-
公开(公告)号:US20190244450A1
公开(公告)日:2019-08-08
申请号:US16269472
申请日:2019-02-06
Applicant: Johnson Controls Technology Company
Inventor: Donagh S. Horgan , Jan R. Holliday , Eamonn O'Toole
Abstract: A method for controlling access to at least a portion of a building includes providing a temporal model identifying relationships between a first set of access control events based on times at which the first set of access control events occurred, providing a spatial model identifying relationships between a second set of access control events based on locations associated with the second set of access control events, providing a user model identifying patterns of user behavior based on a third set of access control events, receiving a fourth set of access control events comprising time data, and location data, and user data associated with the access control events, and determining whether to generate alarms responsive to receiving the fourth set of access control events using the temporal model, the spatial model, and the user model.
-
公开(公告)号:US10896561B2
公开(公告)日:2021-01-19
申请号:US16269384
申请日:2019-02-06
Applicant: Johnson Controls Technology Company
Inventor: Donagh S. Horgan , Jan R. Holliday , Eamonn O'Toole
Abstract: A method in an access control system includes maintaining a database of access control event data generated by a plurality of access control devices installed in a building and iterating through the access control event data in order to generate a connectivity model for the building. Generating the connectivity model includes, for each iteration, identifying a user interaction with a first door at a first time and a user interaction with a second door at a second time, determining if a difference between the first time and the second time is less than a threshold period of time, and either creating the connection between the first door and the second door or updating a weight associated with the connection. The connectivity model can be used in the access control system to correlate access control events across locations in a building or building campus.
-
公开(公告)号:US20190244459A1
公开(公告)日:2019-08-08
申请号:US16269384
申请日:2019-02-06
Applicant: Johnson Controls Technology Company
Inventor: Donagh S. HORGAN , Jan R. HOLLIDAY , Eamonn O'Toole
CPC classification number: G07C9/00571 , G05B17/02 , G06F16/285 , G06F17/5004 , G07C9/00103 , G08B13/08
Abstract: A method in an access control system includes maintaining a database of access control event data generated by a plurality of access control devices installed in a building and iterating through the access control event data in order to generate a connectivity model for the building. Generating the connectivity model includes, for each iteration, identifying a user interaction with a first door at a first time and a user interaction with a second door at a second time, determining if a difference between the first time and the second time is less than a threshold period of time, and either creating the connection between the first door and the second door or updating a weight associated with the connection. The connectivity model can be used in the access control system to correlate access control events across locations in a building or building campus.
-
公开(公告)号:US20200074821A1
公开(公告)日:2020-03-05
申请号:US16119172
申请日:2018-08-31
Applicant: Johnson Controls Technology Company
Inventor: Donagh S. Horgan , Jan R. Holliday , Eamonn O'Toole
Abstract: A building security system. The building security system includes a door analysis system for the building for detecting a lock defeat device (LDD) installed at a door of the building. The door analysis system includes a processing circuit configured to receive door data for the door of the building from an access control system, the door data including a plurality of door events; determine whether the LDD has been installed at the door by analyzing the plurality of door events with one or more LDD indicators; and generate an LDD event indicating that the LDD has been installed at the door in response to a determination that the LDD has been installed at the door based on an analysis with the one or more LDD indicators.
-
公开(公告)号:US20190244492A1
公开(公告)日:2019-08-08
申请号:US16269437
申请日:2019-02-06
Applicant: Johnson Controls Technology Company
Inventor: Donagh S. Horgan , Jan R. Holliday , Eamonn O'Toole
Abstract: A method in a building access control system includes receiving a first access control event from a sensor indicating a door has been forced open or has been held open for at least a predetermined amount of time, identifying a second access control event associated with the door, determining whether to generate an alarm by evaluating the second access control event relative to the first access control event, and providing the alarm to a user of the access control system responsive to a determination that the alarm should be generated.
-
公开(公告)号:US11100788B2
公开(公告)日:2021-08-24
申请号:US16667036
申请日:2019-10-29
Applicant: Johnson Controls Technology Company
Inventor: Donagh S. Horgan , Eamonn O'Toole
IPC: G08B29/18 , G06F17/18 , G06N7/00 , G08B13/196
Abstract: An alarm management system includes a plurality of data sources configured to provide data relating to an event at a building and a processing circuit. The processing circuit is configured to receive the data from the data sources, apply a Bayesian network model to the data to generate a probability score for each of a plurality of possible causes of the event, identify the most probable cause of the event as a first cause of the plurality of possible causes having a highest probability score, execute an action with respect to the identified most probable cause of the event.
-
公开(公告)号:US20210216928A1
公开(公告)日:2021-07-15
申请号:US17147328
申请日:2021-01-12
Applicant: Johnson Controls Technology Company
Inventor: Eamonn O'Toole , Leon Frans Van Gendt , Jane Delaney , Andrew Keane , Geentanjali Singh , Timothy Flood , Aidan Casey
IPC: G06Q10/06 , G06F16/2457 , G06F16/28 , G06F16/29
Abstract: A risk management system includes one or more computer-readable storage media having instructions stored thereon that, when executed by one or more processors, cause the one or more processors to perform natural language processing to categorize threats to assets and perform correlated risk analyses for threats. The instructions cause the one or more processors generate risk scores for assets using threat data and one or more asset risk profiles reflecting characteristics of the assets, the risk scores weighted based on impact weights of threats. Furthermore, the instructions cause one or more processors to generate a plurality of graphic user interfaces including one or more of a map providing visual representations of the assets, locations of the assets, asset risk scores, and threats to assets, a forecast of asset risk scores, an asset summary, an asset risk profile editor, and a consolidated view of rank ordered assets and threats.
-
公开(公告)号:US10565838B2
公开(公告)日:2020-02-18
申请号:US16269472
申请日:2019-02-06
Applicant: Johnson Controls Technology Company
Inventor: Donagh S Horgan , Jan R Holliday , Eamonn O'Toole
Abstract: A method for controlling access to at least a portion of a building includes providing a temporal model identifying relationships between a first set of access control events based on times at which the first set of access control events occurred, providing a spatial model identifying relationships between a second set of access control events based on locations associated with the second set of access control events, providing a user model identifying patterns of user behavior based on a third set of access control events, receiving a fourth set of access control events comprising time data, and location data, and user data associated with the access control events, and determining whether to generate alarms responsive to receiving the fourth set of access control events using the temporal model, the spatial model, and the user model.
-
公开(公告)号:US10713909B2
公开(公告)日:2020-07-14
申请号:US16269437
申请日:2019-02-06
Applicant: Johnson Controls Technology Company
Inventor: Donagh S. Horgan , Jan R. Holliday , Eamonn O'Toole
IPC: G08B13/08 , G08B25/00 , G08B29/18 , G08B29/16 , G06N20/00 , G07C9/00 , G08B21/22 , G08B31/00 , G08B19/00 , G07C9/27 , G08B13/04
Abstract: A method in a building access control system includes receiving a first access control event from a sensor indicating a door has been forced open or has been held open for at least a predetermined amount of time, identifying a second access control event associated with the door, determining whether to generate an alarm by evaluating the second access control event relative to the first access control event, and providing the alarm to a user of the access control system responsive to a determination that the alarm should be generated.
-
公开(公告)号:US20190354073A1
公开(公告)日:2019-11-21
申请号:US16415861
申请日:2019-05-17
Applicant: Johnson Controls Technology Company
Inventor: Donagh S. Horgan , Michael T. Matthews , Eamonn O'Toole
Abstract: A method for predicting a path of a specific occupant of a number of occupants including receiving user access data, the user access data including a user identifier, an access time, and an access location, generating, a first model describing general sequences of access events associated with the number of occupants and a frequency of each of the general sequences, generating a second model describing specific sequences of access events associated with the specific occupant and a frequency of each of the specific sequences, and generating a path prediction model based on the first and second models, the path prediction model including a weighted score for each of the number of access control points, the weighted score associated with a probability the specific occupant accesses the access control point based on a last accessed access control point.
-
-
-
-
-
-
-
-
-