System for utility usage triggering action
First Claim
1. A computer-implemented method, comprising:
- compiling, by a network device on a network, usage data based on the use of a utility by the network device;
setting a threshold amount of usage based on the compiled usage data;
determining a current usage amount at a current usage time;
comparing the current usage amount to the threshold amount of usage;
determining that the current usage amount has exceeded the threshold amount of usage;
identifying, by the network device, a change in a function of the network device associated with the threshold amount of usage;
analyzing, by the network device, the usage data over a first predetermined time period to identify a pre-threshold trend in the usage data, wherein the first predetermined time period occurred directly before the current usage time;
analyzing, by the network device, the usage data over a second predetermined time period to identify a post-threshold trend in the usage data, wherein the second predetermined time period occurred directly after the current usage time;
determining that, based on exceeding of the threshold amount of usage and the analysis of the usage data over the first and second predetermined time periods, the pre-threshold trend and the post-threshold trend are consistent with the change in the function of the network device associated with the threshold amount of usage; and
applying, by the network device, the change in the function of the network device.
2 Assignments
0 Petitions
Accused Products
Abstract
The present disclosure relates to using sensors and measurements from sensors to trigger actions within a network. Specifically, various techniques and systems are provided for measuring usage or measurements, using sensors, of utilities or other environmental factors, generating profiles based on the usage or measurements, and triggering actions within a network device based on the usage, measurements and profiles. Embodiments of the present invention may include, for example, compiling historical usage based on the use or measurements detected by a network device and generating a usage profile based on that use or measurements. The normal usage profile may be compared with the usage over a certain predetermined period of time to detect any abnormal use or measurements from the network device, and an action may be taken as a result of an abnormality.
-
Citations
30 Claims
-
1. A computer-implemented method, comprising:
-
compiling, by a network device on a network, usage data based on the use of a utility by the network device; setting a threshold amount of usage based on the compiled usage data; determining a current usage amount at a current usage time; comparing the current usage amount to the threshold amount of usage; determining that the current usage amount has exceeded the threshold amount of usage; identifying, by the network device, a change in a function of the network device associated with the threshold amount of usage; analyzing, by the network device, the usage data over a first predetermined time period to identify a pre-threshold trend in the usage data, wherein the first predetermined time period occurred directly before the current usage time; analyzing, by the network device, the usage data over a second predetermined time period to identify a post-threshold trend in the usage data, wherein the second predetermined time period occurred directly after the current usage time; determining that, based on exceeding of the threshold amount of usage and the analysis of the usage data over the first and second predetermined time periods, the pre-threshold trend and the post-threshold trend are consistent with the change in the function of the network device associated with the threshold amount of usage; and applying, by the network device, the change in the function of the network device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computing device, comprising:
-
one or more processors; and a memory having instructions stored thereon, which when executed by the one or more processors, cause the computing device to perform operations including; compiling, by a network device on a network, usage data based on the use of a utility by the network device; setting a threshold amount of usage based on the compiled usage data; determining a current usage amount at a current usage time; comparing the current usage amount to the threshold amount of usage; determining that the current usage amount has exceeded the threshold amount of usage; identifying, by the network device, a change in a function of the network device associated with the threshold amount of usage; analyzing, by the network device, the usage data over a first predetermined time period to identify a pre-threshold trend in the usage data, wherein the first predetermined time period occurred directly before the current usage time; analyzing, by the network device, the usage data over a second predetermined time period to identify a post-threshold trend in the usage data, wherein the second predetermined time period occurred directly after the current usage time; determining that, based on exceeding of the threshold amount of usage and the analysis of the usage data over the first and second predetermined time periods, the pre-threshold trend and the post-threshold trend are consistent with the change in the function of the network device associated with the threshold amount of usage; and applying, by the network device, the change in the function of the network device. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A computer-program product tangibly embodied in a non-transitory machine-readable storage medium, including instructions configured to cause a data processing apparatus to:
-
compile, by a network device on a network, usage data based on the use of a utility by the network device; set a threshold amount of usage based on the compiled usage data; determine a current usage amount at a current usage time; compare the current usage amount to the threshold amount of usage; determine that the current usage amount has exceeded the threshold amount of usage; identify, by the network device, a change in a function of the network device associated with the threshold amount of usage; analyze, by the network device, the usage data over a first predetermined time period to identify a pre-threshold trend in the usage data, wherein the first predetermined time period occurred directly before the current usage time; analyze, by the network device, the usage data over a second predetermined time period to identify a post-threshold trend in the usage data, wherein the second predetermined time period occurred directly after the current usage time; determine that, based on exceeding of the threshold amount of usage and the analysis of the usage data over the first and second predetermined time periods, the pre-threshold trend and the post-threshold trend are consistent with the change in the function of the network device associated with the threshold amount of usage; and apply, by the network device, the change in the function of the network device. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30)
-
Specification