-
公开(公告)号:US20190095820A1
公开(公告)日:2019-03-28
申请号:US16143256
申请日:2018-09-26
Applicant: JOHNSON CONTROLS TECHNOLOGY COMPANY
Inventor: Sajjad POURMOHAMMAD
Abstract: A building management system includes one or more computer-readable storage media having instructions stored thereon that, when executed by one or more processors, cause the one or more processors to receive threat events from one or more data sources, each threat event including a description and for each threat event determine whether the description for the threat event corresponds to one of a multiple predefined threat categories, generate a standardized threat object for the threat event using the corresponding predefined threat category, and in response to determining the description does not correspond to one of the predefined threat categories, process the description using a natural language processing engine to identify one of the predefined threat categories to be assigned to the threat event and generate a standardized threat object for the threat event using the predefined threat category identified by the natural language processing engine.
-
公开(公告)号:US20200184792A1
公开(公告)日:2020-06-11
申请号:US16783936
申请日:2020-02-06
Applicant: Johnson Controls Technology Company
Inventor: Sajjad POURMOHAMMAD , Youngchoon PARK
IPC: G08B21/02 , G06F40/30 , G08B31/00 , G06Q50/16 , G06Q10/06 , H04W4/021 , G08B23/00 , G08B25/10 , G08B21/18 , G08B21/10 , G06N5/02 , G06N20/00 , G08B19/00
Abstract: A building management system includes one or more computer-readable storage media having a data structure, wherein the data structure comprises a plurality of vulnerabilities and a plurality of pairs, each of the plurality of pairs comprising one of a plurality of assets and one of the plurality of threat types, wherein each of the plurality of pairs is associated with one of the plurality of vulnerabilities and instructions. The instructions cause one or more processors to receive a threat, the threat comprising a particular threat type of the plurality of threat types, the threat indicating an incident affecting a risk value associated with a particular asset of the plurality of assets, identify a particular vulnerability of the data structure based on the particular threat type and the particular asset, and determine, based on the particular vulnerability and the threat, the risk value associated with the particular asset.
-