Detecting destruction of an automation system component

ABSTRACT

A control panel is used to monitor events within a security system or other automation system. In the event an intruder enters a physical location, the intruder may attempt to damage the control panel to disrupt its operation. One or more sensors of the control panel may detect disruption in the operation of the control panel. Example sensors may detect an impact force, sudden acceleration, removal from a mounted location, or disruption of communication with an input/output element, such as a display device. When an event is detected at the control panel itself, the control panel can send a signal to a remote service provider, and the remote service provider can follow-up with the customer. The control panel and/or remote service provider may also determine when the control panel loses partial or complete power loss to identify the disruption as a potential crash-and-smash entry.

CROSS-REFERENCE TO RELATED APPLICATIONS

The present application is a continuation of U.S. patent applicationSer. No. 14/192,325, titled: “Detecting Destruction of an AutomationSystem Component”, filed on Feb. 27, 2014, which claims priority to U.S.Provisional Patent Application No. 61/790,947, titled: “Methods,Systems, and Devices for Detecting Destruction of an Automation SystemComponent,” filed on Mar. 15, 2013. The disclosures of each of which areincorporated by reference herein in their entireties.

TECHNICAL FIELD

The present disclosure relates to automation systems. More particularly,embodiments of the present disclosure relate to detecting destruction ofcomponents of an automation system. More particularly still, embodimentsof the present disclosure relate to detecting when a control panel of anautomation system is destroyed, and notifying a monitoring service ofthe destruction.

BACKGROUND

People are increasingly interested in providing security to a building.Security in a home setting may be particularly significant for a homeowner or resident who is away from home, who has small children, or whokeeps valuable items at the home. For such an owner or resident to feelsecure, security and privacy may be provided through various securitymechanisms. Example methods include using door and window locks, the useof video security cameras, or intrusion detection security systems. Someor all of these components may be automated, and potentially included aspart of an automation system associated with one or more otherfunctions.

In general, a security system may include multiple sensors to detectparticular events, and to potentially control different devices. A dooror window sensor may detect when a door or window is opened or broken.If the security system is armed, the sensor may send a signal that canbe received by the control panel. The control panel may then sound analarm and/or may communicate information about the detected event to acentral monitoring, or back-end system. Such a system may use thereceived information to potentially contact an individual associatedwith the security system, to contact police or other emergencypersonnel, or to take other follow-up actions.

Criminals have been creative in determining how to enter a home or otherlocation without the entry resulting in an alarm or a notification tothe user and/or emergency personnel. One mechanism they use is theso-called “crash-and-smash” technique. This technique relies on theintruder entering the location and quickly finding the control panel.The intruder may then destroy the control panel before it has a chanceto sound an alarm and/or alert a remote monitoring system of the entry.This technique is made easier in some cases as the control panel maydelay sending a signal for a period of time. Because the control panelmay not be able to detect the difference between an authorized personentering a location, and an unauthorized intruder entering the samelocation, the delay is provided to give the authorized person time toenter the location and disarm the device. This delay may be referred toas an “entry delay.”

To attempt to combat this technique, some systems may detect an entryinto a location, and immediately send a signal instead of waiting forthe entry delay to expire. To allow an authorized person time to disarmthe security system, the back-end system may wait for the entry delay toexpire before taking action. As a result, an authorized person may enterand disarm the security system, which can trigger the control panelsending a signal to the back-end system that cancels the prior signal.If, however, a cancellation signal is not provided within the entrydelay period, the back-end monitoring system may notify a user of thesecurity system and/or emergency personnel. This system has, however,resulted in a significant number of false alarms. Providers of securitysystems receive an estimated hundreds of false alarms each day throughsuch a system.

SUMMARY

In accordance with aspects of the present disclosure, embodiments ofmethods, systems, software, control panels, computer-readable media, andthe like are described or would be understood and which relate tosecurity systems and other types of automation systems. In accordancewith some embodiments of the present disclosure, a security orautomation system may be used in connection with a control panel. Thecontrol panel may communicate with automation components that detectevents within the system. The control panel itself may also includecomponents to detect events at the control panel. For instance, in theevent of a crash-and-smash entry, the control panel may detect somedisruption to the control panel. Before being rendered completelydisabled, the control panel may communicate the detected disruption bysending a signal to a remote, back-end service provider. The serviceprovider may then use the information to respond. Example responses mayinclude contacting the user of the automation system, or contacting anemergency service provider.

The control panel may detect any number of types of disruptions prior tosending a signal to a back-end service provider. An example controlpanel may include an accelerometer or impact sensor that detects a forceapplied to the control panel itself. Upon detection of the force, or aforce above a particular threshold, the signal may be sent to theback-end service provider. Another disruption event that may be detectedincludes detecting a display or other input/output device has beendisabled, become non-functional, or lost communication. A control panelanti-tamper switch may detect when the control panel is removed from amounted location, either in a graceful or forceful manner.

In accordance with some embodiments of the present disclosure, thecontrol panel and/or back-end service provider may detect changes inpower availability to the control panel. The control panel may includeone or more sensors to detect the loss of access to AC, DC, or otherpower supplies. A first or second signal sent to the back-end serviceprovider may include information indicating a loss of power. In someembodiments, the back-end service may respond only when a partial orcomplete loss of power is paired with another disruption event. In someembodiments, the back-end service provider may send a request to thecontrol panel following a signal about a disruption event. If there isno response, it may be determined that there has been a complete loss ofpower, and follow-up procedures may be initiated. In other embodiments,the control panel may respond with power information indicating therehas been no power loss or that only partial power loss has occurred atthe control panel.

Additional embodiments of the present disclosure further relate tomethods, systems, and devices associated with detection ofcrash-and-smash entries at a location. Such methods, systems, anddevices may potentially be effective whether or not a security system orother automation system has been armed, and may include detection of aforce or other disruption using components built into a control panel.Total or partial power loss may also be detected in order to determinewhether to follow-up with the customer, or what type of follow-upmeasures to implement.

Other aspects, as well as the features and advantages of variousaspects, of the present disclosure will become apparent to those ofordinary skill in the art through consideration of the ensuingdescription, the accompanying drawings and the appended claims.

BRIEF DESCRIPTION OF THE DRAWINGS

In order to describe the manner in which features and other aspects ofthe present disclosure can be obtained, a more particular description ofcertain subject matter will be rendered by reference to specificembodiments illustrated in the appended drawings. Understand thesedrawings depict only typical embodiments and, therefore, are notconsidered to be limiting in scope, nor drawn to scale for allembodiments, various embodiments will be described and explained withadditional specificity and detail through the use of the accompanyingdrawings in which:

FIG. 1 is a schematic illustration of an example automation system,according to one embodiment of the present disclosure;

FIG. 2 is a schematic illustration of an example control panel usable inan automation system, according to one embodiment of the presentdisclosure;

FIG. 3A illustrates a cross-sectional view of a control panel mounted toa wall or other mounting surface, with some components of the controlpanel schematically illustrated, according to one embodiment of thepresent disclosure;

FIG. 3B illustrates a cross-sectional view of the control panel of FIG.3A, and represents a potential destruction of the control panel in whichcommunication between one or more components may be interrupted,according to one embodiment of the present disclosure;

FIGS. 3C and 3D illustrate cross-sectional views of the control panel ofFIG. 3A when removed from a mounting surface, in accordance with someembodiments of the present disclosure; and

FIG. 4 illustrates an example method for detecting damage of a controlpanel, in accordance with some embodiments of the present disclosure.

DETAILED DESCRIPTION

Systems, devices and methods of the present disclosure are configuredfor use in connection with residential and/or commercial buildings, orwith other locations which may use an automation system. Withoutlimiting the scope of the present disclosure, a home or business mayhave a security system installed to monitor use of the building,including entry into the home through a door, window, or other similarentry point. Sensors at the entry point may detect when the entry pointis open, closed, or broken (e.g., a window broken) and can respond indifferent ways in response to a change in status. For instance, when thesecurity system is armed, an alarm may sound if a door or window isopened. Optionally, police, security or other emergency personnel may becontacted respond to the event. Of course, the automation system mayalso include other security or safety components. For instance, if aleak in a water pipe is detected, the automation system may shut off avalve to prevent water from flooding the premise. If carbon monoxide isdetected, an alert may be sent to a person occupying the building toalert them of the danger. In other embodiments, non-security components(e.g., HVAC, sprinkler systems, entertainment systems, etc.) may also becontrolled using the automation system.

Turning now to FIG. 1, an example distributed system 100 is illustratedfor allowing automating a physical location (e.g., a home, office, etc.)101. The illustrated distributed system 100 may generally represent, orinclude, an automation system associated with the particular location101. As part of such a distributed system 100, a control panel 102 a maybe used. The control panel 102 a may, but need not necessarily, belocated at the particular location 101 being monitored or controlled.For instance, in FIG. 1, the control panel 102 is located within aphysical location 101 where other components of an automation system 104a are also located. Certain aspects of the distributed system 100, orthe automation system 104 a, may be administered through the controlpanel 102 a, or the control panel 102 a may be used to provide userswith information about a status of the automation system 104 a.

One aspect of the automation system 104 a may be the ability toadminister a security system 114 within the location 101. Accordingly,the automation system 104 a may also be referred to herein as a securitysystem. The automation system 104 a may, however, include a number ofdifferent components, any or all of which may be used in connection withthe control panel 102 a. In this particular embodiment, for instance,the automation system 104 a may include a communications system 106, anentertainment system 108, a heating, ventilation, and air conditioning(“HVAC”) system 110, a lighting system 112, a sprinkler system 116,and/or a telephone system 118. Additional or other systems or componentsmay also be included and monitored or controlled using the control panel102 a.

Any or all of the systems 106-118 may include sensors, controllers,valves, switches, or other components, or any combination thereof. Suchcomponents may be controlled or set using the control panel 102 a, maybe monitored using the control panel 102, may communicate with eachother or the control panel 102 a, or may have additional or othercapabilities. Such components, which generally monitor or control someaspect of the physical location 101, may generally be referred to hereinas “automation components.” and may perform a variety of functions. Forinstance, a set of one or more automation components may be integratedas part of the security system 114 associated with the physical location101. In some embodiments, the automation components of the securitysystem 114 may include sensors that detect intruders (e.g., unauthorizedopening of a door or window, breakage of a window, motion sensors,etc.), sensors that detect smoke or fire, or some other security-relatedcomponent or a combination thereof. In some embodiments, the securitysystem 114 may include automation components such as cameras whichobtain still or video images of one or more locations.

Automation components of the automation system 104 a may take any numberof forms, and are not limited to security components. For instance,automation components may include entertainment components such astelevisions, recordable media players (e.g., DVD player, Blu-Ray Player,digital video recorders, VCR, set-top box, etc.), projectors, speakers,stereos, and the like, or controllers therefor, any or all of which maybe separate from the control panel. Such entertainment components may beused, by way of example only, to turn on a television, radio, opticaldisk player, to change a channel or volume of television or radio, orfor other purposes. In the same or other embodiments, automationcomponents may include thermostats, air conditioners, furnaces,temperature sensors, and the like, or controllers therefor. Monitoredand/or controllable automation components may further include lightingsystem components such as light fixtures, switches, motion sensors, etc.to monitor the status of lights and/or to turn lights on or off. Stillother automation components or controllers, or may include securitysystem components including sensors or detectors (e.g., motion sensors,magnetic sensors, intrusion sensors, vibration sensors, infraredsensors, ultrasonic detectors, microwave detectors, contact sensors,photoelectric beam detectors, smoke detectors, temperature sensors,carbon monoxide detectors, etc.), video or still cameras, speakers,microphones, or other components. In embodiments where the automationsystem 104 a includes a sprinkler system 116, the automation componentsmay include valves, actuators, sensors (e.g., flow rate sensors,proximity sensors, etc.), sprinklers, pumps, and the like. In a similarmanner, where one or more of the automation components is part of atelephone system 118, the automation components may include telephones,answering machines, call forwarding components, intercoms, and the like.Some or all of the automation components of the various systems 106-118may also include wireless communication system components. As anexample, the automation components may include routers, switches, accesspoints, repeaters, bridges, and the like.

When a particular event occurs at the control panel 102 a or at amonitored automation component, the control panel 102 a may receive anindication of the event and cause other automation components torespond. Additionally or alternatively, the control panel 102 a maycommunicate with components, including those remote from the physicallocation. As an example, upon monitoring the automation components ofthe systems 106-118, the control panel 102 a may detect changes instatus, which may correspond to events. For instance, as discussedherein, if the security system 114 includes an automation component at afront entry door, the automation component may change status when thedoor is opened, closed, broken down, or the like. A signal representingthe changed state may be sent to the control panel 102 a, which mayidentify the event that occurred, and potentially the location (e.g.,the front entry) of the event. If the security system 114 is armed,opening of the door may be recognized as an event associated with anintruder entering the building. The control panel 102 a may beprogrammed to respond accordingly. For instance, the security system 114may include an alarm automation component. The control panel 102 a mayturn on the alarm of the alarm automation component. Of course, thecontrol panel 102 a may also perform other actions, including initiatinga phone call to the police or security (e.g., using the telephone system118 or a radio component built into the control panel 102 a). In theevent of another type of event—whether detected using the securitysystem 114 or another of the systems 106-118—the control panel 102 a mayfacilitate taking of other actions.

In one embodiment, such as where the security system 114 is armed and apotential intruder is detected, the control panel 104 a may initiate analarm immediately, although in other embodiments, there may be a delay.Such a delay, which may be considered an entry delay, may allow anauthorized person to enter the location and have time to disarm thesecurity system 115 by entering a code into the control panel 102 a.

In at least some embodiments, the control panel 102 a may communicatewith one or more third parties. For instance, FIG. 1 illustrates thecontrol panel 102 a as being in communication with a network operationscenter (“NOC”) 120 and/or a monitoring system 121, either or both ofwhich may act as a back-end or central monitoring system. Either or bothof the NOC 120 and monitoring system 121 may further be in communicationwith a data store 127. The data store 127 may store any number of typesof information. For instance, the data store 127 may store customer data(e.g., contact information, billing information, associations betweencontrol panels and customers, etc.), response information (e.g.,protocols for responding to an event), service records, or the like.

Optionally, the control panel 102 a may provide the NOC 120 ormonitoring system 121 with information about detected events. In somecases, the information may be acted upon by the NOC 120 or monitoringsystem 121. By way of illustration, if the control panel 102 a notifiesthe NOC 120 that an armed door has been opened, which may correspond toa potential intruder, the NOC 120 may respond by contacting the owner,resident, or tenant of the location 101, or by notifying police orsecurity. Consequently, the NOC 120 or monitoring system 121, ratherthan by the control panel 102 a, may take some actions in response to adetected event. As discussed in more detail herein, one example mayinclude responding following receipt of a signal from the control panel102 a, which signal may indicate a security event occurred and/or thatthe control panel 102 a lost power or otherwise had its operationdisrupted in some manner. The NOC 120 and/or monitoring system 121 mayalso respond to other signals indicating other types of events.

In accordance with some embodiments of the present disclosure, themonitoring system 121 includes, or is associated with, a service center123. The service center 123 may include computing devices and/orpersonnel who respond to events identified in any of numerous automationsystems 104 a-104 n. In the example of a potential intruder at thelocation 101, the monitoring system 121 may receive some notice of theevent and pass information about the event to the service center 123(e.g., send an electronic message including information about the event,where the event is located, contact information for a user of theautomation system 104 a, etc.). The service center 123 may then be usedto follow-up with the user of the automation system 104 a to ask if theyneed assistance, to alert them of what was detected, to contactemergency personnel, or for any number of other actions. The actionstaken may be automated (e.g., automatic email or text messagenotifications) or may performed manually by a human operator (e.g., acustomer service representative may call a phone number to check-in onthe customer). Actions may also include a combination of automated andmanual actions. For example, the monitoring system 121 may automaticallysend an electronic communication to the service center 123, which mayuse a computing device to notify a customer service representative ofthe event. The representative may dial and call the customer, or theservice center 123 may have an auto-dialer to make the call. When thecustomer answers, the representative may talk with the customer.Although the monitoring system 121 is shown as being separate from theNOC 120, in other embodiments, the NOC 120 may include some or alloperations of the monitoring system 121. The service center 123 may alsobe included as part of the NOC 120, or separate therefrom, and may alsobe separate from a monitoring system 121.

In general, actions taken by the NOC 120, monitoring system 121, or ahuman operator may include “in-band” or “out-of-band” actions. Forinstance, some responses may be “in-band” responses where an action istaken using the control panel 102 a. As an example, the NOC 120 ormonitoring system 121 may send information back to the control panel 102a for display, or a human operator may initiate voice communicationthrough the control panel 102 a. In other embodiments, the response mayinclude actions taken without the use of the control panel 102 a. Suchactions may generally be referred to as “out-of-band” responses. Forinstance, after detecting an intruder, a phone call may be made topolice or security to request that they monitor the location where theintruder was detected. A phone call may also be placed to the user orowner of the automation system 104 a. As an example, the NOC 120 mayplace a call to a telephone 124, send an email retrieved at thecomputing device 126, or otherwise initiate some communication or actionthat does not pass through or otherwise use the control panel 102 a.

To allow the NOC 120 and/or monitoring system 121 to be aware ofdetected events, and to potentially respond to such events, the controlpanel 102 a may communicate with the NOC 120 or monitoring system 121through a communications network 122 of the distributed system 100. Thecommunications network 122, which may carry electronic communications,may include the Internet, local area networks, wide area networks,virtual private networks (“VPN”), telephone networks, long-rangewireless networks, mobile networks, other communication networks orchannels, or any combination of the forgoing. Thus, it should beunderstood that the communications network 122 may operate in any numberof different manners, and can include different components, and may bedistributed so as to include different components at differentlocations. For instance, the communications network 122 may include awireless communication system such as that provided by a mobile phoneprovider. As an example, the control panel 102 a may include a radiocomponent to communicate with or using the communications network 122through long-range wireless signals, mobile telephone signals (e.g.,GSM, CDMA, LTE, HSPA+), or other technologies, or any combination of theforegoing. In other embodiments, other wireless systems or even wiredcommunication may be used in addition to, or instead of, othertechnologies. Thus, the communications network 122 may include multipledevices, components, systems, or technologies. For example, thecommunications network 122 may include multiple networks interconnectedto facilitate communication.

The NOC 120 or monitoring system 121 may optionally be used for other oradditional purposes beyond responding to events detected by theautomation system 104 a. For instance, the NOC 120 or monitoring system121 may be a central monitoring location for use with multiple controlpanels 102 a-102 n. Indeed, monitoring may be performed for any numberof control panels 102 a-102 n, each of which may be connected to its ownautomation system 104 a-104 n. Further, the NOC 120 and/or monitoringsystem 121 may update software or firmware on the control panels 102a-102 n, and ensure the control panels 102 a-102 n are operating andcommunicating properly with automation components of their respectiveautomation systems 104 a-104 n and/or with the NOC 120 or monitoringsystem 121.

The distributed system 100 of the present disclosure may be implementedas a communication system in which the operations of various systems andcomponents may be monitored through communication links. As discussedherein, such communication links may include wired or wireless links, ormay include a combination of wired and wireless links, any or all ofwhich may use different protocols or networks. Regardless of theparticular mode of communication, the status or operation of devices andcomponents can be reported to, or controlled using, the correspondingcontrol panel 102 a, NOC 120, monitoring system 121, or even otherelectronic devices 124, 126. For instance, the electronic devices 124,126 may interact with the monitoring system 121 to monitor and/orcontrol aspects of the automation systems 104 a-104 n. The NOC 120and/or monitoring system 121 may, for instance, provide a remote accesssystem. Using the remote access system, a user may utilize a browser orapplication on a computing device (e.g., computing device 126, mobilephone 124) to interact with the NOC 120 or monitoring system 121, whichmay in turn communicate with the control panel 102 a to monitor orcontrol aspects of the automation system 104 a. In other embodiments, aremote access system may be provided by, or in connection with, thecontrol panel 102, so that a remote computing device may communicatedirectly with the control panel 102 a via the network 122.

The control panel 102 a may be equipped to use one or more differentcommunication protocols in communicating with automation components ofthe automation system 104 a and with the communication network 122. Suchcommunication protocols may be implemented using any combination of oneor more of wired or wireless communication. As an example, automationcomponents of the automation system 104 a may operate using a wirelessprotocol, or system that allows a mesh network to be formed. Eachautomation component may, for instance, optionally be able tocommunicate with some or any other automation component, provided theyare in range of each other. If the automation components use a wirelesssystem for communicating with the control panel 102 a, an automationcomponent that is in range of the control panel 102 a may sendinformation to, or receive information from, the control panel 102 a. Insome embodiments, the automation components may communicate with eachother and the control panel 102 a using the same communication protocol.Although not intended to limit the scope of the present disclosure, anexample communication protocol for such an embodiment may be a lowpower, short range wireless communication protocol (e.g., Z-Wave,ZigBee, etc.). In other embodiments, larger range wireless communicationprotocols (e.g., WiFi, LightwaveRF, etc.) may be used in addition to, orinstead of, the shorter range alternatives. Such connections may allowtwo-way communication or may provide only one-way communication.

The control panel 102 a may also optionally communicate with thecommunication network 122 and/or the NOC 120 or electronic devices 124,126 using the same or other protocols. As an example, if the electronicdevice 124 is in sufficiently close physical proximity to the controlpanel 102 a, a physical connection may be used, or a suitable wirelesscommunication protocol (e.g., Z-Wave, ZigBee, Bluetooth, WiFi, etc.) maybe used.

Communication with the communication network 122 may be made in anysuitable manner, including using wireless or wired communication, or acombination thereof. For instance, as discussed herein, an examplecontrol panel 102 a may communicate with a network 122 operating on amobile telephone system. A GSM, CDMA, LTE, HSPA+, or other similarwireless communication component may therefore be included in thecontrol panel 102 a and the network 122 to allow for such communication.In other embodiments, the network 122 may have other components to allowfor alternative or additional types of communication between the network122 and the control panel 102 a. Moreover, a NOC 120 may communicatewith different control panels 102 a-102 n of different automationsystems 104 a-104 n using the same or different communication protocols,and potentially allow such control panels 102 a-102 n to communicatewith each other.

Turning now to FIG. 2, an example control panel 202 is schematicallyillustrated. It should be appreciated in view of the disclosure hereinthat the control panel 202 may be used in the distributed system of FIG.1 or in connection with any of a variety of other systems. Theillustrated control panel 202 is merely illustrative, and a controlpanel of the present disclosure may have fewer or additional components,or elements other than those expressly described or illustrated, or maybe used in connection with systems or components other than those ofFIG. 1 or the methods, systems, and devices disclosed herein.

In FIG. 2, the control panel 202 includes multiple componentsinteracting together over one or more communication channels. In thisembodiment, for instance, one or more processors 228 may communicatewith input/output devices 230, a communication interface 232, memory 234and/or a mass storage device 236 via a communication bus 238. Theprocessors 228 may generally include one or more processing components,including a central processing unit, a graphics processing unit, or thelike, any of which may be capable of executing computer-executableinstructions received or stored by the control panel 202.

The processors 228 may communicate with the communication interface 232using the communication bus 238. The communication interface 232 mayreceive or send communications via one or more networks (e.g., network122 of FIG. 1) or otherwise communicate with other components or devices(e.g., automation system 104 a of FIG. 1). Received communications maybe provided over the communication bus 238 and processed by theprocessors 228.

In the particular embodiment illustrated in FIG. 2, the communicationinterface 232 may include multiple components to allow communication viaone or more different protocols. For instance, the illustratedembodiment includes an interface component 240 for connecting to localcomponents, such as over a wireless mesh network. As discussed herein,an example of the component 240 may include radio which operates usingZ-Wave, ZigBee, or other protocols, or some combination thereof. Such acomponent may specifically be used to communicate with security or otherautomation system components for a residence or other structure,including one or more sensors, cameras, controllers, and the like.Further, while a single local wireless interface component 240 is shown,such a component may include multiple elements, including antennas. Insome embodiments, for instance, the interface component 240 may includemultiple antennas to communicate with multiple automation componentssimultaneously, and potentially using any of a variety of differentfrequencies or channels.

In still another example embodiment, an example communication interface232 may include an interface component 242 for communicating over along-range wireless network, a mobile telephone network, or another typeof wireless or wired network, or some combination thereof. An examplenetwork may include, for instance, GSM, CDMA, LTE, HSPA+, or othercommunication typically used by a wireless carrier to communicate with amobile device such as a telephone or tablet computing device. Asdiscussed herein, in one example embodiment, the interface component 242may be provided to facilitate communication between the control panel202 and a network operations center (e.g., NOC 120 of FIG. 1) or otherback-end service provider (e.g., monitoring system 121 of FIG. 1).

In still another embodiment, the communication interface 232 may includeother components. For instance, an example control panel 202 may be usedto send and/or receive communications over a wireless protocol such asWiFi (i.e., IEEE 802.11), Bluetooth, or some other protocol. The localwireless interface component 240 may, for instance, include WiFi orother similar capabilities. Moreover, according to some embodiments asdisclosed herein, the interface component 240 may be configured to allowthe control panel 202 to function as a wireless access point.

According to some embodiments, the control panel 202 may include one ormore input/output devices 230. In FIG. 2, the input/output devices 230may communicate with one or more processors 228 using the communicationbus 238. Any suitable type of input/output device may be provided. Forinstance, a control panel 202 may include buttons, keypads, voicerecognition components, or the like through which input is received froma user. A display 244 may also be provided and used as an output todisplay information to a user. In some embodiments, the display 244 mayalso act as an input. For instance, the display 244 may be atouch-sensitive display allowing a user to touch the display 244 to makea selection, to provide input through a gesture, or to otherwise provideinput. Still other types of input or output devices may include ananti-tamper switch 246, audio output devices such as a speaker 248,power components (e.g., an AC power input 250 a or batteries 250 b), orone or more sensors 251. Example sensors may include sensors to detectpower capabilities (e.g., whether AC power or battery power has beenlost, whether power to the display 244 or another component has beeninterrupted, etc.). Another sensor, as described herein, may include animpact or shock sensors. Such a sensor may include an accelerometer orother component that may detect changes in forces on the control panel202. Thus, if a control panel 202 is dropped, hit (e.g., in acrash-and-smash scenario), or the like, the impact to the control panel202 may be sensed. The illustrated input/output devices 230 of a controlpanel 202 are merely illustrative. In other embodiments, for instance, aport, trackball, mouse, biometric reader (e.g., iris scanner,fingerprint reader, etc.), GPS device, or other component, or somecombination of the foregoing, may be included.

The control panel 202 may also include memory 234 and mass storage 236.In general, the memory 234 may include one or more of persistent andnon-persistent storage, and may store computer-executable instructionsthat may be executed by the processors 228, data, or other information.In the illustrated embodiment, the memory 234 is shown as includingrandom access memory (RAM) 252 and read only memory (ROM) 254, althoughother or additional types of memory or storage may also be included.

Generally, the mass storage 236 may comprise of persistent storage inany of a number of different forms. Such forms may include a hard drive,flash-based storage, optical storage devices, magnetic storage devices,or other forms which are either permanently or removably coupled to thecontrol panel 202. In some embodiments, an operating system 256 maydefine the general operating functions of the control panel 202, whichmay be executed by the processors 228. The operating system 256 may bestored in the mass storage 236, although all or a portion of theoperating system 256 may alternatively be stored in the memory 234.Other components stored in the mass storage 236 may include drivers 258(e.g., to facilitate communication between the processors 228 and theinput/output devices 230 and/or components of the communicationinterface 232), a browser 260 (e.g., to access or display informationobtained over a network, including mark-up pages and information),and/or application modules.

Application modules may generally include any module, program, orapplication that may be used in connection with the operation of thecontrol panel 202. Examples of application modules may include programsspecifically designed for use with a security and/or automation system(e.g., automation module 262), or more general use programs,applications, or modules. Examples of more general use applications mayinclude word processing applications, spreadsheet applications, games,calendaring applications, weather forecast applications, sports scoresapplications, and other applications.

As shown in FIG. 2, in at least one embodiment, the automation module262 may include, or operate in connection with, additional modules orcomponents capable of being used by the control panel 202 in connectionwith a security or automation system. For instance, the automationmodule 262 may include an additional communication module 264. Such acommunication module 264 may generally be used to control or monitor howone or more communication systems of a residence or commercial buildingoperate. For example, an intercom system may be provided at an entry tothe building, and the communication module 264 may monitor its use andpotentially be used in passing communications (e.g., using a speaker orsending communications to a remote device). The communication module 264may similarly be configured to facilitate visual communications (e.g.,using one or more cameras and/or visual display devices). Moreover, thecommunication module 264 may be used to determine when to allowcommunication.

The illustrative automation module 262 is also shown as including anoptional entertainment module 266, HVAC module 268, and lighting module270. The entertainment module 266 may generally monitor and/or controlentertainment-related devices and functions of a location. For instance,the channel or volume of a television may be monitored and potentiallychanged using the control panel 202. The HVAC module 268 may generallymonitor or control heating or air conditioning components. For instance,if the temperature in a location is higher or lower than desired, theHVAC module 268 may control a thermostat to obtain a more comfortabletemperature. Similarly, the lighting module 270 may monitor, control orotherwise interface with lighting components including switches,lighting fixtures, and the like. In some embodiments, such as where alight is provided at an entry way, the lighting module 270 may interfacewith sensors used to detect the presence of a person (e.g., a motionsensing light). The lighting module 268 may also perform other functions(e.g., automatically turn on a light in response to a trigger event).

The modules 272-276 may provide additional and potentially similarfunctions. For instance, the security module 272 may interface withsecurity-based automation components, such as security sensors andautomation components (e.g., motion sensors, magnetic sensors, intrusionsensors, vibration sensors, infrared sensors, ultrasonic detectors,microwave detectors, contact sensors, photoelectric beam detectors,smoke detectors, temperature sensors, carbon monoxide detectors, etc.).When an event is detected, the security module 272 may determine whetherto sound an alarm, how the control panel 202 should respond to theevent, what communications to send to a NOC or other remote location,and/or other actions to take.

The notifications module 274 may have other functions. For example, inresponse to some events, providing information to a remote or otherthird party may be desirable. For example, a NOC or other remote serviceprovider may be sent information about an event. The remote system maythen respond to the control panel 202 for some in-band action, or takeother actions out-of-band. In some embodiments, the notifications module274 may be used to send signals, messages or other notifications to aremote system or to receive communications from the remote system. Thenotifications module 274 may also be capable of interpreting messages,preparing reports on events or notifications, providing reports on thestatus of automation components, and the like. Such a report may beprepared periodically or in response to a particular event. In oneembodiment, an event may trigger a report defined by the notificationsmodule 274, which may be provided to a remote system using thecommunication interface 232.

The automation module 262 may also include other components or modules,including a tamper monitoring module 276. In at least some embodiments,the smash sensing module 276 may detect the occurrence of an impact orother potentially destructive force or event at the control panel 202.For instance, the smash sensing module 276 may monitor an anti-tamperswitch 246 or sensor 251 of the input/output devices 230. When theswitch 246 is activated, or when an accelerometer 251 or other sensorindicates that a shock or impact has been applied to the control panel202, the shock sensing module 276 may determine a control panel event isoccurring. In some cases, the shock sensing module 276 may operate inconnection with the notifications module 274 and/or communicationinterface 232 to communicate information about the event to a NOC orother remote service provider. In some embodiments, the shock sensingmodule 276 may monitor other components in addition to, or instead of,the anti-tamper switch 246 or a sensor 251. For instance, as discussedherein, a person may attempt to destroy the control panel 202 by, amongother things, removing the ability of the control panel 202 to access ACor DC power. In one embodiment, the shock sensing module 276 maytherefore also monitor an AC power component 250 a, battery power source250 b, or some other component usable to provide power to the controlpanel 202.

The foregoing description and the modules shown in FIG. 2 are purelyprovided to illustrate the variety of different types of modules,programs, or applications that may be included, and are not intended tobe an exclusive list. In other embodiments, for instance, additionalmodules may include a remote access module. Such a module may, forexample, enable the control panel 202 to be directly accessed usingremote devices (e.g., devices 124, 126 of FIG. 1), and to potentiallyhave communications relayed through the control panel 202 either to orfrom the remote devices. In other embodiments, however, remote accessmay be enabled through a web portal, NOC, monitoring system, or othersystem, and managed by the remote access module. Thus, a user of aremote device could potentially set or view communications, doorcameras, entertainment, lighting, security, HVAC, sprinkler, telephone,or other settings remotely, or even receive or otherwise monitor audioor video feeds from a remote location.

The automation module 262 may also include additional or other modulesor components, including modules not shown in FIG. 2. For instance, theautomation module 262 may include a sprinkler system module (e.g., toverify water flow rates at one or more locations, turn sprinklers on oroff, etc.), a telephone module (e.g., to interface with a telephonesystem and potentially run telephone calls through the control panel, toforward calls, etc.), an updating module (e.g., to pull or requestsoftware updates), and the like. In other embodiments, modules may beincluded and which relate to authentication, settings, preferences,encryption/decryption, an emergency override, or other uses.

Turning now to FIGS. 3A-3D, an example control panel 302 is illustratedin additional detail. The control panel 302 may include some or all ofthe components or capabilities of the control panels described relativeto FIGS. 1 and 2, or may include still other or additional features. Theparticular control panel 302 is illustrated to describe one mechanismfor detecting a destructive event at the control panel 302. Forinstance, the control panel 302 may detect when a “smash” event occursduring a crash-and-smash entry into a building or other securedlocation. By detecting the event, the control panel 302 may potentiallyreport the event to a NOC or other remote service provider prior tobeing rendered completely inoperable.

The control panel 302 can include a variety of components or features,some of which are schematically illustrated in FIG. 3A. In particular,the control panel 302 may include one or more interface components, suchas a display 344. Using the display 344, information may be communicatedabout the control panel 302 and/or a connected automation system. Otherinterface features, including speakers, buttons, ports, and the like areomitted to avoid unnecessarily obscuring aspects of the disclosure, butmay also be included in the control panel 302.

The control panel 302 may communicate with local automation componentsand/or remote service providers using one or more antennas 342, 344. Insome embodiments, a set of one or more antennas 342 may communicate withlocal automation components within an automated location. Examplesystems and protocols are discussed herein, and may include, but are notnecessarily limited to, use of wireless mesh network protocols. Theantenna 344 may also communicate with local automation components. Inother embodiments, however, the antenna 344 may include one or moreantennas to communicate with a remote service provider. The antenna 344may include components or features described herein, including featuresand components for communicating using a mobile phone communicationsnetwork, a long-range wireless network, or other wireless or wiredcommunication network.

Additional features of the control panel 302 may include a controller328. The controller 328 may include one or more processors and/or othercomponents for operating the control panel 302. In one embodiment, thecontroller 328 may include a printed circuit board or other similarcomponent, along with storage devices, processors, and the like. Such acontroller 328 may be used to interpret signals received via theantennas 342, 344, input received via the display 344 or otherinput/output components, or to send signals to the same or similarcomponents. A communication link 338 may be connected to the controller328 to allow such communication among the various components of thecontrol panel 302.

One or more sensors or switches may also be in communication with thecontroller 328. In FIG. 3A, for instance, an anti-tamper switch 346 maybe included as one type of sensor in communication with the controller328 and/or the antennas 342, 344. The anti-tamper switch 346 may bespecifically configured to determine when the control panel 302 isremoved from the wall 304 or another mounting surface. In FIG. 3A, forinstance, a mounting plate 306 is secured to the wall 304, and thecontrol panel 302 is then secured to the mounting plate 306. Theanti-tamper switch 346 may detect when the control panel 302 is removedfrom the mounting plate 306 and/or the wall 304.

The illustrated control panel 302 may include a sensor 351. The sensor351 may detect any of a number of different conditions with respect tothe control panel 302. For instance, the sensor 351 may include anaccelerometer or other shock sensor within a body 303 of the controlpanel 302. If a force is applied to the control panel 302, the sensor351 may measure the force. For instance, FIG. 3A illustrates a hammer380 that may hit the control panel 302. Upon the body 303 receiving theimpact from the hammer 380, the sensor 351 may detect the impact, andpotentially quantify or categorize the impact. For instance, impacts ofa short duration, but a large force, may be determined to be of one type(e.g., a potential “smash” scenario). Impacts of longer duration orlesser force may be associated with other events. For instance, if acontrol panel is dropped, the force profile may show multiple impacts ofdecreasing intensity as the control panel 302 bounces on a floor. Anearthquake may also cause the sensor 351 to detect a force, but theprofile may be significantly different in length and/or intensityrelative to a force specifically intended to destroy or incapacitate thecontrol panel 302. Classifying forces, including duration or quantity,is merely optional. In another embodiment, for instance, any impactforce over a threshold level may be sensed and potentially reported to aremote service system.

The sensor 351 may include a single sensor or multiple sensors. Forinstance, if the sensor 351 includes an accelerometer or other shocksensor, the sensor 351 may also include additional sensors for otherpurposes. An example sensor may detect power conditions at the controlpanel. For instance, one or more power supplies may be provided to allowthe controller 328, display 344, antennas 342, 344, sensors 346, 351,and other components to operate. The power supplies may include an ACpower supply 350 a and DC power supply 350 b. If power supply from anysupply is lost, the sensor 351 may detect the loss, so that it maypotentially be acted upon by the control panel 302 and/or a remoteservice system. In one embodiment, for instance, the DC power supply 350b may include batteries that run out of power. The sensor 351 may detectwhen the batteries are dead, and can cause the control panel 302 todisplay a notice suggesting battery replacement. Of course, AC, DC orother power may be lost when the control panel is destroyed, and thesensor 351 can detect power lost during such a scenario.

With particular reference to the control pane 302 of FIG. 3A, the ACpower supply 350 a may have any number of configurations. For instance,the AC power supply 350 a may include a plug or other connectorconfigured to connect to an AC power source. In this particularembodiment, the AC power source may include an outlet 308 in the wall304, although an outlet 308 may be located in any suitable location. Theplug of the AC power supply 350 a may connect to the outlet 308 toaccess the power source. If the plug is removed, or if a wire or otherelectrical connection is cut, AC power to the control panel 302 may becut off. As also noted herein, the DC power supply 350 b of theillustrated embodiment may include a DC voltage source such as a batteryor set of batteries. The illustrated DC power supply 350 b is shown asbeing embedded within the body 303 of the control panel 302, althoughsuch a power supply may be removable. In some embodiments, the DC powersupply 350 b and AC power supply 350 a may each power some components ofthe control panel 302. In other embodiments, the one of the DC powersupply 350 b or AC power supply 350 a may provide primary power to allor some components, while the other may act as a backup power source.For instance, the AC power supply 350 a may primarily be used for power;however, the DC power supply 350 b may provide power in the event the ACpower supply 350 a is unplugged, damaged, disconnected, or otherwisefails to provide the necessary power.

Although a hammer 380 is shown in FIG. 3A as one device capable ofapplying a force to the control panel 302, and potentially damaging thecontrol panel 302, an impact force capable of damaging the control panel302 may occur in any number of manners. For instance, an intruder to abuilding or location may have a crowbar, baseball bat, or any otherobject that can strike the control panel 302. Such devices may becapable of damaging some or all of the components of the control panel302, and potentially rendering the control panel 302 inoperable. Animpact could also occur simply by hitting the control panel 302 with ahand or shoe, or by dropping the control panel 302. Thus, embodiments ofthe present disclosure may detect impact forces occurring in any numberof manners.

Regardless of the manner in which an impact or shock force occurs, andwhether the force is intentional or unintentional, the force may becapable of damaging the control panel 302. Such damage may be minor ormay be significant. Indeed, in some embodiments, the force may beintended to completely incapacitate the control panel 302. For example,an intruder may perform a crash-and-smash entry and try to destroy thecontrol panel 302 before an alert or alarm can be produced.

In some embodiments, the damage to the control panel 302 may be sensedby the control panel. For instance, turning now to FIG. 2, thecommunication link 338 is shown as extending between the controller 328and the various other components of the control panel 302. When thecontrol panel 302 is hit with an impact force, damage may includesevering communications between some or all components. For instance,FIG. 3B illustrates an embodiment in which communication with thedisplay 344 may be interrupted (as shown schematically). If the display344 is damaged, or if the electrical connections with the display 344are severed, the controller 328 may be unable to continue communicatingwith the display 344. The sensor 351 may potentially detect when powerto the display 344 is lost. In such an event, the control panel 302 maysend a message or signal to a remote service center indicating that thecontrol panel 302 has been damaged, as discussed in greater detailherein.

While FIG. 3B illustrates an embodiment in which communication with thedisplay 344 may be lost, an impact force to the control panel 302 maycause other damage. For instance, the impact force may break the body303, interrupt other communications, break audio components, destroybuttons or input devices, or have other effects. Such effects may bedetected by the sensor 351 and/or anti-tamper switch 346. In someembodiments, the detection may occur rapidly, and a signal about thedetected event may be sent using the antennas 342, 344 before thecontrol panel 302 can be completely disabled.

FIG. 3C illustrates a similar scenario in which an impact or other forcemay be applied to the control panel 302. In FIG. 3C, the control panel302 has been removed from the mounting plate 306. Such removal may occurgracefully (e.g., by removing fasteners, etc.) or forcefully (e.g., bybreaking fasteners, components, etc.). Regardless of the particularmanner in which the control panel 302 is removed, the anti-tamper switch346 may detect such removal. For instance, the anti-tamper switch 346may include a mechanical switch that may expand once removed fromcontact with the mounting plate 306. In other embodiments theanti-tamper switch 346 may use a capacitive, magnetic, inductive, orother type of sensor, or some combination thereof, to detect removal.When removal is detected using the anti-tamper switch 346, a signal maybe generated and potentially transmitted to a remote service center. Theremote service center may then take appropriate action. Example actionsare described in greater detail herein, but may include following-upwith a user of the control panel, contacting emergency personnel,attempting to obtain an additional response from the control panel 302,or taking other action.

As further illustrated in FIG. 3C, when the control panel 302 isremoved, the AC power supply 350 a may also be disconnected.Disconnection of the AC power supply 350 a may be approximatelysimultaneous with the removal of the control panel 302, but may alsooccur before or after removal. In some embodiments, removal of thecontrol panel 302 as detected by the anti-tamper switch 346 and/ordisconnection of the AC power supply 350 a may trigger a signal to aremote service provider. In still other embodiments, signals may begenerated in response to other events. For instance, the sensor 351could detect a shock or impact to the body 303 of the control panel 302,loss of communication or functionality with the display 344 or othercomponent, or some other event that may indicate the control panel 302has been intentionally or unintentionally damaged.

In the case where a control panel 302 is to be completely disabled(e.g., when an intruder performs a crash-and-smash entry), the intrudermay want to also eliminate all power to the control panel 302.Accordingly, FIG. 3D illustrates an example embodiment in which the DCpower supply 350 b may also be removed. In this particular embodiment adoor 305 may be formed in the body 303 of the control panel 302. Byremoving the door 305, a person may access and remove the DC powersupply 350 b. Of course, an intruder or other person intending to damagethe control panel 302 could also apply a force to the body 303 to simplybreak the body 303. That damage may cause the DC power supply 350 b tofall out of the control panel 302, may damage connections used to takeadvantage of the DC power supply 350 b, may damage all components usingthe power from the DC power supply 350, or some combination thereof. Inany such case, control panel 302 may experience a total loss of AC andDC power, and be totally disabled.

As discussed herein, when the control panel 302 is damaged or disabled,the control panel 302 may make an attempt to notify a remote servicesystem of the damage. The remote service system may determine if anyaction is warranted, and take, request, or initiate such action in caseswhere it is desired. FIG. 4 illustrates an example method 400 fordetecting damage of the control panel 400. As also shown an described,the method 400 may also include notifying a remote service provider,such as a back-end system, and taking some action based on the report ofdamage.

More particularly, the method 400 may include an optional step ofdetecting a security-related event at a physical location 402. Forinstance, if a security system is armed, the security system maydetermine an unauthorized entry has occurred at a particular building orother location. The entry may be detected using one or more automationcomponents, including sensors at a door, window, or other location,although any type of detection system may be used.

In the case of a crash-and-smash entry, an intruder may attempt tolocate the control panel, and then damage the control panel. For such acase, the method 400 may also include a step 404 for detecting a controlpanel disruption event. As discussed herein, the disruption event maytake any number of forms, and detection of the disruption event in step404 may occur in any number of manners. For instance, FIG. 4 illustratesan example in which detecting the disruption event may include any ofone or more detection events.

More particularly, FIG. 4 illustrates an example in which an act 406 ofdetecting an impact or shock on the control panel may be used to detecta disruption event. As discussed herein, a control panel may include orbe attached to an accelerometer, shock sensor, or other device capableof detecting when an impact force is applied to the control panel. Thismay be used, for instance, to determine the control panel has been hitwith an object. Such a sensor may also potentially sense other events,such as where the control panel has been dropped or inadvertently hit ordamaged.

In some embodiments, detecting a disruption event at the control panelin step 404 may also, or alternatively, include an act 408 of detectingloss of communication with a component (e.g., a display device). Asensor may detect a display or other component has become inoperable orunresponsive (e.g., if the display screen is broken). The sensor mayoperate by attempting to communicate with the display, by monitoringcommunications between a controller and a display, or in any othermanner. In yet another embodiment, an act 410 of detecting removal ofthe control panel from a mounted location may detect a control paneldisruption event in step 404. For instance, as discussed herein, ananti-tamper switch may detect that a control panel has been ripped off awall. Of course, the anti-tamper switch may also be able to detectremoval when a user removes the control panel for another reason (e.g.,to replace a battery, to repair or replace the control panel or acomponent, etc.). In some embodiments, the anti-tamper switch may detectany removal, whereas in other embodiments only some types of removal(e.g., a forceful removal) may be detected, or different types ofremoval may be differentiated using one or more sensors or switches.

In accordance with some embodiments of the present disclosure, themethod 400 may include a step 412 for detecting loss of power to thecontrol panel. As shown in FIG. 4, this step 412 may occur afterdetection of a control panel disruption event in step 404, andpotentially in response to such an event. In other embodiments,detection of power loss events in step 412, and detection of a controlpanel disruption event in step 404 may be synchronous or occur in anyorder.

As discussed herein, a control panel of an automation system may use anynumber of types of power supplies. In some embodiments, the controlpanel may have a single power supply, whereas other control panels mayuse multiple power supplies. FIG. 4 therefore illustrates an example inwhich one or more types of power supplies may be monitored to detectwhen power is lost in step 412. More particularly, the method 400includes an optional act of detecting when AC power is lost (act 414) aswell as detecting when DC power is lost (act 416). Any suitable systemor component may be used to detect when power is lost. For instance, asensor may detect a disconnection between an AC power supply and an ACpower source. Similarly, a sensor may detect when a DC power supply ispresent or removed. It should also be appreciated in view of thedisclosure herein that other sensors or devices may be included, andthat loss of other power may be detected. In some embodiments, forinstance, rather than detecting loss of AC and DC power separately,detecting loss of power in step 412 may detect a total loss of power.

Following detection of a security-related event in act 402, a controlpanel disruption event in step 404, or a loss of power in step 412, orany combination of the foregoing, the control panel 418 may send asignal to a back-end monitoring system (act 418). Such a signal mayinclude sufficient information to allow the back-end monitoring systemto determine what event was detected.

When the control panel sends the signal in act 418, it should beappreciated that the signal may be sent immediately upon detection of anevent (e.g., an event in act 402, step 404 or step 412), after acombination of events, or after some predetermined delay (e.g., an entrydelay). For instance, the signal (or multiple signals) of a particulartype or content may be sent in some embodiments only where control panelis disrupted and where there is a loss of some or all power. In otherevents, any event alone may be enough to trigger sending of an event inact 418.

Further, for situations such as a crash-and-smash entry, there may notbe much time between when an event is detected, and when the controlpanel is completely disabled. If a signal is not sent immediately, theremay be little or no time to send the signal. In such a case, delay insending the message may result in not notifying the back-end monitoringsystem of a particular event. To expedite sending of signals in act 418,components may therefore be selected and configured to send signalsquickly. For instance, a shock sensor may detect an impact force above apredetermined threshold, and immediately send a signal. Some delay mayoccur between when the impact is felt and when the control panel iscompletely disabled, so the signal may be able to be sent and reach itsdestination. Similarly, components to detect loss of some power may alsoact immediately to send a signal in act 418 in the event any power islost. Thus, if AC power is lost, DC power may be immediately used tosend a signal to that effect, and vice versa.

Where the control panel sends the signals in act 418 immediately uponsensing an event (e.g., an impact or other disruption to the controlpanel), the time to completely send the signal may vary based on thecomponents. In at least one embodiment, the time between starting tosense a disruption and sending of the signal is less than one second. Inother embodiments, the time may be approximately half a second. In amore particular embodiment, the time between detecting the disruptionand sending the signal may be up to approximately 250 ms, up toapproximately 100 ms, up to approximately 50 ms, or up to approximately10 ms. Of course, in other embodiments, the time between detecting animpact or other disruption event and sending of the signal may be lessthan approximately 10 ms, or greater than 1 second. Moreover, in atleast some embodiments, the delay may vary based on the type ofdisruption that is sensed. As an example, an impact with a force above afirst predetermined threshold may result in immediately sending thesignal, whereas a force larger than a second predetermined threshold,but less than the first predetermined threshold may include some delay.The delay may allow the control panel to continue to monitor activitiesof the control panel (e.g., power, communication with a display,additional impacts, etc.) prior to sending the initial signal.

As shown in FIG. 4, the method 400 may include an additional method, orset of acts, to be employed by the back-end monitoring system. Theseacts may include an act 420 of receiving the signal from the controlpanel. Receipt of the signal in act 420 may also include interpretingthe signal, which signal can identify the disruption event, power loss,security-related event, or other event, or some combination thereof. Insome cases, the back-end monitoring system may interpret the signalreceived in act 420 and determine that some action is warranted. Suchaction may occur due to the detected security-related event, thedetected control panel disruption event, the detected loss of power, orany combination of the foregoing. Indeed, in some embodiments, differentactions may be applied based on what events are detected and supplied bythe received signal, or what combination of events are detected.

In at least some embodiments, the back-end monitoring system mayinitiate a follow-up procedure to contact the customer about one or moreevents that are detected by the control panel (act 422). As notedherein, one type of situation where events are detected may include aso-called crash-and-smash entry. In that type of scenario, the controlpanel may be damaged or ripped from a wall, which may potentiallydisable one or more power sources to the control panel. In that case,the follow-up procedure may include contacting the customer (act 424).For instance, a message may be sent through an electronic communicationsystem of the back-end monitoring system, to request that a customerservice representative make or conduct a phone call; although an email,text message, or other type of follow-up may be made. When contactingthe customer in act 424, details may potentially be obtained todetermine if there was an intruder, whether there was a false alarm, orwhether something else happened. Indeed, in some cases the control panelcould be damaged inadvertently, but follow-up with the customer mayallow a service provider to quickly respond and potentially replace thecontrol panel or schedule a service call for repair or other service. Insome embodiments, there may be sufficient concern that an intruder hasentered a building or other location, and the method 400 may alsoinclude the back-end monitoring system contacting emergency personnel(act 426), or initiating such contact, such as by notifying a customerservice representative of a potential problem, and having the customerservice representative call or otherwise contact the police, security,or other emergency responder.

It should be appreciated in view of the disclosure herein that themethod 400 may be altered in any number of manners, or may beimplemented in a variety of contexts. Thus, while a crash-and-smashentry may be one type of event where the method 400 is performed, themethod 400 may be performed at other times, and in response to otherevents, that may or may not be emergency or security-related concerns.

Indeed, some embodiments contemplate the method 400, or componentsthereof, being performed regardless of whether a security system orother automation system is armed. In FIG. 4, the act 402 may detect asecurity event potentially prior to detecting a control panel disruptionevent in step 404. This may occur where the security system is armed.If, however, the security system is not armed, the act 402 may notoccur. Instead, the method 400 may begin by detecting another event(e.g., power loss, damage or impact to the control panel, etc.). Thus,the method 400 can be useful regardless of whether or not an automationservice is monitoring a particular system (e.g., whether an alarm isturned on).

The method 400 may also include additional or other acts. For instance,in the context of a security system that is destroyed, an intruder maysmash the control panel before detection can be made as to whether powerwas lost. A signal about the disruption event detected in step 404 may,however, still be sent in act 418. The back-end monitoring system mayexpect to receive both disruption information and power information. Ifinformation about power (e.g., whether power is or is not available) isnot received within a particular time period, the back-end monitoringsystem may assume that the control panel has lost all power. Thus, thestep 412 of detecting loss of power to the control panel may beperformed by the back-end monitoring system. In other embodiments, theback-end monitoring system may send a signal to the control panel. If noresponse is received, the back-end monitoring system may assume allpower has been lost and the control panel is disabled.

It should further be appreciated in view of the disclosure herein thatembodiments of the present disclosure may also be used in connectionwith other systems, methods, and components. For instance, an automationsystem may detect a security-related event in act 402 and immediatelysend a signal to the back-end monitoring system. The back-end monitoringsystem may then wait for an entry period to see if a signal is receivedindicating that a user has disarmed the automation system. If no suchsignal is received, an alarm may be sounded or other actions (e.g., acts422-426) may occur. Of course, waiting for the disabling signal may bebypassed if control panel disruption events and/or power loss aredetected.

In view of the above description, it should be appreciated that systems,control panels, devices, and methods of the present disclosure may allowfor detection of security-related events, including potential damage toa control panel (whether or not intentional, and whether or not alsooccurring with an additional security-related event). By monitoringwhether the control panel is removed, damaged or subjected to an impactforce, the systems, devices, and methods may detect such events andrespond. An example response may include initiating follow-up bynotifying a customer service representative of one or more events. Inresponse to the notification, a customer service representative may callor otherwise contact the customer to determine what is happening anddetermine if there is a security-related threat, whether there is afalse alarm, whether there is a problem with the control panel, orwhether some other event has occurred. Such a call may be made manually,or may be auto-dialed for the customer service representative.

When the call is made, a problem may be remedied in a timely manner. Forinstance, if there is a security-threat, a call may be made to anemergency responder such as the police or security. If the control panelwas inadvertently damaged, a service call may be scheduled orreplacement parts may be sent. If the control panel is being removed andreplaced with a competitive system, the customer service system mayattempt to retain the customer before a competitive system is installedto improve the likelihood of retaining the customer.

Embodiments of the present disclosure may comprise or utilize a specialpurpose or general-purpose computer including computer hardware, suchas, for example, one or more processors and system memory in a controlpanel for an automation system, a server or computing device of anetwork operations center or monitoring system, or in other systems orcomponents. Embodiments within the scope of the present disclosure alsoinclude physical and other computer-readable media for carrying orstoring computer-executable instructions and/or data structures. Suchcomputer-readable media can be any available media that can be accessedby a general purpose or special purpose computer system.Computer-readable media that store computer-executable instructions arecomputer storage media. Computer-readable media that carrycomputer-executable instructions are transmission media. Thus, by way ofexample, and not limitation, embodiments of the disclosure can compriseat least two distinctly different kinds of computer-readable media,including at least computer storage media and/or transmission media.Computer-readable media that includes computer-executable instructionsmay also be referred to as a computer program product.

Examples of computer storage media include RAM, ROM, EEPROM, CD-ROM orother optical disk storage, magnetic disk storage or other magneticstorage devices, flash-based storage, solid-state storage, or any otherphysical, non-transmission medium which can be used to store desiredprogram code means in the form of computer-executable instructions ordata structures and which can be accessed by a general purpose orspecial purpose computer.

When information is transferred or provided over a communication networkor another communications connection (either hardwired, wireless, or acombination of hardwired or wireless) to a computing device, thecomputing device properly views the connection as a transmission medium.A “communication network” may generally be defined as one or more datalinks that enable the transport of electronic data between computersystems and/or modules, engines, and/or other electronic devices, andtransmissions media can include a communication network and/or datalinks, carrier waves, wireless signals, and the like, which can be usedto carry desired program or template code means or instructions in theform of computer-executable instructions or data structures within, toor from a communication network. Combinations of storage media andtransmission media should also be included within the scope ofcomputer-readable media.

Further, upon reaching various computer system components, program codemeans in the form of computer-executable instructions or data structurescan be transferred automatically from transmission media to storagemedia (or vice versa). For example, computer-executable instructions ordata structures received over a network or data link can be buffered inRAM within a network interface module (e.g., a “NIC”), and theneventually transferred to computer system RAM and/or to less volatilecomputer storage media at a computer system. Thus, it should beunderstood that computer storage media may be included in computersystem components that also (or even primarily) utilize transmissionmedia.

Computer-executable instructions comprise instructions and data which,when executed at a processor, cause a general purpose computer,dedicated or special purpose computer (e.g., an automation systemcontrol panel), or special purpose processing device to perform acertain function or group of functions. The computer executableinstructions may be, for example, binaries, intermediate formatinstructions such as assembly language, or even source code. Althoughthe subject matter has been described in language specific to structuralfeatures and/or methodological acts, it is to be understood that thesubject matter defined in the appended claims is not necessarily limitedto the described features or acts described above, nor performance ofthe described acts or steps by the components described above. Rather,the described features and acts are disclosed as example forms ofimplementing the claims.

Those skilled in the art will appreciate that the embodiments may bepracticed in network computing environments with many types of computersystem configurations, including, personal computers, desktop computers,laptop computers, message processors, hand-held devices, programmablelogic machines, multi-processor systems, microprocessor-based orprogrammable consumer electronics, network PCs, tablet computingdevices, minicomputers, automation system control panels, networkoperations centers, mainframe computers, mobile telephones, PDAs,pagers, routers, switches, and the like.

Embodiments may also be practiced in distributed system environmentswhere local and remote computer systems, which are linked (either byhardwired data links, wireless data links, or by a combination ofhardwired and wireless data links) through a network, both performtasks. In a distributed computing environment, program modules may belocated in both local and remote memory storage devices.

Those skilled in the art will also appreciate that embodiments of thepresent disclosure may be practiced in special-purpose, dedicated orother computing devices integrated within or particular to a particularresidence, business, company, government agency, or other entity, andthat such devices may operate using one or more network, wireless,hardwire, or other connections, or any combination thereof. Examples mayinclude residential or commercial buildings in connection with securityor other automation systems configured to monitor local conditions(i.e., within a specific range of the building), remote conditions(i.e., accessible regardless whether within a particular range), or somecombination thereof.

Although the foregoing description contains many specifics, these shouldnot be construed as limiting the scope of the disclosure or of any ofthe appended claims, but merely as providing information pertinent tosome specific embodiments that may fall within the scopes of thedisclosure and the appended claims. Various embodiments are described,some of which incorporate differing features. Any feature illustrated ordescribed relative to one embodiment is interchangeable and/or may beemployed in combination with features of any other embodiment herein. Noelement, component, act, or step is necessarily or required unlessspecifically recited as required for all embodiments disclosed herein.Methods described include acts or steps that may be performed in anyorder. Additionally, disclosed methods may be considered as multiplemethods when actions are taken place by different personnel, systems, orcomponents. Other embodiments may be devised which lie within the scopesof the disclosure and the appended claims. The scope of the disclosureis, therefore, indicated and limited only by the appended claims andtheir legal equivalents. All additions, deletions and modifications tothe disclosure, as disclosed herein, that fall within the meaning andscopes of the claims are to be embraced by the claims.

What is claimed is:
 1. A method of monitoring a condition of a controlpanel of an automation system, the method comprising: detecting acontrol panel disruption event at the control panel; and sending asignal to a back-end monitoring system, the signal indicative of thedisruption event; wherein the automation system includes a securitysystem and the condition of the control panel is monitored independentlyof a status of the security system, and wherein the status of thesecurity system includes at least one of being armed or disarmed.
 2. Themethod recited in claim 1, wherein detecting the control paneldisruption event comprises: detecting an impact force on the controlpanel.
 3. The method recited in claim 1, wherein detecting the controlpanel disruption event comprises: detecting a loss of communication withor malfunction of a component of the control panel.
 4. The methodrecited in claim 3, wherein detecting the loss of communication with thecomponent of the control panel comprises: determining communication witha display device of the control panel has been disrupted.
 5. The methodrecited in claim 1, wherein detecting the control panel disruption eventcomprises: detecting removal of the control panel from a mountedlocation.
 6. The method recited in claim 5, wherein detecting removal ofthe control panel from the mounted location comprises: determining,using an anti-tamper switch, that the control panel has been removedfrom a mounting surface, a mounting plate, or both.
 7. The methodrecited in claim 1, further comprising: determining whether the controlpanel of the automation system has lost power; determining whether thecontrol panel has lost primary power; and determining whether thecontrol panel has lost secondary power.
 8. The method recited in claim7, wherein determining whether the control panel of the automationsystem has lost power comprises: determining whether the control panelhas lost all power.
 9. The method recited in claim 1, the method furthercomprising: receiving a communication from an automation componentcommunicatively linked to the control panel indicating asecurity-related event.
 10. A control panel for an automation systemincluding a security system, comprising: a controller; a communicationinterface communicatively connected to the controller; a sensorconfigured to monitor a condition of the control panel independently ofa status of the security system and wherein the status of the securitysystem includes at least one of being armed or disarmed; and computerreadable media having computer executable instructions stored thereonthat, when executed by the controller, cause the communication interfaceto transmit a signal upon detection by the sensor of disruption to thecontrol panel.
 11. The control panel recited in claim 10, wherein thesensor comprises one of an impact sensor, an accelerometer, or ananti-impact switch.
 12. The control panel recited in claim 10, whereinthe control panel further comprises a display communicatively connectedto the controller, and wherein the sensor is configured to monitor whenthe display loses communication with the controller.
 13. The controlpanel recited in claim 10, wherein the computer readable media storescomputer executable instructions that, when executed by the controller,cause the communication interface to transmit the signal within about100 ms of sensing the disruption to the control panel.
 14. The controlpanel recited in claim 13, wherein the computer readable media storescomputer executable instructions that, when executed by the controller,cause the communication interface to transmit the signal within about 50ms of sensing the disruption to the control panel.
 15. The control panelrecited in claim 10, wherein the sensor is a first sensor, the controlpanel further comprising: a second sensor configured to detect a loss ofpower, wherein the computer readable media stores computer executableinstructions that, when executed by the controller, cause thecommunication interface to transmit a signal indicating when the loss ofpower is detected by the second sensor.
 16. A method comprising, at aservice system remote from a control panel of an automation systemincluding a security system: monitoring a condition of the control panelindependently of a status of the security system and wherein the statusof the security system includes at least one of being armed or disarmed;receiving a signal from the control panel; interpreting the signal; anddetermining the signal indicates the control panel has detected adisruption event at the control panel itself, the disruption eventindicative of a crash-and-smash entry.
 17. The method recited in claim16, wherein interpreting the signal comprises determining the signalindicates the control panel has detected an impact force on the controlpanel.
 18. The method recited in claim 16, wherein interpreting thesignal comprises determining the signal indicates the control panel hasdetected movement of the control panel.
 19. The method recited in claim16, wherein interpreting the signal comprises determining the signalindicates the control panel has detected a loss of communication withone or more components of the control panel.
 20. The method recited inclaim 16, further comprising: determining the control panel has lostaccess to one or more power sources.