-
公开(公告)号:US11755742B2
公开(公告)日:2023-09-12
申请号:US16554352
申请日:2019-08-28
Applicant: Johnson Controls Technology Company
Inventor: Carol Lomonaco , John S. Jilek , Alan J. Bronikowski , Joshua A. Edler , Suvidha Raina , Dana A. Guthrie , Benjamin W. Hapka , Steven A. Brukbacher , Christopher R. Gozdziewski
CPC classification number: G06F21/577 , G05B13/02 , G06F8/65 , G06F9/451 , G06F21/46 , G06F2221/033
Abstract: A method for automatically detecting and mitigating risks related to cybersecurity in a Building Management System (BMS) includes evaluating settings of a user account of the BMS; identifying a security risk associated with the settings of the user account; evaluating settings of a network device of the BMS; identifying another security risk associated with the settings of the network device, presenting a user interface, wherein the user interface allows a user to view a policy recommendation associated with either security risk; and implementing the change in the settings of the user account or a change in the settings of the network device based at least in part on an input from the user via the user interface or an automated response to the policy recommendation. The method allows for administrators to easily view and change settings of user accounts and network devices to improve the cybersecurity of the BMS.
-
公开(公告)号:US20210064759A1
公开(公告)日:2021-03-04
申请号:US16554352
申请日:2019-08-28
Applicant: Johnson Controls Technology Company
Inventor: Carol Lomonaco , John S. Jilek , Alan J. Bronikowski , Joshua A. Edler , Suvidha Raina , Dana A. Guthrie , Benjamin W. Hapka , Steven A. Brukbacher , Christopher R. Gozdziewski
Abstract: A method for automatically detecting and mitigating risks related to cybersecurity in a Building Management System (BMS) includes evaluating settings of a user account of the BMS; identifying a security risk associated with the settings of the user account; evaluating settings of a network device of the BMS; identifying another security risk associated with the settings of the network device, presenting a user interface, wherein the user interface allows a user to view a policy recommendation associated with either security risk; and implementing the change in the settings of the user account or a change in the settings of the network device based at least in part on an input from the user via the user interface or an automated response to the policy recommendation. The method allows for administrators to easily view and change settings of user accounts and network devices to improve the cybersecurity of the BMS.
-