose computer or other machine with a processor. Combinations of the above are also included within the scope of machine-readable media. Machine-executable instructions include, for example, instructions and data which cause a general purpose computer, special purpose computer, or special purpose processing machines to perform a certain function or group of functions.

Although the figures show a specific order of method steps, the order of the steps may differ from what is depicted. Also two or more steps can be performed concurrently or with partial concurrence. Such variation will depend on the software and hardware systems chosen and on designer choice. All such variations are within the scope of the disclosure. Likewise, software implementations could be accomplished with standard programming techniques with rule based logic and other logic to accomplish the various connection steps, processing steps, comparison steps and decision steps.

In various implementations, the steps and operations described herein may be performed on one processor or in a combination of two or more processors. For example, in some implementations, the various operations could be performed in a central server or set of central servers configured to receive data from one or more devices (e.g., edge computing devices/controllers) and perform the operations. In some implementations, the operations may be performed by one or more local controllers or computing devices (e.g., edge devices), such as controllers dedicated to and/or located within a particular building or portion of a building. In some implementations, the operations may be performed by a combination of one or more central or offsite computing devices/servers and one or more local controllers/computing devices. All such implementations are contemplated within the scope of the present disclosure. Further, unless otherwise indicated, when the present disclosure refers to one or more computer-readable storage media and/or one or more controllers, such computer-readable storage media and/or one or more controllers may be implemented as one or more central servers, one or more local controllers or computing devices (e.g., edge devices), any combination thereof, or any other combination of storage media and/or controllers regardless of the location of such devices.

A portion of the disclosure of this patent document contains material which is subject to copyright protection. The copyright owner has no objection to the facsimile reproduction by anyone of the patent document or the patent disclosure, as it appears in the Patent and Trademark Office patent file or records, but otherwise reserves all copyright rights whatsoever. 

What is claimed is:
 1. A building system for assurance services with timeseries, the building system comprising one or more memory devices configured to store instructions thereon that, when executed by one or more processors, cause the one or more processors to: monitor a building asset for one or more events and generate a plurality of performance timeseries for the building asset based on the one or more events; determine an actionable insight for the building asset by cross-correlating the plurality of performance timeseries; and perform at least one of: generating a work-order for the building asset based on the actionable insight; and causing a display device of a user device to display the work-order; or communicating with the building asset and causing the building asset to perform one or more operations based on the actionable insight.
 2. The building system of claim 1, wherein cross-correlating the plurality of performance timeseries comprises determining whether one or more first events of a first performance timeseries of the plurality of performance timeseries occurring at one or more first points in time are followed by one or more second events of a second performance timeseries of the plurality of performance timeseries occurring at one or more second points in time within a predefined amount of time of the one or more first points in time.
 3. The building system of claim 1, wherein the building asset is one of a heating, ventilation, and air conditioning (HVAC) device, a fire suppression device, or a security device.
 4. The building system of claim 1, wherein the instructions cause the one or more processors to cross-correlate the plurality of performance timeseries by analyzing the plurality of performance timeseries with a set of rules, wherein each rule of the set of rules is associated with a particular actionable insight of a plurality of actionable insights.
 5. The building system of claim 1, wherein the plurality of performance timeseries comprise at least one of: a software version timeseries indicating a software version of the building asset at a plurality of times; an operating status timeseries indicating whether the building asset is online or offline at the plurality of times; or an asset health timeseries indicating an asset health of the building asset at the plurality of times.
 6. The building system of claim 1, wherein the instructions cause the one or more processors to generate a virtual timeseries from the plurality of performance timeseries, wherein the virtual timeseries indicates an overall compliance of the building asset with one or more requirements based on the plurality of performance timeseries.
 7. The building system of claim 1, wherein the instructions cause the one or more processors to: retrieve location information of the building asset and a plurality of other building assets from the one or more memory devices; retrieve a building map indicating a plurality of areas of a building; and generate a user interface based on the building map and the location information, wherein the user interface comprises the building map and indicators of the building asset and the plurality of other building assets on the building map.
 8. The building system of claim 1, wherein the instructions cause the one or more processors to: monitor a plurality of other building assets for one or more other events and generate a plurality of other performance timeseries for each of the plurality of other building assets based on the one or more other events; generate a risk score for each of the plurality of other building assets based on the plurality of other performance timeseries; and generate a particular risk score for the building asset based on the plurality of performance timeseries.
 9. The building system of claim 8, wherein the instructions cause the one or more processors to: generate a list, the list comprising the building asset and the plurality of other building assets, wherein the list is ordered based on the particular risk score of the building asset and the risk score of each of the plurality of other building assets; and cause the user device to display the list.
 10. The building system of claim 1, wherein the instructions cause the one or more processors to: generate a plurality of other work-orders for the building asset; and generate a work-order timeseries for the building asset based on the plurality of other work-orders.
 11. The building system of claim 10, wherein the instructions cause the one or more processors to determine the actionable insight for the building asset by cross-correlating the plurality of performance timeseries and further based on the work-order timeseries.
 12. The building system of claim 1, wherein the actionable insight indicates the one or more operations for the building asset to perform.
 13. The building system of claim 12, wherein the one or more operations comprise at least one of updating network configuration of one or more network ports of the building asset, updating one or more operating settings of the building asset, or updating software of the building asset.
 14. A method of assurance services with timeseries, the method comprising: monitoring, by one or more processing circuits, a building asset for one or more events and generate a plurality of performance timeseries for the building asset based on the one or more events; determining, by the one or more processing circuits, an actionable insight for the building asset by cross-correlating the plurality of performance timeseries; and performing, by the one or more processing circuits, at least one of: generating a work-order for the building asset based on the actionable insight; and causing a display device of a user device to display the work-order; or communicating with the building asset and causing the building asset to perform one or more operations based on the actionable insight.
 15. The method of claim 14, wherein cross-correlating the plurality of performance timeseries comprises determining whether one or more first events of a first performance timeseries of the plurality of performance timeseries occurring at one or more first points in time are followed by one or more second events of a second performance timeseries of the plurality of performance timeseries occurring at one or more second points in time within a predefined amount of time of the one or more first points in time.
 16. The method of claim 14, wherein cross-correlating the plurality of performance timeseries comprises analyzing the plurality of performance timeseries with a set of rules, wherein each rule of the set of rules is associated with a particular actionable insight of a plurality of actionable insights.
 17. The method of claim 14, wherein the plurality of performance timeseries comprise at least one of: a software version timeseries indicating a software version of the building asset at a plurality of times; an operating status timeseries indicating whether the building asset is online or offline at the plurality of times; or an asset health timeseries indicating an asset health of the building asset at the plurality of times.
 18. The method of claim 14, further comprising generating, by the one or more processing circuits, a virtual timeseries from the plurality of performance timeseries, wherein the virtual timeseries indicates an overall compliance of the building asset with one or more requirements based on the plurality of performance timeseries.
 19. The method of claim 14, further comprising: generating, by the one or more processing circuits, a plurality of other work-orders for the building asset; and generating, by the one or more processing circuits, a work-order timeseries for the building asset based on the plurality of other work-orders; wherein the determining, by the one or more processing circuits, the actionable insight for the building asset comprises cross-correlating the plurality of performance timeseries and further based on the work-order timeseries.
 20. A building system for assurance services with timeseries, the building system comprising: a building asset located within a building, wherein the building asset communicates with a building gateway device; the building gateway, wherein the building gateway is configured to communicate with the building asset and an assurance service; and an assurance services system configured to communicate with the building gateway, the assurance services system comprising one or more memory devices configured to store instructions thereon that, when executed by one or more processors, cause the one or more processors to: monitor, via the building gateway, the building asset for one or more events and generate a plurality of performance timeseries for the building asset based on the one or more events; determine an actionable insight for the building asset by cross-correlating the plurality of performance timeseries; and perform at least one of: generating a work-order for the building asset based on the actionable insight; and causing a display device of a user device to display the work-order; or communicating with the building asset and causing the building asset to perform one or more operations based on the actionable insight. 