-
公开(公告)号:US20190243352A1
公开(公告)日:2019-08-08
申请号:US16269274
申请日:2019-02-06
Applicant: Johnson Controls Technology Company
Inventor: Donagh S. HORGAN , Jan R. HOLLIDAY
CPC classification number: G05B23/0281 , G05B23/0235 , G05B23/0264 , G05B23/0272 , G06F17/18
Abstract: A method for detecting anomalous behavior includes receiving a plurality of historical events that occurred over a time period, identifying respective timestamps of the plurality of events, and grouping the plurality of events into respective time buckets that extend over a predetermined time interval based on the respective timestamps. The method includes identifying a subset of the time buckets that are each associated with a particular first time unit of the plurality of first time units and a particular second time unit of the second plurality of time units, counting a number of the events in each of the subset, and generating a temporal profile including an occurrence rate calculated based on the counted number of events. The method includes receiving detected event(s) that belong to the subset, calculating a probability of observing the event(s) according to the temporal profile, and determining whether the event(s) correspond to an anomalous behavior by comparing the probability to predefined thresholds.
-
公开(公告)号:US20190244459A1
公开(公告)日:2019-08-08
申请号:US16269384
申请日:2019-02-06
Applicant: Johnson Controls Technology Company
Inventor: Donagh S. HORGAN , Jan R. HOLLIDAY , Eamonn O'Toole
CPC classification number: G07C9/00571 , G05B17/02 , G06F16/285 , G06F17/5004 , G07C9/00103 , G08B13/08
Abstract: A method in an access control system includes maintaining a database of access control event data generated by a plurality of access control devices installed in a building and iterating through the access control event data in order to generate a connectivity model for the building. Generating the connectivity model includes, for each iteration, identifying a user interaction with a first door at a first time and a user interaction with a second door at a second time, determining if a difference between the first time and the second time is less than a threshold period of time, and either creating the connection between the first door and the second door or updating a weight associated with the connection. The connectivity model can be used in the access control system to correlate access control events across locations in a building or building campus.
-