AUTONOMOUS DATA QUALITY EVALUATION
First Claim
1. A method of managing an asset, the method comprising:
- operating a set of sensing devices associated with the asset using a computer system associated with the asset to acquire sensor data, wherein the computer system operates the set of sensing devices independent of a user;
evaluating at least a portion of the sensor data using the computer system, the evaluating including determining whether any sensor data in the at least a portion of the sensor data is suspect; and
initiating an action using the computer system in response to determining at least a portion of the evaluated sensor data is suspect, wherein the action includes at least one of;
adjusting additional processing of the sensor data, adjusting interaction between the computer system and at least one other system remote from the asset, or adjusting management operations of the asset.
1 Assignment
0 Petitions
Accused Products
Abstract
A solution for managing an asset is provided. A set of sensing devices associated with the asset are operated independent of a user to acquire sensor data. At least some of the sensor data is evaluated using a computer system associated with the asset to determine whether any sensor data in at least a portion of the sensor data is suspect. In response to a determination that at least a portion of the evaluated sensor data is suspect, an action is initiated by the computer system associated with the asset. The action can include adjusting additional processing of the sensor data, adjusting interaction between the computer system and at least one other system remote from the asset, and/or adjusting management operations of the asset.
17 Citations
20 Claims
-
1. A method of managing an asset, the method comprising:
-
operating a set of sensing devices associated with the asset using a computer system associated with the asset to acquire sensor data, wherein the computer system operates the set of sensing devices independent of a user; evaluating at least a portion of the sensor data using the computer system, the evaluating including determining whether any sensor data in the at least a portion of the sensor data is suspect; and initiating an action using the computer system in response to determining at least a portion of the evaluated sensor data is suspect, wherein the action includes at least one of; adjusting additional processing of the sensor data, adjusting interaction between the computer system and at least one other system remote from the asset, or adjusting management operations of the asset. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system comprising:
-
an asset deployed to a desired physical area; a set of input/output (I/O) devices associated with the asset, the set of I/O devices including a set of sensing devices for acquiring sensor data; a power system associated with the asset, wherein the power system is configured to provide all power for operating devices associated with the asset; and a computer system including at least one computing device associated with the asset, wherein the computer system is configured to manage the asset by performing a method including; operating the set of sensing devices independent of a user to acquire sensor data; evaluating at least a portion of the sensor data, the evaluating including determining whether any sensor data in the at least a portion of the sensor data is suspect; and initiating an action in response to determining at least a portion of the evaluated sensor data is suspect, wherein the action includes at least one of;
adjusting additional processing of the sensor data, adjusting interaction between the computer system and at least one other system external to the asset, or adjusting management operations of the asset. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A computer-readable storage medium comprising program code embodied therein, which when executed, causes a computer system to implement a method of managing an asset, the method comprising:
-
operating a set of sensing devices associated with the asset to acquire sensor data independent of a user; evaluating at least a portion of the sensor data, the evaluating including determining whether any sensor data in the at least a portion of the sensor data is suspect; and initiating an action in response to determining at least a portion of the evaluated sensor data is suspect, wherein the action includes at least one of;
adjusting additional processing of the sensor data, adjusting interaction between the computer system and at least one other system remote from the asset, or adjusting management operations of the asset. - View Dependent Claims (15, 16, 17, 18, 19)
-
-
20. A method of deploying an asset, the method comprising:
providing a computer system associated with the asset, wherein the computer system is configured to manage the asset by performing a method including; operating a set of sensing devices associated with the asset to acquire sensor data independent of a user; evaluating at least a portion of the sensor data, the evaluating including determining whether any sensor data in the at least a portion of the sensor data is suspect; and initiating an action in response to determining at least a portion of the evaluated sensor data is suspect, wherein the action includes at least one of;
adjusting additional processing of the sensor data, adjusting interaction between the computer system and at least one other system remote from the asset, or adjusting management operations of the asset.
Specification