[go: up one dir, main page]

SE2030373A1 - Method and computing function for managing risk factor relating to damages to venue - Google Patents

Method and computing function for managing risk factor relating to damages to venue

Info

Publication number
SE2030373A1
SE2030373A1 SE2030373A SE2030373A SE2030373A1 SE 2030373 A1 SE2030373 A1 SE 2030373A1 SE 2030373 A SE2030373 A SE 2030373A SE 2030373 A SE2030373 A SE 2030373A SE 2030373 A1 SE2030373 A1 SE 2030373A1
Authority
SE
Sweden
Prior art keywords
venue
computer
computing function
message
operation history
Prior art date
Application number
SE2030373A
Inventor
Anders Ingves
Joakim Isaksson
Robert Knahpe
Original Assignee
Aalands Oemsesidiga Foersaekringsbolag Oemsen
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Aalands Oemsesidiga Foersaekringsbolag Oemsen filed Critical Aalands Oemsesidiga Foersaekringsbolag Oemsen
Priority to SE2030373A priority Critical patent/SE2030373A1/en
Priority to PCT/EP2021/085786 priority patent/WO2022136035A1/en
Publication of SE2030373A1 publication Critical patent/SE2030373A1/en

Links

Classifications

    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B23/00Testing or monitoring of control systems or parts thereof
    • G05B23/02Electric testing or monitoring
    • G05B23/0205Electric testing or monitoring by means of a monitoring system capable of detecting and responding to faults
    • G05B23/0259Electric testing or monitoring by means of a monitoring system capable of detecting and responding to faults characterized by the response to fault detection
    • G05B23/0267Fault communication, e.g. human machine interface [HMI]
    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B23/00Testing or monitoring of control systems or parts thereof
    • G05B23/02Electric testing or monitoring
    • G05B23/0205Electric testing or monitoring by means of a monitoring system capable of detecting and responding to faults
    • G05B23/0259Electric testing or monitoring by means of a monitoring system capable of detecting and responding to faults characterized by the response to fault detection
    • G05B23/0275Fault isolation and identification, e.g. classify fault; estimate cause or root of failure
    • G05B23/0278Qualitative, e.g. if-then rules; Fuzzy logic; Lookup tables; Symptomatic search; FMEA
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0635Risk analysis of enterprise or organisation activities
    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B2219/00Program-control systems
    • G05B2219/10Plc systems
    • G05B2219/16Plc to applications
    • G05B2219/163Domotique, domestic, home control, automation, smart, intelligent house
    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B2219/00Program-control systems
    • G05B2219/20Pc systems
    • G05B2219/26Pc applications
    • G05B2219/2614HVAC, heating, ventillation, climate control

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Human Resources & Organizations (AREA)
  • Physics & Mathematics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Strategic Management (AREA)
  • General Physics & Mathematics (AREA)
  • Economics (AREA)
  • Quality & Reliability (AREA)
  • Marketing (AREA)
  • Game Theory and Decision Science (AREA)
  • Educational Administration (AREA)
  • Automation & Control Theory (AREA)
  • Operations Research (AREA)
  • Development Economics (AREA)
  • Tourism & Hospitality (AREA)
  • General Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Fuzzy Systems (AREA)
  • Mathematical Physics (AREA)
  • Alarm Systems (AREA)

Abstract

A method and a computing function (110) for managing a risk factor relating to damages to a venue (100) are disclosed. The computing function (110) receives, from a sensor device (240, 340) monitoring a system (200, 300) of the venue (100), a first message indicating malfunction of the system (200, 300). The system (200, 300) is related to the risk factor. The computing function (110) analyses operation history indications of a set of candidate sources (210, 220, 230, 310, 320, 330) of the system (200, 300) to obtain a primary source (210, 310) of the set of candidate sources (210, 220, 230, 310, 320, 330). The computing function (110) provides, to a person associated with the venue (100), a second message indicating the primary source (210, 310), thereby inviting the person to check whether the primary source (210, 310) is the cause of the malfunction or not. A corresponding computer program and a computer program carrier are also disclosed.

Description

METHOD AND COMPUTING FUNCTION FOR MANANGINGRISK FACTOR RELATING TO DAMAGES TO VENUE TECHNICAL FIELD Embodiments herein relate to automation and/or monitoring systems for venues, such ashomes, offices or the like. ln particular, a method and a computing function for managing a riskfactor relating to damages to the venue are disclosed. A corresponding computer program and a computer program carrier are also disclosed.
BACKGROUND There exists various home automation and monitoring systems that warns the user aboutdifferent errors as they happen.
Existing system provide information about which sensor or the like caused the alarm. Ahomeowner then commences a cumbersome error finding process, which typically is both timeconsuming and costly, e.g. in terms of continued worsening of damage during error finding, hourlyrate for error finding if applicable, or the like.
US10198771B1 discloses a system for receiving data from one or more sensors or devicesassociated with one or more users. ln some examples, data may be filtered and analysed todetermine a risk profile for a user. ln addition, the system may also determine a neighbourhood riskprofile for a number of users located in the same geographical location. The risk profile and theneighbourhood profile may be used to determine or adjust a user's insurance premium. Adisadvantage with the aforementioned system may be that it may be frustrating for the user toexperience how the insurance premium varies, especially increases, as time passes by. Moreover,once a damage happens, or risk thereof increases, the user may need to perform tedious and/or difficult investigations to at least reduce the damage, or risk thereof.
SUMMARYAn object may be to at least reduce one or more of the aforementioned problems and/or disadvantages.
According to an aspect, the object is achieved by a computer-implemented method formanaging a risk factor relating to damages to a venue. As an example, the method may beperformed by a computing function, such as a server, a computer, a cloud function, a server-lessfunction or the like.
The computing function receives, from a sensor device monitoring a system of the venue, a first message indicating malfunction of the system. The system is related to the risk factor. Thecomputing function analyses operation history indications of a set of candidate sources of the systemto obtain a primary source of the set of candidate sources. The computing function provides, to aperson associated with the venue, a second message indicating the primary source, thereby inviting the person to check whether the primary source is the cause of the malfunction or not.
Thanks to the computing function analyzing the operation history indications of the set ofcandidate sources of the system that is indicated as malfunctioning according to the first message,the computing function is able to obtain the primary source, e.g. a probable source of themalfunction detected by the sensor device. Then, the computing function provides the secondmessage in order to indicate to the user that the primary source may be checked. As a result, thecomputing function may enable a reduction of the risk factor, since the probable source ofmalfunction may be checked and appropriate actions may be taken without unnecessary delay.
Accordingly, based on a relatively generic error message as provide by the first message, anindication of source of error, such as by providing the primary source, may be indicated to the user.
As a result, a faster and less costly error finding process may be enabled.
An advantage is, hence, that the user is assisted, by the computing function, in finding theprimary source, causing the first message. As a result, a cumbersome and time consuming errorfinding process may be avoided, or at least greatly simplified. For example, time spent in the errorfinding process may be reduced. Hence, in many scenarios, such as when error finding is bought, e.g.by an owner of the venue, as a service, also reduced expenses for the error finding process is expected.
According to further aspects, the object is achieved by a computing function, a computer program and a computer program carrier corresponding to the aspects above.
BRIEF DESCRIPTION OF THE DRAWINGSThe various aspects of embodiments disclosed herein, including particular features andadvantages thereof, will be readily understood from the following detailed description and the accompanying drawings, which are briefly described in the following.
Figure 1 is a schematic overview of an exemplifying venue in which embodiments herein maybe implemented.
Figure 2 is a combined signaling and flowchart illustrating the method herein.
Figure 3 is a block diagram illustrating embodiments of the computing function.
DETAILED DESCRIPTION Throughout the following description, similar reference numerals have been used to denotesimilar features, such as nodes, actions, modules, circuits, parts, items, elements, units or the like,when applicable. ln the Figures, features that appear in some embodiments are indicated by dashed lines.
Figure 1 depicts an exemplifying venue 100 in which embodiments herein may beimplemented.The venue 100 may be said to comprise a computing function 110, such as a computer, a server function or the like.
Furthermore, the venue 100 may comprise a system 200, 300, such as a facility controland/or monitoring system for the venue 100.
The system 200, 300 may comprise at least one of a tap water pipe system of the venue 100,a radiator pipe system of the venue 100, an electrical system of the venue 100, a ventilation systemof the venue 100, an air quality control system of the venue 100, and a temperature measuringsystem of the venue 100, a motion detection system of the venue 100 and the like. ln someexamples, the venue 100 may comprise a set of systems 200, 300, such as a first system 200, asecond system 300 etc, where each system of the set of systems comprises one of a tap water pipesystem of the venue 100, a radiator pipe system of the venue 100, an electrical system of the venue100, a ventilation system of the venue 100, an air quality control system of the venue 100, and a temperature measuring system of the venue 100 and the like.
The systems 200, 300 may comprise a set of candidate sources 210, 220, 230, 310, 320, 330.ln some examples, each system 200, 300 associated with the venue 100 comprises a respective set ofcandidate sources 210, 220, 230, 310, 320, 330. ln some examples, the previously mentioned motion detection system may comprise a set ofmotion detecting devices, such as motion sensor, IR sensors or the like. Each motion detection devicemay be associated with one or more candidate sources, which may be comprised in, e.g. belong to,one or more other systems of the venue 100. ln this manner, a motion alert from one of the motiondetecting devices of the set of motion detecting devices may be mapped to one or more candidate sources of said one or more other systems.
Additionally, the venue 100 may comprise a client device 300, such as a smartphone, aPersonal Computer (PC), a wireless communication device, an electronic device with wirelesscommunication capability, a user equipment, a mobile phone, a cellular phone, a Personal DigitalAssistant (PDA) equipped with radio communication capabilities, a smartphone, a tablet PC, a portable electronic radio communication device or the like.
The venue 100 may further be said to comprise, or be connected to, an exemplifying network (not shown), which may be any kind of network for providing communication capabilities betweenunits associated with the venue 100. The network may be based on many different technologiesand/or protocols, such as Internet Protocol, Transport Control Protocol (TCP), any wired or wirelesscommunication technology, a Long Term Evolution (LTE), Universal Mobile TelecommunicationSystem (UMTS), Worldwide lnteroperability for Microwave Access (WiMAX), restful-Application Programming lnterfaces, Bluetooth, |oT protocols, etc. etc.
The computing function 110 may communicate 410 with the client device 300, e.g. over the network.
Moreover, the computing function 110 may communicate 420, e.g. also over the network,with sensors of the set of systems 200, 300, i.e. a respective sensor 240, 340 of each system 200, 300. The respective sensor 240, 340 may comprise a first sensor 240 and a second sensor 340.
As used herein, the term "venue" may refer to a place, a house, an office, an apartment, ahousing, a residence, a habitation, a domicile, a lodgement, an outdoor area, an indoor area, or thelike.
As used herein, the term ”risk factor” may comprise at least one of a level of risk fordamages, a level of damages and the like. ln this manner, both actual damages and risk of damagesmay be taken into account according to the embodiments herein. As a result, the actual damagesand the risk of damages may be alleviated, or at least reduced, thanks to the embodiments herein.
As used herein, the term ”candidate source", ”primary source” or ”source” may refer to e.g.one or more of a domestic appliance, a home or household appliance, a small appliance, such as adishwasher, washing machine, toaster, coffee maker, espresso machine, baking machine, blender,mixer, rice cooker, etc, a piece of consumer electronics, such as television sets, audio equipment, headphones, head sets, loud speakers, computers, phones, cellular phones, tablet PCs, heating arrangements, such as radiators, floor heating, electric heaters and more, fans and valves for ventilation systems and/or air control systems, sections, valves and/or other units of tap water systems and the like.
Figure 2 illustrates an exemplifying method according to embodiments herein whenimplemented in the venue 100 of Figure 1, such as in the network of the venue 100. The computingfunction 110 performs a method for managing a risk factor relating to damages, i.e. at least one ofactual damages and risk for damages, to a venue 100. ln some examples, the computing function 110may perform a method for at least enabling management of the risk factor relating to the damages.
Along with the description below a few exemplifying examples will be described for purposesof illustration. ln a first example, the system 200, 300 comprises a tap water pipe system of the venue 100. ln a second example, the system 200, 300 comprises an electrical system of the venue 100.
One or more of the following actions may be performed in any suitable order.
Action A010 The sensor device 240, 340 sends a first message to the computing function 110. The firstmessage indicates malfunction of the system 200, 300. The system 200, 300 is related to the riskfactor. More generally, the first message may indicate an event related to the system 200, 300.
The sensor device 240, 340 may monitor one or more systems 200, 300 of the venue 100.
Action A020 The computing function 110 receives, from a sensor device 240, 340 monitoring a system200, 300 of the venue 100, the first message.
According to the first example, the first message may indicate malfunction of the tap watersystem 200, e.g. by means of that the sensor device 240, such as a drip sensor device, detects a leakand thus sends the first message, which e.g. indicates dripping or leaking water in the tap watersystem 200.
According to the second example, the first message may indicate malfunction of theelectrical system 200, e.g. by means of the sensor device 240, such as a sensor device monitoringfuses of the electrical system, detecting that a fuse has released, such as blown, and thus sends thefirst message, which e.g. indicates that the fuse of a particular section or group of the electrical system has released.
Action A030 The computing function 110 analyses operation history indications of a set of candidatesources 210, 220, 230, 310, 320, 330 of the system 200, 300 to obtain a primary source 210, 310 ofthe set of candidate sources 210, 220, 230, 310, 320, 330.
The operation history indications may re|ate to, such as specify, comprise or the like, at leastone of water consumption, water flow, water pressure, temperature, air quality, air flow andelectricity consumption of the corresponding candidate source 210, 220, 230, 310, 320, 330 or thelike.
The operation history indications may re|ate to a time period prior to the first message, andoptionally also to a time period after the first message if available. The time period may be anysuitable time frame, such as one or more years, months, weeks, days, hours, minutes, seconds or the like.
According to the first example, each operation history indication of the operation historyindications of the set of candidate sources 210, 220, 230 may specify a respective water consumptionof a corresponding candidate source 210, 220, 230 of the set of candidate sources. The set ofcandidate sources 210, 220, 230 may be selected by the computing function 110 since they areincluded in the system 200 that the sensor 240 monitors for leakage or the like. For example, therespective water consumption may be related to the time period, such as a plurality of hours, prior tothe first message.
According to the second example, each operation history indication of the operation historyindications of the set of candidate sources 210, 220, 230 may specify a respective electricconsumption of a corresponding candidate source 210, 220, 230 of the set of candidate sources. Theset of candidate sources 210, 220, 230 may be selected by the computing function 110 since they areincluded in the system 200, or in a section or group thereof, that the sensor 240 monitors for releaseof the fuse of the system, or in particular that section or group. For example, the respective electricalconsumption may be related to the time period, such as a plurality of minutes, prior to the first meSSage.
The analysing A030 may comprise selecting the primary source 210, 310 that is associatedwith a respective operation history indication that is an extreme operation history indication amongthe operation history indications, such as a maximum or minimum operation history indicationamong the operation history indications.
The extreme operation history indication may be at least among the extreme operationhistory indications, possibly not necessarily the most extreme. For example, various further factors may be taken into account, such as relative severity of the candidate sources.
For example, in case of a dripping or leakage, a location of the corresponding candidatesource may be taken into account. lf the location is in the basement of a house, it may be consideredless severe than if the location is on the attic, in the kitchen, near the living room or the like. ln some examples, the extreme operation history indication may be determined, by thecomputing function 110, as a relative measure. That is, the relative measure may, for each candidatesource, indicate said each candidate source's operation history indication relatively to a normal orcommon operation history indication, such as an average operation history indication during ameasurement time period. lt may be preferred that the measurement time period is in the same magnitude as, or greater than, the aforementioned time period prior to the first message.
According to the first example, the computing function 110 may select the primary source210 that is associated with the respective water consumption that is a maximum water consumptionamong the water consumptions of the set of candidate sources 210, 220, 230.
Summarizing the first example, the computing function 110 receives the first messageindicating leakage in the tap water system. Then the computing function 110 may fetch and analysewater consumption, i.e. operation history indications, during the time period prior to the firstmessage for each candidate source. The candidate source associated with the greatest, or lowest, water consumption prior to the first message may be set as the primary source 210.
According to the second example, the computing function 110 may select the primary source210 that is associated with the respective electrical consumption that is a maximum electricalconsumption among the electrical consumptions of the set of candidate sources 210, 220, 230.
Summarizing the second example, the computing function 110 receives the first messageindicating release of a fuse of the electrical system. Then the computing function 110 may fetch andanalyse electrical consumption, i.e. operation history indications, during the time period prior to thefirst message for each candidate source. The candidate source associated with the greatest, or lowest, electrical consumption prior to the first message may be set as the primary source 210.
Action A040 The computing function 110 provides, to a person associated with the venue 100, a secondmessage indicating the primary source 210, 310, thereby inviting the person to check whether theprimary source 210, 310 is the cause of the malfunction or not.
When the primary source is the cause of the malfunction, further damage to the venue 100may be avoided by that the user performs appropriate actions, such as closes water supply to the primary source, turns off electricity toward the primary source or the like. ln many cases, these actions may even prevent that any damage at all is caused to the venue 100. ln this manner, the computing function 110 at least enables management of the risk factor.
As an example, the computing function 110 may send the second message to the clientdevice 300. The second message may cause the client device to invite the user 310 to check theprimary source 210, 320, e.g. by displaying a suitable text on the screen of the client device 300, byreading the message using text-to-speech synthesis or otherwise mediate the implication of thesecond message to the user 310.
According to the first example, the second message may indicate to the user 310 to checkthe primary source 210, e.g. one of the candidate sources that is connected to the tap water systemthat the sensor 240 monitors for leakage and/or water drip.
According to the second example, the second message may prompt the user 310 to checkthe primary source 210, e.g. one of the candidate sources that is included in the electrical system, ora particular section or group thereof that the fuse is associated with, said primary source being monitored by the sensor 240.
Action A050The client device 300 may receive the second message. Reference is made to the description of action A040 above.
Action A060 The computing function 110 may detect that the user does not respond to the secondmessage, preferably repeatedly. For example, the computing function 110 may detect that the userdoes not respond, by detecting that no confirmation message is received from the client device 300.The confirmation message may indicate to the computing function 110 that the primary source has been checked.
Action A070 This action is preferably performed subsequent to the detection A060 of no response to thesecond message. ln some examples, ”no response” may include that the user selects ignore or the like whenpresented with, such as confronted to, or the like, the second message. ln further examples, ”no response” may include that the user simply confirms the secondmessage, but without appropriate handling to prevent the second message to appear again.
Therefore, the second message will then, within shortly, appear again.
The computing function 110 may provide, to the person, a third message indicating to theperson how to act to decrease the risk factor and/or one or more actions to take to reduce orprevent damages to the venue 100.
The third message may indicate one or more of: - to sea| tap water system, e.g. in particular in the vicinity of the primary source; - to increase ventilation, e.g. in particular in the vicinity of the primary source, or the like. ln this manner, the computing function may invite the user, such as a person in the venue 100, to change their behaviour.
Action A080The client device 300 may receive the third message. Reference is made to action A070 for description of the third message. ln a further example, the computing function 110 may perform a combined analysis of twoor more respective messages originating from a respective sensor device, which e.g. monitors thesame system or a respective system. Such combined analysis may be performed in order to decreasethe risk factor. Hence, a first sensor device may send, to the computing function, a first eventmessage indicating duration of cooking, i.e. a stove has been active, such as turned on for cookingpurposes, for the duration. Start and end points in time of the cooking may, also or alternatively, beindicated by the first event message.
Upon receiving the first event message, or after being notified about end of cooking, thecomputing function may fetch from a second sensor device a second event message indicatingmotion detected by the second sensor device at further location of the venue, such as a living room,home office or the like. ln some examples, the second sensor may be a humidity sensor sensinghumidity in a shower facility of the venue. ln some examples, the second sensor device may send thesecond event message repeatedly and the computing function 110 may filter out the relevant databased on the first event message, i.e. the duration derived therefrom. ln some examples, the firstmessage may be exemplified by the first and second event messages.
When the computing function detects that the motion at said further location has beengreater than a threshold value for motion during cooking, the computing function records an activityreferred to as unattended cooking, or distracted from cooking.
After each recording of the activity, the computing function checks that a current number ofregistered activities referred to as e.g. unattended cooking, e.g. during a past time period, is above a further threshold value. The past time period may be a plurality of days or the like as deemed appropriate depending on the application.
When the further threshold value is exceeded by the current number of registered activitiesof unattended cooking, the computing function may send an alert message to the user. The alertmessage may invite the user(s) to change their behaviour by being present in the vicinity of the stoveduring cooking. As a result, the risk factor may be reduced upon conformance of user behaviour tothe invitation provided by the alert message. ln some examples, the second message of action A050 may be exemplified by the alert message. ln some embodiments, the computing function 110 may be said to perform a method forhandling an error message, referred to as the first message above, wherein the error message may indicate that the malfunction is located within the system 200, 300.
With reference to Figure 3, a schematic block diagram of embodiments of the computing function 110 of Figure 1 is shown.
The computing function 110 may comprise a processing unit 301, such as a means forperforming the methods described herein. The means may be embodied in the form of one or morehardware units and/or one or more software units. The term ”unit” may thus refer to a circuit, asoftware block or the like according to various embodiments as described below.
The computing function 110 may further comprise a memory 302. The memory maycomprise, such as contain or store, instructions, e.g. in the form of a computer program 303, which may comprise computer readable code units.
According to some embodiments herein, the computing function 110 and/or the processingunit 301 comprises a processing circuit 304 as an exemplifying hardware unit, which may compriseone or more processors. Accordingly, the processing unit 301 may be embodied in the form of, or'realized by', the processing circuit 304. The instructions may be executable by the processing circuit304, whereby the computing function 110 is operative to perform the methods of Figure 2. Asanother example, the instructions, when executed by the computing function 110 and/or theprocessing circuit 304, may cause the computing function 110 to perform the method according toFigure 2. ln view of the above, in one example, there is provided a computing function 110 accordingto the embodiments herein. Again, the memory 302 contains the instructions executable by saidprocessing circuit 304 whereby the computing function 110 is operative for: receiving, from a sensor device 240, 340 monitoring a system 200, 300 of the venue 100, a 11 first message indicating malfunction of the system 200, 300, wherein the system 200, 300 is relatedto the risk factor, analysing operation history indications of a set of candidate sources 210, 220, 230, 310, 320,330 of the system 200, 300 to obtain a primary source 210, 310 of the set of candidate sources 210,220, 230, 310, 320, 330, and providing, to a person associated with the venue 100, a second message indicating theprimary source 210, 310, thereby inviting the person to check whether the primary source 210, 310 is the cause of the malfunction or not.
Figure 3 further i||ustrates a carrier 305, or program carrier, which provides, such ascomprises, mediates, supplies and the like, the computer program 303 as described directly above.The carrier 305 may be one of an electronic signal, an optical signal, a radio signal and a computer readable medium. ln some embodiments, the computing function 110 and/or the processing unit 301 maycomprise one or more of a receiving unit 310, an analysing unit 320, a providing unit 330 (such as asending unit), and a detecting unit 340 as exemplifying hardware units. The term ”unit” may refer toa circuit when the term ”unit” refers to a hardware unit. ln other examples, one or more of the aforementioned exemplifying hardware units may be implemented as one or more software units.
Moreover, the computing function 110 and/or the processing unit 301 may comprise anInput/Output circuit 306, which may be exemplified by the receiving unit and/or the sending unit when applicable.
Accordingly, the computing function 110 is configured for managing a risk factor relating todamages to a venue 100.
As mentioned, the risk factor may comprise at least one of a level of risk for damages and alevel of damages or the like.
The system 200, 300 may comprise at least one of a tap water pipe system of the venue 100, aradiator pipe system of the venue 100, an electrical system of the venue 100, a ventilation system ofthe venue 100, an air quality control system of the venue 100, and a temperature measuring systemof the venue 100 and the like.
The operation history indications may relate to at least one of water consumption, water flow,water pressure, temperature, air quality, air flow and electricity consumption of the corresponding candidate source 210, 220, 230, 310, 320, 330 or the like. 12 Therefore, according to the various embodiments described above, the computing function110 and/or the processing unit 301 and/or the processing circuit 304 and/or the receiving unit 310 isconfigured for receiving, from a sensor device 240, 340 monitoring a system 200, 300 of the venue100, a first message indicating ma|function of the system 200, 300. The system 200, 300 is related tothe risk factor.
The computing function 110 and/or the processing unit 301 and/or the processing circuit 304and/or the ana|ysing unit 310 is configured for ana|ysing operation history indications of a set ofcandidate sources 210, 220, 230, 310, 320, 330 of the system 200, 300 to obtain a primary source210, 310 of the set of candidate sources 210, 220, 230, 310, 320, 330. The ana|ysing A030 maycomprise selecting the primary source 210, 310 that is associated with a respective operation history indication that is an extreme operation history indication among the operation history indications.
The computing function 110 and/or the processing unit 301 and/or the processing circuit 304and/or the providing unit 310 is configured for providing, to a person associated with the venue 100,a second message indicating the primary source 210, 310, thereby inviting the person to checkwhether the primary source 210, 310 is the cause of the ma|function or not.
The computing function 110 and/or the processing unit 301 and/or the processing circuit 304and/or the detecting unit 310 may be configured for detecting that the person does not respond to the second message, preferably repeatedly.
The computing function 110 and/or the processing unit 301 and/or the processing circuit 304and/or the providing unit 310, or another providing unit (not shown) may be configured for,preferably subsequent to the detecting no response to the second message, providing, to the person, a third message indicating to the person how to act to decrease the risk factor.
As used herein, the term "function", or ”computing function", may refer to one or morephysical entities, such as devices, apparatuses, computers, servers or the like. This may mean thatembodiments herein may be implemented in one physical entity. Alternatively, the embodimentsherein may be implemented in a plurality of physical entities, such as an arrangement comprisingsaid one or more physical entities, i.e. the embodiments may be implemented in a distributedmanner, such as on a cloud system, which may comprise a set of server machines. ln case of a cloudsystem, the term ”computing function” may refer to a virtual machine, such as a container, virtualruntime environment, a software module or the like. The virtual machine may be assembled from hardware resources, such as memory, processing, network and storage resources, which may reside 13 in different physical machines, e.g. in different computers.
As used herein, the term ”unit” may refer to one or more functional units, each of which maybe implemented as one or more hardware units and/or one or more software units and/or acombined software/hardware unit in a node. ln some examples, the unit may represent a functionalunit realized as software and/or hardware of the node.
As used herein, the term ”computer program carrier", ”program carrier", or "carrier", mayrefer to one of an electronic signal, an optical signal, a radio signal, and a computer readablemedium. ln some examples, the computer program carrier may exclude transitory, propagatingsignals, such as the electronic, optical and/or radio signal. Thus, in these examples, the computerprogram carrier may be a non-transitory carrier, such as a non-transitory computer readablemedium.
As used herein, the term ”processing unit” may include one or more hardware units, one ormore software units or a combination thereof. Any such unit, be it a hardware, software or acombined hardware-software unit, may be a determining means, estimating means, capturingmeans, associating means, comparing means, identification means, selecting means, receivingmeans, sending means or the like as disclosed herein. As an example, the expression ”means” maybe a unit corresponding to the units listed above in conjunction with the Figures.
As used herein, the term ”software unit” may refer to a software application, a Dynamic LinkLibrary (DLL), a software component, a software module, a software object, an object according toComponent Object Model (COM), a software function, a software engine, an executable binarysoftware file or the like.
The terms ”processing unit” or ”processing circuit" may herein encompass a processing unit,comprising e.g. one or more processors, an Application Specific Integrated Circuit (ASIC), a Field-Programmable Gate Array (FPGA) or the like. The processing circuit or the like may comprise one ormore processor kernels.
As used herein, the expression "configured to/for" may mean that a processing circuit isconfigured to, such as adapted to or operative to, by means of software configuration and/orhardware configuration, perform one or more of the actions described herein.
As used herein, the term ”action” may refer to an action, a step, an operation, a response, areaction, an activity or the like. lt shall be noted that an action herein may be split into two or moresub-actions as applicable. Moreover, also as applicable, it shall be noted that two or more of theactions described herein may be merged into a single action.
As used herein, the term ”memory” may refer to a hard disk, a magnetic storage medium, a portable computer diskette or disc, flash memory, random access memory (RAM) or the like.
Furthermore, the term ”memory” may refer to an internal register memory of a processor or the like. 14 As used herein, the term ”computer readable medium” may be a Universal Serial Bus (USB)memory, a Digital Versatile Disc (DVD), a Blu-ray disc, a software unit that is received as a stream ofdata, a Flash memory, a hard drive, a memory card, such as a MemoryStick, a Multimedia Card(MMC), Secure Digital (SD) card, etc. One or more of the aforementioned examples of computerreadable medium may be provided as one or more computer program products.
As used herein, the term ”computer readable code units” may be text of a computerprogram, parts of or an entire binary file representing a computer program in a compiled format oranything there between.
As used herein, the terms ”number” and/or ”value” may be any kind of digit, such as binary,real, imaginary or rational number or the like. Moreover, ”number” and/or ”value” may be one ormore characters, such as a letter or a string of letters. ”Number” and/or ”value” may also berepresented by a string of bits, i.e. zeros and/or ones.
As used herein, the terms "first", "second", ”third” etc. may have been used merely todistinguish features, apparatuses, elements, units, or the like from one another unless otherwiseevident from the context.
As used herein, the term "subsequent action” may refer to that one action is performed aftera preceding action, while additional actions may or may not be performed before said one action,but after the preceding action.
As used herein, the term ”set of” may refer to one or more of something. E.g. a set of devicesmay refer to one or more devices, a set of parameters may refer to one or more parameters or thelike according to the embodiments herein.
As used herein, the expression ”in some embodiments" has been used to indicate that thefeatures of the embodiment described may be combined with any other embodiment disclosed herein.
Even though embodiments of the various aspects have been described, many differentalterations, modifications and the like thereof will become apparent for those skilled in the art. The described embodiments are therefore not intended to limit the scope of the present disclosure.

Claims (10)

1. A computer-implemented method for managing a risk factor relating to damages to a venue(100), wherein the method comprises: receiving (A020), from a sensor device (240, 340) monitoring a system (200, 300) of thevenue (100), a first message indicating malfunction of the system (200, 300), wherein the system(200, 300) is related to the risk factor, analysing (A030) operation history indications of a set of candidate sources (210, 220, 230,310, 320, 330) of the system (200, 300) to obtain a primary source (210, 310) of the set of candidatesources (210, 220, 230, 310, 320, 330), and providing (A040), to a person associated with the venue (100), a second message indicatingthe primary source (210, 310), thereby inviting the person to check whether the primary source (210, 310) is the cause of the malfunction or not.
2. The computer-implemented method according to c|aim 1, wherein the system (200, 300)comprises at least one of a tap water pipe system of the venue (100), a radiator pipe system of thevenue (100), an electrical system of the venue (100), a ventilation system of the venue (100), an air quality control system of the venue (100), and a temperature measuring system of the venue (100).
3. The computer-implemented method according to any one of the preceding claims, whereinthe operation history indications relate to at least one of water consumption, water flow, waterpressure, temperature, air quality, air flow and electricity consumption of the corresponding candidate source (210, 220, 230, 310, 320, 330).
4. The computer-implemented method according to any one of the preceding claims, whereinthe analysing (A030) comprises selecting the primary source (210, 310) that is associated with arespective operation history indication that is an extreme operation history indication among the operation history indications.
5. The computer-implemented method according to any one of the preceding claims, whereinthe method comprises:detecting (A060) that the person does not respond to the second message, preferably repeatedly.
6. The computer-implemented method according to any one of the preceding claims, wherein the method comprises, preferably su bsequent to the detection (A060) of no response to the secondmessage:providing (A070), to the person, a third message indicating to the person how to act to decrease the risk factor.
7. The computer-implemented method according to any one of preceding claims, wherein the risk factor comprises at least one of a level of risk for damages and a level of damages.
8. A computer (110) configured to perform a method according to any one of the precedingclaims.
9. A computer program (303), comprising computer readable code units which when executed on a computer (110) causes the computer (110) to perform the method according to any one of claims 1-
10. A computer program carrier (305) comprising the computer program according to thepreceding claim, wherein the carrier (505) is one of an electronic signal, an optical signal, a radio signal and a computer readable medium.
SE2030373A 2020-12-22 2020-12-22 Method and computing function for managing risk factor relating to damages to venue SE2030373A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
SE2030373A SE2030373A1 (en) 2020-12-22 2020-12-22 Method and computing function for managing risk factor relating to damages to venue
PCT/EP2021/085786 WO2022136035A1 (en) 2020-12-22 2021-12-14 Method and computing function for mananging risk factor relating to damages to venue

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
SE2030373A SE2030373A1 (en) 2020-12-22 2020-12-22 Method and computing function for managing risk factor relating to damages to venue

Publications (1)

Publication Number Publication Date
SE2030373A1 true SE2030373A1 (en) 2022-06-23

Family

ID=79283277

Family Applications (1)

Application Number Title Priority Date Filing Date
SE2030373A SE2030373A1 (en) 2020-12-22 2020-12-22 Method and computing function for managing risk factor relating to damages to venue

Country Status (2)

Country Link
SE (1) SE2030373A1 (en)
WO (1) WO2022136035A1 (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9196148B1 (en) * 2013-03-15 2015-11-24 Alarm.Com Incorporated Location based monitoring system alerts
EP2985666A2 (en) * 2014-08-11 2016-02-17 LSIS Co., Ltd. On-line status diagnosis device and on-line status diagnosis method for electric power utilities
WO2016126660A1 (en) * 2015-02-06 2016-08-11 Honeywell International Inc. Notification subsystem for generating consolidated, filtered, and relevant security risk-based notifications
EP3270242A1 (en) * 2016-07-13 2018-01-17 Honeywell International Inc. Systems and methods for predicting and displaying site safety metrics
US9947202B1 (en) * 2016-01-06 2018-04-17 State Farm Mutual Automobile Insurance Company Sensor data to identify catastrophe areas
US10767879B1 (en) * 2014-02-13 2020-09-08 Gregg W Burnett Controlling and monitoring indoor air quality (IAQ) devices

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9798993B2 (en) * 2014-02-11 2017-10-24 State Farm Mutual Automobile Insurance Company Systems and methods for simulating home loss prevention
US10198771B1 (en) 2014-06-20 2019-02-05 Allstate Insurance Company Data hub
KR102602216B1 (en) * 2017-12-22 2023-11-15 삼성전자주식회사 Method and apparatus for controlling appliance device based on failure prediction

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9196148B1 (en) * 2013-03-15 2015-11-24 Alarm.Com Incorporated Location based monitoring system alerts
US10767879B1 (en) * 2014-02-13 2020-09-08 Gregg W Burnett Controlling and monitoring indoor air quality (IAQ) devices
EP2985666A2 (en) * 2014-08-11 2016-02-17 LSIS Co., Ltd. On-line status diagnosis device and on-line status diagnosis method for electric power utilities
WO2016126660A1 (en) * 2015-02-06 2016-08-11 Honeywell International Inc. Notification subsystem for generating consolidated, filtered, and relevant security risk-based notifications
US9947202B1 (en) * 2016-01-06 2018-04-17 State Farm Mutual Automobile Insurance Company Sensor data to identify catastrophe areas
EP3270242A1 (en) * 2016-07-13 2018-01-17 Honeywell International Inc. Systems and methods for predicting and displaying site safety metrics

Also Published As

Publication number Publication date
WO2022136035A1 (en) 2022-06-30

Similar Documents

Publication Publication Date Title
US10565541B2 (en) Systems and methods for simulating home loss prevention
US12033119B2 (en) Integrated home scoring system
US10008092B2 (en) Method, apparatus, and storage medium for alerting cooking state of electric cooker
US20180238765A1 (en) Method and system for water metering and unusual water flow detection
CN106548402B (en) Resource transfer monitoring method and device
WO2015032318A1 (en) Exceptional account determination method and device
CN106341248B (en) Fault processing method and device based on cloud platform
CN114120221A (en) Environment checking method based on deep learning, electronic equipment and storage medium
US20170139384A1 (en) Recommendation apparatus, recommendation method and non-transitory computer readable medium
US20140032137A1 (en) Heating system state monitoring and reporting system and device
US20190226872A1 (en) Environmental parameter measurement systems
CN109379703B (en) Disaster area judgment method based on mobile terminal networking data
SE2030373A1 (en) Method and computing function for managing risk factor relating to damages to venue
US9819722B2 (en) System and method for controlling an information handling system in response to environmental events
CN106650281A (en) Data processing method and system, server and client
US10503575B2 (en) Computer systems monitoring using beat frequency analysis
JP6594110B2 (en) Control device, control system, and program
CN114693226A (en) Approval process construction method, device, equipment and storage medium
TWI819179B (en) Method, device for smart shutdown, and electronic device
CN112147902B (en) Indoor water consumption condition prompting method, system, storage medium and electronic equipment
US10481045B2 (en) Assessing performance of an HVAC system
CN111966142A (en) Intelligent temperature detection method and device and intelligent control device
CN114417142A (en) Intelligent information pushing method and device, intelligent equipment and storage medium
CN112507807A (en) Article storage control method and device, storage medium and electronic device
JP2020133966A (en) Information processing device, control method of information processing device, control program, and recording medium

Legal Events

Date Code Title Description
NAV Patent application has lapsed