DATA ANALYSIS SYSTEM, SUCH AS A THEFT SCENARIO ANALYSIS SYSTEM FOR AUTOMATED UTILITY METERING
First Claim
Patent Images
1. A method of deducing a possible theft of a utility at a utility meter, the method comprising:
- receiving at a data collection center two or more data flags from the utility meter, wherein each data flag indicates abnormal operation of the utility meter;
filtering, at the data collection center, the received two or more data flags to remove redundant data flags from the received two or more data flags;
comparing, at the data collection center, the filtered two or more data flags to predetermined patterns of data flags, wherein the predetermined patterns relate to possible theft scenarios at the utility meter; and
determining the possible theft of the utility at the utility meter based on the comparison.
5 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for determining possible theft scenarios at utility meters are described. In some examples, the system receives information that indicates possible tampering of utility meter by a customer of a utility. In some examples, the system uses the information to determine a theft scenario. The system may then use the determined theft scenario as evidence against the customer.
98 Citations
29 Claims
-
1. A method of deducing a possible theft of a utility at a utility meter, the method comprising:
-
receiving at a data collection center two or more data flags from the utility meter, wherein each data flag indicates abnormal operation of the utility meter; filtering, at the data collection center, the received two or more data flags to remove redundant data flags from the received two or more data flags; comparing, at the data collection center, the filtered two or more data flags to predetermined patterns of data flags, wherein the predetermined patterns relate to possible theft scenarios at the utility meter; and determining the possible theft of the utility at the utility meter based on the comparison. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A fixed network theft determination system capable of determining a theft scenario at one or more utility meters, comprising:
-
a data collection component within the fixed network, wherein the data collection component is configured to receive data related to operation of the utility meter; a data filtering component, wherein the data filtering component reviews the data received by the data collection component and identifies data that indicates a possible irregularity in the operation of the utility meter; a scenario recognition component, wherein the scenario recognition component retrieves the identified data from the data filtering component, compares the identified data to predetermined utility meter operation scenarios, and determines a theft scenario based on the comparison. - View Dependent Claims (14, 15, 16, 17, 18, 19)
-
-
20. One or more computer memories contained in a computer-readable medium, the memories collectively containing a data structure, the data structure containing data derived from one or more utility meters, wherein the data indicates at least the occurrence of three or more disparate events at a utility meter, and wherein further the data indicates a time of each disparate event and a relative time of each disparate event relative to the other disparate events.
-
21. A method of providing evidence of utility theft by a customer associated with at least one utility meter monitoring a utility, the method comprising:
-
at a data reception component located in a different location than a location of the utility meter, receiving tamper indicators from the utility meter, wherein the tamper indicators relate to possible tampering of the utility meter by the customer; at the data reception component, processing the received tamper indicators to determine a predetermined pattern of tampering of the utility meter by the customer; and presenting the predetermined pattern to a resolution component associated with the utility as evidence of a possible theft of the utility by the customer. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28)
-
-
29. A method of deducing abnormal operation of a utility meter, the method comprising:
-
receiving at a data collection center two or more data flags from the utility meter, wherein each data flag indicates an occurrence of an abnormal event at the utility meter; comparing, at the data collection center, the received two or more data flags to predetermined patterns of data flags, wherein the predetermined patterns relate to known abnormal operation of the utility meter; and determining an abnormal operation of the utility meter based on the comparison.
-
Specification