-
公开(公告)号:US10713909B2
公开(公告)日:2020-07-14
申请号:US16269437
申请日:2019-02-06
Applicant: Johnson Controls Technology Company
Inventor: Donagh S. Horgan , Jan R. Holliday , Eamonn O'Toole
IPC: G08B13/08 , G08B25/00 , G08B29/18 , G08B29/16 , G06N20/00 , G07C9/00 , G08B21/22 , G08B31/00 , G08B19/00 , G07C9/27 , G08B13/04
Abstract: A method in a building access control system includes receiving a first access control event from a sensor indicating a door has been forced open or has been held open for at least a predetermined amount of time, identifying a second access control event associated with the door, determining whether to generate an alarm by evaluating the second access control event relative to the first access control event, and providing the alarm to a user of the access control system responsive to a determination that the alarm should be generated.
-
公开(公告)号:US20190096014A1
公开(公告)日:2019-03-28
申请号:US16143037
申请日:2018-09-26
Applicant: Johnson Controls Technology Company
Inventor: Sajjad Pourmohammad , Jan R. Holliday , Eric Thiebaut-George , Donagh S. Horgan , Sanjeet Phatak , Youngchoon Park
Abstract: A building management system includes one or more computer-readable storage media having instructions stored thereon that, when executed by one or more processors, cause the one or more processors to receive a threat, the threat comprising a particular threat type, the threat indicating an incident affecting a risk value associated with an asset. The instructions cause the one or more processors to determine, based on the threat and the asset, the risk value at a first point in time, select a decay model based on the particular threat type, and update the risk value at a plurality of points in time after the first point in time with the decay model causing the risk value to decay.
-
公开(公告)号:US11048247B2
公开(公告)日:2021-06-29
申请号:US16269274
申请日:2019-02-06
Applicant: Johnson Controls Technology Company
Inventor: Donagh S. Horgan , Jan R. Holliday
Abstract: A method for detecting anomalous behavior includes receiving a plurality of historical events that occurred over a time period, identifying respective timestamps of the plurality of events, and grouping the plurality of events into respective time buckets that extend over a predetermined time interval based on the respective timestamps. The method includes identifying a subset of the time buckets that are each associated with a particular first time unit of the plurality of first time units and a particular second time unit of the second plurality of time units, counting a number of the events in each of the subset, and generating a temporal profile including an occurrence rate calculated based on the counted number of events. The method includes receiving detected event(s) that belong to the subset, calculating a probability of observing the event(s) according to the temporal profile, and determining whether the event(s) correspond to an anomalous behavior by comparing the probability to predefined thresholds.
-
公开(公告)号:US20190244450A1
公开(公告)日:2019-08-08
申请号:US16269472
申请日:2019-02-06
Applicant: Johnson Controls Technology Company
Inventor: Donagh S. Horgan , Jan R. Holliday , Eamonn O'Toole
Abstract: A method for controlling access to at least a portion of a building includes providing a temporal model identifying relationships between a first set of access control events based on times at which the first set of access control events occurred, providing a spatial model identifying relationships between a second set of access control events based on locations associated with the second set of access control events, providing a user model identifying patterns of user behavior based on a third set of access control events, receiving a fourth set of access control events comprising time data, and location data, and user data associated with the access control events, and determining whether to generate alarms responsive to receiving the fourth set of access control events using the temporal model, the spatial model, and the user model.
-
公开(公告)号:US20190243813A1
公开(公告)日:2019-08-08
申请号:US16255719
申请日:2019-01-23
Applicant: Johnson Controls Technology Company
Inventor: Sajjad Pourmohammad , Jacinta Moore , Maebh Costello , Nicolae Bogdan Pavel , Federico Fala , Jan R. Holliday , Youngchoon Park
IPC: G06F16/22 , G06F16/909 , G06N20/00
CPC classification number: G06F16/2282 , G05B15/02 , G06F16/909 , G06N20/00 , G08B19/00 , G08B25/006
Abstract: A building management system includes one or more computer-readable storage media having instructions stored thereon that, when executed by one or more processors, cause the one or more processors to receive threats, the threats each indicating an incident affecting a dynamic risk score associated with an asset, wherein one or more of the threats are current threats that are active at a current point in time and one or more of the threats are historic threats that were active at one or more past times. The instructions cause the one or more processors to generate, based on the one or more current threats, the dynamic risk score at the current point in time, generate, based on the one or more historic threats, a baseline risk score, and cause a user interface to display an indication of the dynamic risk score at the current point in time and an indication of the baseline risk score.
-
公开(公告)号:US10896561B2
公开(公告)日:2021-01-19
申请号:US16269384
申请日:2019-02-06
Applicant: Johnson Controls Technology Company
Inventor: Donagh S. Horgan , Jan R. Holliday , Eamonn O'Toole
Abstract: A method in an access control system includes maintaining a database of access control event data generated by a plurality of access control devices installed in a building and iterating through the access control event data in order to generate a connectivity model for the building. Generating the connectivity model includes, for each iteration, identifying a user interaction with a first door at a first time and a user interaction with a second door at a second time, determining if a difference between the first time and the second time is less than a threshold period of time, and either creating the connection between the first door and the second door or updating a weight associated with the connection. The connectivity model can be used in the access control system to correlate access control events across locations in a building or building campus.
-
公开(公告)号:US20200074821A1
公开(公告)日:2020-03-05
申请号:US16119172
申请日:2018-08-31
Applicant: Johnson Controls Technology Company
Inventor: Donagh S. Horgan , Jan R. Holliday , Eamonn O'Toole
Abstract: A building security system. The building security system includes a door analysis system for the building for detecting a lock defeat device (LDD) installed at a door of the building. The door analysis system includes a processing circuit configured to receive door data for the door of the building from an access control system, the door data including a plurality of door events; determine whether the LDD has been installed at the door by analyzing the plurality of door events with one or more LDD indicators; and generate an LDD event indicating that the LDD has been installed at the door in response to a determination that the LDD has been installed at the door based on an analysis with the one or more LDD indicators.
-
公开(公告)号:US20190244492A1
公开(公告)日:2019-08-08
申请号:US16269437
申请日:2019-02-06
Applicant: Johnson Controls Technology Company
Inventor: Donagh S. Horgan , Jan R. Holliday , Eamonn O'Toole
Abstract: A method in a building access control system includes receiving a first access control event from a sensor indicating a door has been forced open or has been held open for at least a predetermined amount of time, identifying a second access control event associated with the door, determining whether to generate an alarm by evaluating the second access control event relative to the first access control event, and providing the alarm to a user of the access control system responsive to a determination that the alarm should be generated.
-
公开(公告)号:US20190138512A1
公开(公告)日:2019-05-09
申请号:US16143221
申请日:2018-09-26
Applicant: Johnson Controls Technology Company
Inventor: Sajjad Pourmohammad , Jacinta Moore , Maebh Costello , Nicolae Bogdan Pavel , Federico Fala , Jan R. Holliday , Youngchoon Park
IPC: G06F16/22 , G06N20/00 , G06F16/909
Abstract: A building management system includes one or more computer-readable storage media having instructions stored thereon that, when executed by one or more processors, cause the one or more processors to receive threats, the threats each indicating an incident affecting a dynamic risk score associated with an asset, wherein one or more of the threats are current threats that are active at a current point in time and one or more of the threats are historic threats that were active at one or more past times. The instructions cause the one or more processors to generate, based on the one or more current threats, the dynamic risk score at the current point in time, generate, based on the one or more historic threats, a baseline risk score, and cause a user interface to display an indication of the dynamic risk score at the current point in time and an indication of the baseline risk score.
-
-
-
-
-
-
-
-