Method and system for service verification using access control system
10735418 ยท 2020-08-04
Assignee
Inventors
- Alexandra K. Norton (Duxbury, MA, US)
- Tyler H. Brown (New Haven, CT, US)
- Miguel Galvez (Plaistow, NH, US)
Cpc classification
H04L63/10
ELECTRICITY
H04L63/0876
ELECTRICITY
International classification
H04L9/00
ELECTRICITY
Abstract
A service management system facilitates and validates service on building management systems installed in a building with an access control system. A service workflow module receives device events from control panels of the building management systems and combines them with local service data from mobile computing devices of technicians performing the service, generating service events. A validation module receives the service events and retrieves access control events from an access control system controller of the access control system and determines whether they are coherent. The service workflow module also infers the location of the technician based on the access control events and sends service eligible devices to be displayed on the mobile computing devices of the technicians. In an alternative embodiment, device events from a building automation system such as a heating, ventilation and air-conditioning system are further used to validate the service events.
Claims
1. A service management system for facilitating testing of a building management system of a building, comprising: a service workflow module for receiving device events from the building management system and local service data from a mobile computing device operated by a technician and generating service events; an access control system interface for receiving access control events from an access control system for the building; and a validation module for analyzing the service events from the service workflow module and the access control events to validate the service on the building management system, wherein the validation module validates service events on the building management system based on whether the access control events indicate that access was granted to the technician by the access control system to zones of the building containing distributed devices and/or control panels of the building management system that were indicated in the service events.
2. The system as claimed in claim 1, wherein the validation module further validates service on the building management system based on a comparison of a duration of time spent in zones of the building containing the distributed devices and/or control panels with a predetermined threshold.
3. The system as claimed in claim 1, wherein the building management system is a fire alarm system.
4. The system as claimed in claim 3, wherein the validation module validates testing the release of a fire door of the fire alarm system by determining whether the access control events indicate that the fire door closed.
5. The system as claimed in claim 3, wherein the validation module validates testing of egress routes unlocked in response to an alarm state of the fire alarm system by determining whether the access control events indicate that the access points along the egress routes were unlocked and/or accessed.
6. The system as claimed in claim 1, wherein, during the service on the building management system, the service workflow module infers a zone of the building in which the technician is located based on the access control events, provides service eligibility information to the mobile computing device of the technician based on the inferred zone, and logs the local service data received from the mobile computing device.
7. The system as claimed in claim 6, further comprising graphical user interfaces of the mobile computing devices for displaying the service eligibility information and for detecting input from the technician indicating local service data.
8. The system as claimed in claim 6, wherein the service eligibility information includes an indication of distributed devices and/or control panels of the building management system located in the same zone as the inferred zone.
9. The system as claimed in claim 6, wherein the inferred zone is based on the most recent access control event and/or a sequence of access control events.
10. A method for facilitating testing of a building management system of a building, comprising: a service workflow module receiving device events from the building management system and local service data from a mobile computing device operated by a technician, generating service events, and sending the service events to a validation module; the validation module receiving access control events from an access control system for the building via an access control system interface and analyzing the service events from the service workflow module and the access control events to validate the service on the building management system, wherein the validation module validates service events on the building management system based on whether the access control events indicate that access was granted to the technician by the access control system to zones of the building containing distributed devices and/or control panels of the building management system that were indicated in the service events.
11. The method as claimed in claim 10, further comprising the validation module further validating service on the building management system based on a duration of time spent in the zones of the building containing the distributed devices and/or control panels.
12. The method as claimed in claim 10, wherein the building management system is a fire alarm system.
13. The method as claimed in claim 12, further comprising the validation module validating testing the release of a fire door of the fire alarm system by determining whether the access control events indicate that the fire door closed.
14. The method as claimed in claim 12, further comprising the validation module validating testing of egress routes unlocked in response to an alarm state of the fire alarm system by determining whether the access control events indicate that the access points along the egress routes were unlocked and/or accessed.
15. The method as claimed in claim 10, further comprising the service workflow module, during the service on the building management system, receiving the access control events from the access control system via the access control system interface, inferring a zone of the building in which the technician is located based on the access control events, providing service eligibility information to the mobile computing device of the technician based on the inferred zone, and logging the local service data received from the mobile computing device.
16. The method as claimed in claim 15, further comprising graphical user interfaces of the mobile computing devices displaying the service eligibility information and detecting input from the technician indicating the local service data.
17. The method as claimed in claim 15, wherein the service eligibility information includes an indication of distributed devices and/or control panels of the building management system located in the same zone as the inferred zone.
18. The method as claimed in claim 15, further comprising inferring the zone in which the technician is located based on the most recent access control event and/or a sequence of access control events.
19. The method as claimed in claim 10, wherein the building management system is a fire alarm system, and the method further comprises: a fire alarm control panel, during the service on the building management system, sending instructions to release fire doors of the fire alarm system and/or unlock doors along egress routes of the building in response to an alarm state; the service workflow module receiving the local service data, including results of inspections of the fire doors and/or the doors along the egress routes from the mobile computing device; and the validation module determining whether the access control events indicate that the fire door closed and/or that the doors along the egress routes were unlocked, wherein the access control events include door position information generated by door position sensors for the fire door and/or for the doors along the egress route.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
(1) In the accompanying drawings, reference characters refer to the same parts throughout the different views. The drawings are not necessarily to scale; emphasis has instead been placed upon illustrating the principles of the invention. Of the drawings:
(2)
(3)
(4)
(5)
(6)
(7)
(8)
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
(9) The invention now will be described more fully hereinafter with reference to the accompanying drawings, in which illustrative embodiments of the invention are shown. This invention may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art.
(10) As used herein, the term and/or includes any and all combinations of one or more of the associated listed items. Further, the singular forms and the articles a, an and the are intended to include the plural forms as well, unless expressly stated otherwise. It will be further understood that the terms: includes, comprises, including and/or comprising, when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. Further, it will be understood that when an element, including component or subsystem, is referred to and/or shown as being connected or coupled to another element, it can be directly connected or coupled to the other element or intervening elements may be present.
(11)
(12) The service management system includes a connected services system 102, which, at a high level, communicates with building management systems and an access control system installed within buildings 103 of various client entities, typically. Examples of client entities include residential, commercial, or governmental companies or agencies. Examples of the buildings include offices, hospitals, warehouses, retail establishments, shopping malls, schools, multi-unit dwellings, government buildings, or casinos, to list a few examples.
(13) In the illustrated example, the building 103 is divided into zones 1-4, with access points 120 providing access to the zones. More specifically, access point 120-1 provides access from the exterior of the building to zone 1, access point 120-2 provides access between zone 1 and zone 2, access point 120-3 provides access between zone 2 and zone 3, and access point 120-4 provides access between zone 3 and zone 4.
(14) In general, the building management systems include control panels 116 and distributed devices 130. The control panels 116 direct the function of the respective building management system by determining and displaying the operational status of or sensor data from the distributed devices 130.
(15) The distributed devices 130 are connected to their respective control panels 116 via safety and security wired and/or wireless networks 111 of the building 103. These networks 111 support data and/or analog communication between the distributed devices 130 and the respective control panels 116. In some embodiments (not illustrated), the distributed devices 130 could all be connected to the same safety and security network 111.
(16) In the illustrated example, distributed fire alarm devices 130 of the fire alarm system are connected to a fire alarm system control panel 116-1 via safety and security network 111-1 and are slave devices of the panel.
(17) The distributed fire alarm devices 130 include alarm initiation devices including smoke detectors 130-2, 130-5, 130-9, 130-11, heat detectors 130-8 and manually activated devices such as call points 130-4 and pull stations 130-7. Alarm initiation devices can also include devices that are not depicted in the illustrated example, including carbon monoxide detectors. The alarm initiation devices monitor the buildings for indicators of fire. Upon detection of indicators of fire, device signals are sent from the alarm initiating devices to the control panel. The device signals are typically alarm signals and/or analog values. The alarm signals are used to signal the control panel that a fire has been detected. Alternatively, some devices provide analog values to indicate measured conditions. In one example, temperature sensors provide analog values for measured temperatures. In another example, smoke sensors provide analog values indicating smoke obscuration levels. The control panel then determines if the analog values are indicative of a fire. Additionally, in some examples, the alarm initiation devices provide both alarm signals and analog values.
(18) The distributed fire alarm devices 130 could further include fire notification devices (not illustrated), which notify occupants of the building 103 of a potential fire and generally include speakers, horns, bell, chimes, light emitting diode (LED) reader boards, and/or flashing lights (e.g., strobes), to list a few examples. In response to detection of indicators of fire, the fire alarm system control panel 116-1 initiates an alarm state, which activates the fire notification devices.
(19) The fire alarm system also includes a fire door 126 at access point 120-3. The fire door 126 is a door that is typically held open during normal operation and closed by a fire door release 130-6 in response to an alarm state, under control of the access control system controller 118 and/or the fire alarm system control panel 116-1.
(20) Similar to the fire alarm system, distributed devices 130 of the intrusion system are connected to an intrusion system control panel 116-2 via a second network 111-2.
(21) The distributed intrusion devices 130 include devices for detecting the presence of unauthorized individuals in the building 103, including motion detectors 130-1, 130-3, 130-10, 130-12 and other devices (not illustrated) such as security cameras, door and window relays and network video recorders, among other examples. Upon detection of the presence of unauthorized individuals, device signals are sent from the motion detectors 130-1, 130-3, 130-10, 130-12 to the intrusion control panel 116-2.
(22) The present system can be extended to other types of building management systems. For example in another implementation the panel is a building automation panel such as a panel that might control building climate including HVAC.
(23) The access control system includes an access control system controller 118, access control readers 122, and door controllers 124, connected via a third safety and security network 111-3.
(24) The access control readers 122 receive user credentials, typically from individuals swiping keycards or bringing contactless smart cards within range of an access control reader 122. The access control system controller 118 validates the user credentials, including whether the user is authorized to access specific access points 120, and sends instructions to the door controllers 124 to open or unlock the selected access points 120. The door controllers 124 open or unlock the access points 120 in response to instructions from the access control system controller 118 and also include door position sensors for determining the status of access points 120 such as whether they are locked, unlocked, open or closed. Additionally, the access control system controller 118 maintains access control events, which include information about access points 120 that were engaged with, including date and time information and the identity of individuals who engaged with the access points 120, and door position information, among other examples.
(25) In the illustrated example, a technician 150 holding a mobile computing device 152 is located in zone 2. The technician 150 is an individual performing service on the building management systems, including employees of entities occupying the building 103, property managers, building management system manufacturers and/or providers of service for building management systems.
(26) The mobile computing device 152 presents information about the building management systems, including real time status information of the distributed devices 130 such as whether signals have been received from those devices by the control panels 116 and date and time information pertaining to the received signals, receives local service data, including inspection results, service narrative information and/or service completion status for different devices, and sends the local service data to the connected services system 102. In the illustrated example, the mobile computing device 152 is a smartphone device. Alternatively, the mobile computing device 152 could be a laptop computer, tablet computer, phablet computer (i.e., a mobile device that is typically larger than a smart phone, but smaller than a tablet), smart watch, or specialized service and/or testing device to list a few examples.
(27) Each of the fire alarm system control panel 116-1, intrusion system control panel 116-2, access control system controller 118 and mobile computing device 152, are connected to the connected services system 102 via a leased data connection, private network and/or public network 114, such as the internet. In some cases, the control panels 116 have been given network connectivity to communicate with the connected services system 102; in other cases, testing computers connected to the control panels 116 function as gateways. The mobile computing device 152 connects to the public network 114 via a wireless communication link 170 to a cellular radio tower 172 of a mobile broadband or cellular network or public and/or private wired data networks such as an enterprise network, Wi-Max, or Wi-Fi network, for example.
(28) The connected services system 102 is typically implemented as a cloud system. It can be run on a proprietary cloud system or implemented on one of the popular cloud systems operated by vendors such as Alphabet Inc., Amazon, Inc. (AWS), or Microsoft Corporation.
(29) As a result, the connected services system 102 typically operates on a connected services server system 104. In some cases, this server system 104 is one or more dedicated servers. In other examples, they are virtual servers.
(30) The connected services server system 104 executes a number of separate modules, including a service validation module 108 and a service workflow module 110. Each of these modules is associated with separate tasks. In some cases, these modules are discrete modules or they are combined with other modules into a unified code base. They can be running on the same server or different servers, virtualized server system or a distributed computing system.
(31) The service workflow module 110 functions as an application server that communicates with the mobile computing device 152 operated by the technician 150. The service workflow module 110 provides the steps necessary for the technician 150 to service the building management system. The service workflow module 110 further receives the local service data provided by the technician 150 indicating that a particular panel 116 or distributed device 130 of the building management system has been serviced. This local service data may further include inspection results, narrative description from the technician describing the state of a particular panel 116 or distributed device 130, a description of its particular location, and/or notes concerning that panel or distributed device that might be useful for the next service. Further, the service workflow module 110 also receives device events from the particular panel 116 or distributed device 130 undergoing service and combines the device events with the local service data and then stores the resulting service events to a connected services database 106 in connection with the particular service being carried out on the building management system.
(32) Status information for the distributed devices 130 based on the device events is also pushed from the service workflow module 110 to the mobile computing device 152 to be displayed to the technician 150 in order to facilitate testing. For example, in response to activation of distributed devices 130 by the technician 150, the service workflow module 110 sends status information based on device events from the devices to the mobile computing device 152, which displays the status information to the technician 150. In this way, the technician 150 can determine how the distributed devices 130 responded in real time.
(33) The connected services database 106 provides customer specific installation information to the service workflow module 110. In particular, the connected services database 106 includes lists of control panels 116 installed at various customer premises, the distributed devices 130 maintained by those panels, and historical test data associated with those panels and distributed devices.
(34) The connected services system 102 also includes a building management system interface 112 and an access control system interface 113.
(35) The building management system interface 112 operates as the interface between the service workflow module 110 and the particular control panel 116 undergoing service. In particular, the building management system interface 112 converts instructions from the service workflow module 110 into instructions that are formatted into the protocol implemented by the particular panel. Additionally, the building management system interface 112 receives information such as device events from the current control panel 116 or distributed device 130 under service and converts those device events into a uniform format that can be consumed by the service workflow module 110, regardless of the underlying protocol implemented by the panels and distributed devices.
(36) The access control system interface 113 operates as an interface between the service validation module 108 or service workflow module 110 and the access control system controller 118 for the building 103 and the client for which the services are being performed. The access control system interface 113 queries the access control system controller 118 to obtain access control events for the building 103. In particular, the access control system interface 113 queries the access control system controller 118 for access control events associated with key card swipes of the technician 150 at the various access control readers 122 of the building 103.
(37) The service workflow module 110 communicates with the access control system interface 113 in order to determine which distributed devices 130 and/or control panels 116 are eligible for service based on access control events received from the access control system controller 118. The service workflow module 110 infers the current location of the technician 150 based on the access control events and pushes the next device or devices to be serviced to the mobile computing device 152 to be indicated by a graphical user interface (GUI) 154 of the mobile computing device 152.
(38) The service validation module 108 communicates with the service workflow module 110 and the access control interface 113 in order to validate service being performed on the building management system undergoing service. In particular, the service validation module 108 receives service events, including real time service information from the service workflow module 110 or possibly historical service information. At the same time, the service validation module 108 also acquires access control events via the access control system interface 113 from the access control system controller 118 for the building 103 at which the services are being performed. The service validation module 108 then compares the service events including the time at which the service event were generated against the access control events and the time at which the access control events were generated to ensure coherency. In an example, the service validation module 108 confirms that the technician 150 entered into a part of the building 103 through an access control reader 122 that is consistent with the service events that were also generated at that approximate time.
(39)
(40) In step 200, the service workflow module sends the devices 116, 130 to be serviced to the mobile computing device 152, which displays them to the technician 150 in step 202.
(41) In step 204, the technician 150 performs the service, for example, by applying smoke to a smoke detector in order to test it.
(42) In response, in step 206, the distributed device 130 sends sensor values/alarm state signals to the control panel 116, which generates device events (which can include the sensor values or alarm state signals and time information, for example) and sends the device events to the service workflow module 110 in step 208.
(43) In step 210, the technician 150 also inputs local service data to the mobile computing device 152, and these are sent from the mobile computing device 152 to the service workflow module 110 in step 212.
(44) In step 214, the service workflow module 110 combines the local service data with the device events, resulting in service events, which are stored in the connected services database 106. The service events are sent to the service validation module 108 in step 216.
(45) In response, in step 218, the service validation module requests access control events (including which access points were accessed and opened by the inspector) from the access control system controller 118, and the access control events are sent to the service validation module 108 in step 220.
(46) In step 222, the service validation module 108 compares the access control events to the service events and determines whether the service events are coherent with the access control events. This can be done in a number of ways. In one example, the service validation module 108 determine whether access was to the technician 150 to zones of the building 103 containing distributed devices 130 or control panels 116 that were serviced. In another example, the duration of time spent in zones containing the serviced devices is compared by the service validation module 108 to a predetermined threshold, which is calculated based on service events stored in the connected services database 106.
(47) In step 224, the service validation module returns the validation results to the service workflow module, which stores them and generates a report including the validation results in step 226. The validation results and the generated report are retained as evidence that the service was completed, for example, in the case of an audit.
(48)
(49) In step 302, the service workflow module 110 requests access control events from the access control system controller 118 via the access control system interface 113. In response, in step 304, the access control events are sent to the service workflow module 110. Steps 302 and 304 are completed continuously, as the technician 150 proceeds throughout the building 103.
(50) In step 306, the service workflow module infers the zone in which the technician 150 is located based on the access control events. The inferred zone is determined based on the most recent access control events and/or a sequence of access control events, among other examples. In step 308, service eligible devices that are located in that zone are sent to the mobile computing device 152.
(51) The service proceeds in steps 202 through 214 as previously described.
(52)
(53) First, in step 402, the technician 150 initiates an alarm state in the fire alarm system control panel 116-1. This can be done directly or via the mobile computing device 152 or activating an initiation device, among other examples.
(54) In response, in step 404, the fire alarm system control panel 116-1 sends instructions to the fire door release 130-6 to release the fire door 126 and, in step 405, sends instructions to the access control system controller 118 to unlock doors along predetermined egress/evacuation routes within in the building 103.
(55) In step 208, the fire alarm system control panel 116-1 sends device events to the service workflow module as previously described.
(56) In step 406, the technician 150 confirms that the fire door closed properly and/or that the egress routes were unlocked, for example, by approaching and inspecting the fire door 130-6 and the access points along the egress routes.
(57) In step 408, the technician 150 enters local service data, including the results of the inspection of the fire door 130-6 and egress routes, into the mobile computing device 152.
(58) Steps 212 through steps 220 then proceed as previously described as service events including the device events and local service data are sent to the service validation module 108, and access control events are retrieved from the access control system controller 118.
(59) In step 410, the service validation module determines whether the fire door closed and/or that egress routes were unlocked based on the access control system events, in particular, based on door position information generated by door position sensors of the fire door controller 124-3 and door controllers 124 along the egress routes. Validation results are generated and sent to the service workflow module which generates a report in steps 224 through 226 as previously described.
(60)
(61) The GUI 154 is rendered on a touchscreen display 502 of the mobile computing device 152 and indicates service eligible devices which are pushed down from the service workflow module 110 and are based on the access control events retrieved from the access control system controller 118 as previously discussed.
(62) The service eligible devices include a motion detector 130-3, smoke detector 130-5, call point 130-4, fire door release 130-6, and fire control panel 116-1. The particular service eligible devices indicated are those that would be indicated, for example, if the most recent access control event indicates that the technician 150 recently passed through an access point 120 leading to a zone containing those devices.
(63) Additionally, a graphical element labeled Select device is included, for indicating which device will be serviced next by the technician 150. When it is selected, the GUI 154 would proceed to a different screen (not illustrated) in which information about the device would be displayed and/or local service data could be entered.
(64) It should be noted that the service eligible devices indicated by the GUI 154 can include the distributed devices 130 of the building management systems, the building management system control panels 116, and/or any other devices that are indicated to be located in the inferred zone based on data accessible to the connected services system 102.
(65)
(66) Here, instead of an access control system, the building 103 contains a building automation system, such as a heating, ventilation, and air conditioning (HVAC) system. The HVAC system includes an HVAC system control panel 600 connected to an air handler 602 for circulating air through a system of ducts 606 terminating in vents 604, which are distributed throughout the building 103.
(67) As with other building management system control panels 116, the HVAC system control panel 600 directs the function of the HVAC system.
(68) In response to an alarm state, the fire alarm system control panel 116-1 sends instructions to the HVAC system control panel 600 to stop the air handler 602 from operating and/or to close the dampers. These instructions can be sent via the connected services system 102 or a direct communications link (not illustrated) between the two control panels 116-1, 600.
(69) In this embodiment, the service validation module 108 retrieves HVAC device events from the HVAC system control panel and compares them to the service events generated during service to determine whether the air handler 600 properly stopped operating in response to an alarm state in the fire alarm system control panel 116-1 and/or that the dampers closed.
(70)
(71) First, in step 702, the technician initiates an alarm state in the fire alarm system control panel 116-1. In response, the fire alarm system control panel 116-1 sends instructions to the HVAC system control panel 600 to stop the air handler 600 from operating and/or to close the dampers, which the HVAC system control panel 600 sends to the air handler 602 in step 706. Device events are also sent from the fire alarm system control panel 116-1 to the service workflow module in step 208 as previously described. Additionally, the HVAC system control panel 600 sends HVAC device events to the service workflow module 110 in step 707.
(72) In step 708, the service workflow module 110 sends status information for the air handler 602 based on the HVAC device events to the mobile computing device 152, which displays the status information to the technician 150 in step 709.
(73) In step 710, the technician 150 confirms that the air handler shut off and/or that the dampers closed, for example, by viewing the status information for the air handler 602 and/or damper position sensors of the dampers via the mobile computing device 152 and/or by listening at one of the vents 604 throughout the building 103. The technician 150 then enters local service data including air handler inspection results into the mobile computing device 152 in step 711.
(74) In step 712, the local service data is sent to the service workflow module 110, which combines the local service data with the device events and stores the service events in step 714.
(75) In step 716, the service events are sent to the service validation module 108, which requests HVAC device events from the HVAC system control panel 600 in step 718 in order to further validate the service. In step 720, the HVAC device events are sent to the service validation module 108, which determines whether the air handler stopped operating based on the HVAC device events and generates validation results in step 722. The report is generated in steps 224 through 226 proceed as previously described.
(76) In this way, the event information from the HVAC system control panel 600 are used by the technician 150, via the service workflow module 110 and the mobile computing device 152, to determine the inspection results, and by the service validation module 108 to further validate and/or document the inspection results.
(77) While this invention has been particularly shown and described with references to preferred embodiments thereof, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the scope of the invention encompassed by the appended claims.