Computer system and method of detecting manufacturing network anomalies
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G08B-021/00
G06F-011/07
G05B-023/02
출원번호
US-0910920
(2018-03-02)
등록번호
US-10169135
(2019-01-01)
발명자
/ 주소
Pandey, Aparna
Troy de Fritas, Nelson
출원인 / 주소
Uptake Technologies, Inc.
대리인 / 주소
Lee Sullivan Shea & Smith, LLP
인용정보
피인용 횟수 :
0인용 특허 :
91
초록▼
A computing system may be configured to monitor the operation of a plurality of nodes in a manufacturing network that comprises a plurality of edge nodes, a plurality of intermediate nodes, and a root node. While monitoring the operation of the plurality of nodes, the computing system may identify a
A computing system may be configured to monitor the operation of a plurality of nodes in a manufacturing network that comprises a plurality of edge nodes, a plurality of intermediate nodes, and a root node. While monitoring the operation of the plurality of nodes, the computing system may identify a given time at which at least one node in the manufacturing network satisfies node-level threshold criteria indicating anomalous operation of the node and responsively evaluate the operation of the manufacturing network at the given time using one or more of macro-level threshold, micro-level threshold criteria, path-level threshold criteria, and node-level threshold criteria. Based on the evaluation, the computing system may identify an anomaly in the manufacturing network at the given time and then cause a client station to present an alert indicating the anomaly.
대표청구항▼
1. A computing system comprising: a network interface;at least one processor;a non-transitory computer-readable medium; andprogram instructions stored on the non-transitory computer-readable medium that are executable by the at least one processor to cause the computing system to: monitor operation
1. A computing system comprising: a network interface;at least one processor;a non-transitory computer-readable medium; andprogram instructions stored on the non-transitory computer-readable medium that are executable by the at least one processor to cause the computing system to: monitor operation of a plurality of nodes in a manufacturing network that comprises a plurality of edge nodes, a plurality of intermediate nodes, and a root node;while monitoring the operation of the plurality of nodes in the manufacturing network, identify a given time at which at least one node in the manufacturing network satisfies node-level threshold criteria indicating anomalous operation of the node;in response to identifying the given time at which at least one node satisfies the node-level threshold criteria, evaluate the operation of the manufacturing network at the given time using one or more of (a) macro-level threshold criteria indicating anomalous operation of the manufacturing network as a whole, (b) micro-level threshold criteria indicating anomalous operation of any micro-network in the manufacturing network, (c) path-level threshold criteria indicating anomalous operation of any node path in the manufacturing network, and (d) node-level threshold criteria indicating anomalous operation of any individual node in the manufacturing network;based on the evaluation, identify at least one anomaly in the manufacturing network at the given time; andcause a client station to present an alert indicating the at least one anomaly identified in the manufacturing network at the given time. 2. The computing system of claim 1, wherein the program instructions that are executable by the at least one processor to cause the computing system to identify a given time at which at least one node in the manufacturing network satisfies node-level threshold criteria indicating anomalous operation of the node comprise program instructions stored on the non-transitory computer-readable medium that are executable by the at least one processor to cause the computing system to carry out the following functions for each of the plurality of nodes in the manufacturing network: evaluate the operation of the node during a given window of time prior to the given time to determine a total amount of time that the node was anomalous during the given window of time; anddetermine whether the total amount of time that the node was anomalous during the given window of time exceeds a threshold amount of time. 3. The computing system of claim 1, wherein the program instructions that are executable by the at least one processor to cause the computing system to evaluate the operation of the manufacturing network at the given time comprise program instructions stored on the non-transitory computer-readable medium that are executable by the at least one processor to cause the computing system to:determine an extent of nodes in the manufacturing network that were anomalous at the given time; anddetermine that the extent of nodes in the manufacturing network that were anomalous at the given time exceeds a threshold extent of anomalous nodes in a manufacturing network. 4. The computing system of claim 1, wherein the program instructions that are executable by the at least one processor to cause the computing system to evaluate the operation of the manufacturing network at the given time comprise program instructions stored on the non-transitory computer-readable medium that are executable by the at least one processor to cause the computing system to carry out the following functions for each of a plurality of micro-networks in the manufacturing network: based on the evaluation of the operation of the manufacturing network at the given time, determine an extent of nodes in the micro-network that were anomalous at the given time; anddetermine whether the extent of nodes in the micro-network that were anomalous at the given time exceeds a threshold extent of anomalous nodes in a micro-network. 5. The computing system of claim 4, further comprising program instructions stored on the non-transitory computer-readable medium that are executable by the at least one processor to cause the computing system to: for each micro-network identified to be anomalous at the given time, identify the root node of the micro-network as a potential root cause of the anomalous operation of the manufacturing network at the given time. 6. The computing system of claim 1, wherein the program instructions that are executable by the at least one processor to cause the computing system to evaluate the operation of the manufacturing network at the given time comprise program instructions stored on the non-transitory computer-readable medium that are executable by the at least one processor to cause the computing system to carry out the following functions for each of a plurality of node paths in the manufacturing network: evaluate the operation of each node in the node path at the given time to determine whether any node in the node path satisfies node-level threshold criteria indicating anomalous operation of a node;based on the evaluation of the operation of the manufacturing network at the given time, determine an extent of nodes in the node path that were anomalous at the given time; anddetermine whether the number of nodes in the node path that were anomalous at the given time exceeds a threshold extent of anomalous nodes in the node path. 7. The computing system of claim 6, further comprising program instructions stored on the non-transitory computer-readable medium that are executable by the at least one processor to cause the computing system to: for each node path identified to be anomalous at the given time, identify one or both of a head node and a tail node of the node path as a potential root cause of the anomalous operation of the manufacturing network at the given time. 8. A computing system comprising: a network interface;at least one processor;a non-transitory computer-readable medium; andprogram instructions stored on the non-transitory computer-readable medium that are executable by the at least one processor to cause the computing system to: monitor operation of a manufacturing network that comprises a plurality of edge nodes, a plurality of intermediate nodes, and a root node;while monitoring the operation of the manufacturing network, identify a given time at which the manufacturing network satisfies macro-level threshold criteria indicating anomalous operation of the manufacturing network;in response to identifying the given time at which the manufacturing network satisfies the macro-network threshold criteria, evaluate the operation of a plurality of discrete segments of the manufacturing network at the given time to determine whether any of the plurality of discrete segments of the manufacturing network satisfies segment-level threshold criteria indicating anomalous operation of the segment;based on the evaluation, identify one or more segments of the manufacturing network that were anomalous at the given time; andcause a client station to present an alert indicating that the identified one or more segments of the manufacturing network were anomalous at the given time. 9. The computing system of claim 8, wherein the program instructions that are executable by the at least one processor to cause the computing system to identify the given time at which the manufacturing network satisfies the macro-level threshold criteria comprise program instructions stored on the non-transitory computer-readable medium that are executable by the at least one processor to cause the computing system to: determine an extent of nodes in the manufacturing network that were anomalous at the given time; anddetermine that the extent of nodes in the manufacturing network that were anomalous at the given time exceeds a threshold extent of anomalous nodes in a manufacturing network. 10. The computing system of claim 8, wherein the plurality of discrete segments of the manufacturing network comprise a plurality of micro networks in the manufacturing network, and wherein the program instructions that are executable by the at least one processor to cause the computing system to evaluate the operation of a plurality of discrete segments of the manufacturing network at the given time comprise program instructions stored on the non-transitory computer-readable medium that are executable by the at least one processor to cause the computing system to carry out the following functions for each of the plurality of micro networks in the manufacturing network: evaluate the operation of each node in the micro network at the given time to determine whether any node in the micro network satisfies node-level threshold criteria indicating anomalous operation of a node;based on the evaluation, determine an extent of nodes in the micro network that were anomalous at the given time; anddetermine whether the extent of nodes in the micro network that were anomalous at the given time exceeds a threshold extent of anomalous nodes in a micro network. 11. The computing system of claim 10, further comprising program instructions stored on the non-transitory computer-readable medium that are executable by the at least one processor to cause the computing system to: for each micro network identified to be anomalous at the given time, identify the root node of the micro network as a potential root cause of the anomalous operation of the manufacturing network at the given time. 12. The computing system of claim 8, wherein the plurality of discrete segments of the manufacturing network comprise a plurality of node paths in the manufacturing network, and wherein the program instructions that are executable by the at least one processor to cause the computing system to evaluate the operation of a plurality of discrete segments of the manufacturing network at the given time comprise program instructions stored on the non-transitory computer-readable medium that are executable by the at least one processor to cause the computing system to carry out the following functions for each of the plurality of node paths in the manufacturing network: evaluate the operation of each node in the node path at the given time to determine whether any node in the node path satisfies node-level threshold criteria indicating anomalous operation of a node;based on the evaluation, determine an extent of nodes in the node path that were anomalous at the given time; anddetermine whether the number of nodes in the node path that were anomalous at the given time exceeds a threshold extent of anomalous nodes in a node path. 13. The computing system of claim 10, further comprising program instructions stored on the non-transitory computer-readable medium that are executable by the at least one processor to cause the computing system to: for each node path identified to be anomalous at the given time, identify one or both of a head node and a tail node of the node path as a potential root cause of the anomalous operation of the manufacturing network at the given time. 14. The computing system of claim 8, wherein the plurality of discrete segments of the manufacturing network comprise a plurality of individual nodes in the manufacturing network, and wherein the program instructions that are executable by the at least one processor to cause the computing system to evaluate the operation of a plurality of discrete segments of the manufacturing network at the given time comprise program instructions stored on the non-transitory computer-readable medium that are executable by the at least one processor to cause the computing system to evaluate the operation of each of the plurality of individual nodes at the given time to determine whether the individual node satisfies node-level threshold criteria indicating anomalous operation of a node. 15. The computing system of claim 14, wherein the program instructions that are executable by the at least one processor to cause the computing system to evaluate the operation of each of the plurality of individual nodes at the given time comprise program instructions stored on the non-transitory computer-readable medium that are executable by the at least one processor to cause the computing system to carry out the following functions for each of the plurality of individual nodes in the manufacturing network: evaluate the operation of the node during a given window of time prior to the given time to determine a total amount of time that the node was anomalous during the given window of time; anddetermine whether the total amount of time that the node was anomalous during the given window of time exceeds a threshold amount of time. 16. A computer-implemented method comprising: monitoring operation of a plurality of nodes in a manufacturing network that comprises a plurality of edge nodes, a plurality of intermediate nodes, and a root node;while monitoring the operation of the plurality of nodes in the manufacturing network, identifying a given time at which at least one node in the manufacturing network satisfies node-level threshold criteria indicating anomalous operation of the node;in response to identifying the given time at which at least one node satisfies the node-level threshold criteria, evaluating the operation of the manufacturing network at the given time using one or more of (a) macro-level threshold criteria indicating anomalous operation of the manufacturing network as a whole, (b) micro-level threshold criteria indicating anomalous operation of any micro-network in the manufacturing network, (c) path-level threshold criteria indicating anomalous operation of any node path in the manufacturing network, and (d) node-level threshold criteria indicating anomalous operation of any individual node in the manufacturing network;based on the evaluation, identifying at least one anomaly in the manufacturing network at the given time; andcausing a client station to present an alert indicating the at least one anomaly identified in the manufacturing network at the given time. 17. The computer-implemented method of claim 16, wherein the at least one anomaly comprises a micro-network anomaly, the method further comprising: identifying the root node of the micro-network as a potential root cause of the anomalous operation of the manufacturing network at the given time. 18. The computer-implemented method of claim 16, wherein the at least one anomaly comprises a node-path anomaly, the method further comprising: identifying one or both of a head node and a tail node of the node path as a potential root cause of the anomalous operation of the manufacturing network at the given time. 19. A computer-implemented method comprising: monitoring the operation of a manufacturing network that comprises a plurality of edge nodes, a plurality of intermediate nodes, and a root node;while monitoring operation of the manufacturing network, identifying a given time at which the manufacturing network satisfies macro-level threshold criteria indicating anomalous operation of the manufacturing network;in response to identifying the given time at which the manufacturing network satisfies the macro-network threshold criteria, evaluating the operation of a plurality of discrete segments of the manufacturing network at the given time to determine whether any of the plurality of discrete segments of the manufacturing network satisfies segment-level threshold criteria indicating anomalous operation of the segment;based on the evaluation, identifying one or more segments of the manufacturing network that were anomalous at the given time; andcausing a client station to present an alert indicating that the identified one or more segments of the manufacturing network were anomalous at the given time. 20. The computer-implemented method of claim 19, wherein the plurality of discrete segments comprise one or more of a plurality of micro networks in the manufacturing network, a plurality of node paths in the manufacturing network, and a plurality of individual nodes in the manufacturing network.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (91)
Wegerich,Stephan W.; Bell,David R.; Xu,Xiao, Adaptive modeling of changed states in predictive condition monitoring.
Jammu, Vinay Bhaskar; Schneider, William Roy; Bliley, Richard Gerald; Varma, Anil; Roddy, Nicholas Edward, Analyzing fault logs and continuous data for diagnostics for a locomotive.
Wegerich, Stephan W.; Wolosewicz, Andre; Xu, Xiao; Herzog, James P.; Pipke, Robert Matthew, Automated model configuration and deployment system for equipment health monitoring.
Meek, Christopher A.; Heckerman, David E.; Rounthwaite, Robert L.; Chickering, David Maxwell; Thiesson, Bo, Bayesian approach for learning regression decision graph models and regression models for time series analysis.
Vipin Kewal Ramani ; Rasiklal Punjalal Shah ; Ramesh Ramachandran ; Piero Patrone Bonissone ; Yu-To Chen ; Phillip Edward Steen ; John Andrew Johnson, Diagnostic system with learning capabilities.
Bankert Raymond J. (Clifton Park NY) Imam Imdad (Schenectady NY) Rajiyah Harindra (Clifton Park NY), Integrated model-based reasoning/expert system diagnosis for rotating machinery.
Wang Hsu-Pin (Tallahassee FL) Huang Hsin-Hao (Kaohsiung TWX) Knapp Gerald M. (Baton Rouge LA) Lin Chang-Ching (Tallahassee FL) Lin Shui-Shun (Tallahassee FL) Spoerre Julie K. (Tallahassee FL), Machine fault diagnostics system and method.
David Richard Gibson ; Nicholas Edward Roddy ; Anil Varma, Method and system for analyzing fault and snapshot operational parameter data for diagnostics of machine malfunctions.
Yanosik, Jr., Edward Michael; Clifford, William Larson; Horejs, Timothy James; Yanosik, Ann Marie, Method and system for assessing adjustment factors in testing or monitoring process.
Subbu, Rajesh V.; Bonissone, Piero P.; Eklund, Neil H.; Iyer, Naresh S.; Shah, Rasiklal P.; Yan, Weizhong; Knodle, Chad E.; Schmid, James J., Method and system for performing model-based multi-objective asset optimization and decision-making.
Fera, Gregory J.; McQuown, Christopher M.; Reichenbach, Bryan S.; Wisniewski, Edward P., Method and system for sorting incident log data from a plurality of machines.
Bliley, Richard G.; Roddy, Nicholas E., Process and system for analyzing fault log data from a machine so as to identify faults predictive of machine failures.
Bonissone, Piero Patrone; Hershey, John Erik; Mitchell, Jr., Robert James; Subbu, Jr., Rajesh Venkat; Taware, Avinash Vinayak; Hu, Xiao, System and method for advanced condition monitoring of an asset system.
Subbu, Rajesh Venkat; Hershey, John Erik; Hu, Xiao; Mitchell, Jr., Robert James; Taware, Avinash Vinayak; Bonissone, Piero Patrone, System and method for advanced condition monitoring of an asset system.
Bonissone, Piero Patrone; Xue, Feng; Varma, Anil; Goebel, Kai Frank; Yan, Weizhong; Eklund, Neil Holger White, System and method for equipment remaining life estimation.
Goebel, Kai Frank; Bonissone, Piero Patrone; Yan, Weizhong; Eklund, Neil Holger White; Xue, Feng, System and method for equipment remaining life estimation.
Rasiklal Punjalal Shah ; Vipin Kewal Ramani ; Susan Teeter Wallenslager ; Christopher James Dailey, System and method for integrating a plurality of diagnostic related information.
Wegerich, Stephan W.; Wilks, Alan D.; Wolosewicz, Andre, System for extraction of representative data for training of adaptive process monitoring equipment.
Kasztenny, Bogdan Z.; Sollecito, Lawrence A.; Mazereeuw, Jeffrey G.; Mao, Zhihong, Systems and methods for predicting maintenance of intelligent electronic devices.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.