Redundancy for back-end failure

ABSTRACT

Methods and systems are described for back-end failure redundancy in security and automation systems. According to at least one embodiment, an apparatus for back-end failure redundancy includes a processor, a memory in electronic communication with the processor, and instructions stored in the memory. The instructions are executable by a processor to detect an alarm event, and attempt to establish a connection between a control panel and a backend system. If no connection between control panel and backend system is made, the instructions may initiate a two-way cellular call between the control panel and a central station, and deliver a caller ID from the control panel to the central station via the two-way cellular call.

CROSS REFERENCE

This application claims priority from U.S. Provisional PatentApplication No. 61/912,979 entitled “REDUNDANCY FOR BACK-END FAILURE,”which was filed 6 Dec. 2013.

BACKGROUND

Advancements in media delivery systems and media-related technologiescontinue to increase at a rapid pace. Increasing demand for media hasinfluenced the advances made to media-related technologies. Computersystems have increasingly become an integral part of the media-relatedtechnologies. Computer systems may be used to carry out severalmedia-related functions. The wide-spread access to media has beenaccelerated by the increased use of computer networks, including theInternet and cloud networking.

Many homes and businesses use one or more computer networks to generate,deliver, and receive data and information between the various computersconnected to computer networks. Users of computer technologies continueto demand increased access to information and an increase in theefficiency of these technologies. Improving the efficiency of computertechnologies is desirable to those who use and rely on computers.

With the wide-spread use of computers and mobile devices has come anincreased presence of home automation and security products.Advancements in mobile devices allow users to monitor and/or control anaspect of a home or business. Backup systems in the event of systemfailure or failure of various portions of an automation and/or securitysystem may not be readily available.

SUMMARY

Methods and systems are described for back-end failure redundancy insecurity and automation systems. According to at least one embodiment,an apparatus for back-end failure redundancy includes a processor, amemory in electronic communication with the processor, and instructionsstored in the memory. The instructions are executable by a processor todetect an alarm event and attempt to establish a connection between acontrol panel and a backend system. If no connection between the controlpanel and backend system is made, the instructions may initiate atwo-way cellular call between the control panel and a central station,and deliver a caller ID from the control panel to the central stationvia the two-way cellular call.

In one embodiment, the control panel may be located at a residence, andthe control panel may include controls for a home security system. Thecentral station may be a call center and the call center may place aseparate two-way call to a designated person responsible for the controlpanel upon receipt of the caller ID. The instructions may also providedispatching emergency assistance through the central station in responseto receiving the caller ID. Attempting to establish a connection betweenthe control panel and the backend system may be performed over anetwork. The network may include the Internet. The control panel mayinclude a cellular radio. The control panel may communicate with thebackend system through a separate network than a network used tocommunication between the control panel and the central station. Theinstructions may be executable by a processor to perform an interveningaction after the caller ID is delivered. The intervening action mayinclude at least one of dispatching fire, police or medical assistance,or dispatch maintenance service.

In another embodiment, a computer-program product for back-end failureredundancy includes a non-transitory computer-readable medium storinginstructions executable by a processor to detect an alarm event andattempt to establish a connection between a control panel and a backendsystem. If no connection between control panel and backend system ismade, the instructions initiate direct communication between the controlpanel and a central station, and deliver information from the controlpanel to the central station via the direct communication.

In one embodiment, the direct communication includes a 2-way cellularcall. The information may include a caller ID. The information mayinclude only a caller ID.

In a further embodiment, a computer-implemented back-end failureredundancy method comprises attempting to establish a connection betweena control panel and a backend system, confirming that no connectionbetween control panel and backend system is made, initiating a two-waycellular call between the control panel and a central station, andcommunicating information between the control panel and the centralstation via the two-way cellular call.

In one embodiment, the method further includes detecting an alarm event,and the information relates to the alarm event. The alarm event mayinclude one of detecting smoke, fire, or an intruder, or a medicalemergency. Communicating information may include delivering a caller ID.The method may include confirming whether an alarm signal has beenreceived from the backend system to the central station in connectionwith the control panel. The method may include accessing a database toconfirm whether the information received by the central stationcorresponds with a control panel being monitored by the central station.

The foregoing has outlined rather broadly the features and technicaladvantages of examples according to the disclosure in order that thedetailed description that follows may be better understood. Additionalfeatures and advantages will be described hereinafter. The conceptionand specific examples disclosed may be readily utilized as a basis formodifying or designing other structures for carrying out the samepurposes of the present disclosure. Such equivalent constructions do notdepart from the spirit and scope of the appended claims. Features whichare believed to be characteristic of the concepts disclosed herein, bothas to their organization and method of operation, together withassociated advantages will be better understood from the followingdescription when considered in connection with the accompanying figures.Each of the figures is provided for the purpose of illustration anddescription only, and not as a definition of the limits of the claims.

BRIEF DESCRIPTION OF THE DRAWINGS

A further understanding of the nature and advantages of the embodimentsmay be realized by reference to the following drawings. In the appendedfigures, similar components or features may have the same referencelabel. Further, various components of the same type may be distinguishedby following the reference label by a dash and a second label thatdistinguishes among the similar components. If only the first referencelabel is used in the specification, the description is applicable to anyone of the similar components having the same first reference labelirrespective of the second reference label.

FIG. 1 is a block diagram of an environment in which the present systemsand methods may be implemented;

FIG. 2 is a block diagram of another environment in which the presentsystems and methods may be implemented;

FIG. 3 is a block diagram of an example communications module of theenvironments shown in FIGS. 1 and 2;

FIG. 4 is a block diagram of an example response module of theenvironments shown in FIGS. 1 and 2;

FIG. 5 is a flow diagram illustrating a method for back-end failureredundancy;

FIG. 6 is a flow diagram illustrating another method for back-endfailure redundancy;

FIG. 7 is a flow diagram illustrating another method for back-endfailure redundancy;

FIG. 8 is a flow diagram illustrating another method for back-endfailure redundancy; and

FIG. 9 is a block diagram of a computer system suitable for implementingthe present systems and methods of FIGS. 1 and 2.

While the embodiments described herein are susceptible to variousmodifications and alternative forms, specific embodiments have beenshown by way of example in the drawings and will be described in detailherein. However, the exemplary embodiments described herein are notintended to be limited to the particular forms disclosed. Rather, theinstant disclosure covers all modifications, equivalents, andalternatives falling within the scope of the appended claims.

DETAILED DESCRIPTION

The systems and methods described herein relate to home automation andhome security, and related security systems and automation for use incommercial and business settings. More specifically, the systems andmethods described herein relate to an improved communication arrangementbetween a control panel installed in the monitored property, a backendcommunication system, and a central station. The communicationarrangement provides redundancy for delivery of information (e.g., alarminformation) from the control panel to the central station in the eventthe backend system, which is typically interposed between the controlpanel and central station and the sole means of communicatinginformation from the control panel to the central station, isinaccessible by the control panel. The communication arrangementprovides for bypass of the backend system when the backend system isdown (e.g., unable to receive communications, such as an alarm signal,from the control panel).

FIG. 1 is a block diagram illustrating one embodiment of an environment100 in which the present systems and methods may be implemented. In someembodiments, the systems and methods described herein may be performedon a remote management device 105 (e.g., a control panel). Theenvironment 100 may include the device 105, a backend system 110, acentral station 115, and first and second networks 120, 125. The firstand second networks 120, 125 provide communication between at least someof the device 105, backend system 110, and central station 115.

In some embodiments, the remote management device 105 is a portableelectronic device with a touch screen display. The device 105 may be incommunication with one or more sensors. A sensor may include, forexample, a camera sensor, audio sensor, forced entry sensor, shocksensor, proximity sensor, boundary sensor, appliance sensor, lightfixture sensor, temperature sensor, light beam sensor, three-dimensional(3-D) sensor, motion sensor, smoke sensor, glass break sensor, doorsensor, window sensor, carbon monoxide sensor, accelerometer, globalpositioning system (GPS) sensor, Wi-Fi positioning system sensor,capacitance sensor, radio frequency sensor, near-field sensor, heartbeatsensor, breathing sensor, oxygen sensor, carbon dioxide sensor, brainwave sensor, movement sensor, voice sensor, and the like.

In some configurations, device 105 may include components such as a userinterface 135, a communication module 140, and an alarm module 145.Although the components of device 105 are depicted as being internal todevice 105, it is understood that one or more of the components may beexternal to the device 105 and connect to device 105 through wiredand/or wireless connections. For example, one or more components (e.g.,software, firmware, and/or hardware) of communication module 140 may belocated, installed, and/or part of other components and/or systems ofenvironment 100.

In some embodiments, device 105 may communicate with backend system 110via the first network 120. The backend system 110 may then communicateat least some of the information received from device 105 to centralstation 115. Alternatively, device 105 may communicate with centralstation 115 separately through the second network 125. Examples ofnetworks 120, 125 include cloud networks, local area networks (LAN),wide area networks (WAN), virtual private networks (VPN), wirelessnetworks (using 802.11, for example), and/or cellular networks (using 3Gand/or LTE, for example), etc. In some embodiments, the first network120 may include the Internet and the second network 125 may includecellular networks.

The primary communication channel between device 105 and central station115 may include routing through backend system 110. Typically, whendevice 105 has information to transfer to central station 115 (e.g.,information about an alarm event determined using alarm module 145), thedevice 105 may attempt to create a communication link with backendsystem 110 via communication module 140. If the communication link isavailable, the link is established and the information is transferredfrom device 105 to backend system 110 via, for example, communicationmodule 140. The backend system 110 then transfers at least some of theinformation received from device 105, and potentially additionalinformation, to central station 115.

The environment 100 may be configured to provide a redundant or backupcommunication system between device 105 and central station 115 inaddition to the communications possible via backend system 110. Theredundant communication system typically becomes active when device 105attempts to create a communication link with backend system 110 and thelink fails. The failure to create a communication link between device105 and backend system 110 may occur for any of a number of reasons,including, for example, failures associated with the first network 120(e.g., dysfunctional hardware, etc.) or failures associated with backendsystem 110 (e.g., power outage, etc.).

If the communication link is unavailable, the device 105 may create abackup communication link with central station 115 via communicationmodule 140, and communicate information to central station 115 via thebackup communication link. The backup communication link may be createdby initiating, for example, a 2-way cellular call from a cellular radioof the device 105 and a cellular device at central station 115. Theinformation transferred from device 105 to central station 115 via thebackup communication link may include, for example, a caller ID or otherinformation associated with device 105, an alarm communication (e.g., analarm code) or information about the property location.

Once central station 115 receives the information conveyed by device105, whether through backend system 110 or directly from device 105,central station 115 may perform any of a number of functions including,for example, initiating a separate two-way call with a designatedcontact person associated with device 105 or the property generally,dispatching emergency or service personnel, or some other interveningaction using, for example, a response module 180.

Referring now to FIG. 2, in some embodiments, an environment 200 mayinclude the components of environment 100 described above, and mayfurther include a sensor 130, a mobile computing device 155, a homeautomation controller 160, a database 165, and a display 170.Additionally, a remote management device 105-a may include anapplication 150. The device 105-a may be an example of the deviceillustrated in FIG. 1.

Sensor 130 shown in FIG. 2 may represent one or more separate sensors ora combination of two or more sensors in a single sensor device. Forexample, sensor 130 may represent one or more camera sensors and one ormore motion sensors connected to environment 200. Additionally, oralternatively, sensor 130 may represent a combination sensor such asboth a camera sensor and a motion sensor integrated in the same sensordevice. Although sensor 130 is depicted as connecting to device 105-aover network 120, in some embodiments, sensor 130 may connect directlyto device 105-a. Additionally, or alternatively, sensor 130 may beintegrated with a home appliance or fixture such as a light bulbfixture. Sensor 130 may include an accelerometer to enable sensor 130 todetect a movement. Sensor 130 may include a wireless communicationdevice enabling sensor 130 to send and receive data and/or informationto and from one or more devices in environment 200. Additionally, oralternatively, sensor 130 may include a GPS sensor to enable sensor 130to track a location of sensor 130. Sensor 130 may include a proximitysensor to enable sensor to detect proximity of a person relative to apredetermined distance from a dwelling (e.g., geo-fencing). Sensor 130may include one or more security detection sensors such as, for example,a glass break sensor, a motion detection sensor, or both. Additionally,or alternatively, sensor 130 may include a smoke detection sensor, acarbon monoxide sensor, or both.

In some embodiments, mobile computing device 155 may include atelevision set. Additionally, or alternatively, mobile computing device155 may include one or more processors, one or more memory devices,and/or a storage device. Examples of mobile computing device 155 mayinclude a viewing device associated with a media content set top box,satellite set top box, cable set top box, DVRs, personal video recorders(PVRs), and/or mobile computing devices, smart phones, personalcomputing devices, computers, servers, etc.

In some embodiments, a user may access the functions of device 105-aand/or home automation controller 160 from mobile computing device 155.For example, in some embodiments, mobile computing device 155 includes amobile application that interfaces with one or more functions of device105-a, home automation controller 160, and/or backend system 110 andcentral station 115.

Examples of the home automation controller 160 may include a dedicatedhome automation computing device (e.g., wall-mounted controller), apersonal computing device (e.g., laptop, desktop, etc.), a mobilecomputing device (e.g., tablet computing device, smartphone, etc.), andthe like.

In some embodiments, device 105-a may be integrated with home automationcontroller 160 in the form of one or more personal computing devices(e.g. mobile devices, smart phones, and/or personal computing devices)to both control aspects of a property as well as to receive and displaynotifications regarding monitored activity of a property.

In some embodiments, central station 115 may be coupled to database 165.Backend system 110 may be directly coupled to database 165 or may beindirectly coupled via central station 115. Database 165 may include,for example, control panel IDs associated with each device 105-a beingmonitored by backend system 110 and central station 115. Database 165may include other information including, for example, historicalinformation about device 105-a and other aspects of environment 200,contact information for various response personnel, and the like.

Application 150 may allow a user to control (either directly or via homeautomation controller 160) an aspect of the monitored property,including security, energy management, locking or unlocking a door,checking the status of a door, locating a person or item, controllinglighting, thermostat, cameras, receiving notification regarding acurrent status or anomaly associated with a home, office, place ofbusiness, and the like. In some configurations, application 150 mayenable device 105-a to interface with home automation controller 160 andprovide the user interface 135 to display automation, security, and/orenergy management content on device 105-a and/or mobile computing device155. Thus, application 150, via the user interface 135, may allow usersto control aspects of their home, office, and/or other type of property.Further, application 150 may be installed on mobile computing device 155in order to allow a user to interface with a function of device 105-a,home automation controller 160, and/or backend system 110 or centralstation 115.

FIG. 3 is a block diagram illustrating one example of a communicationmodule 140-a. Communication module 140 may be one example ofcommunication module 140 depicted in FIGS. 1 and/or 2. As depicted,communication module 140-a may include a link determination module 300,a call module 305, and an information transfer module 310. Communicationmodule 140-a may include additional modules and capability in otherembodiments. Similarly, communication module 140-a may include a fewernumber of modules and functionality than that which is described withreference to FIG. 3.

Link determination module 300 may operate to determine whether it ispossible to create a communication link between device 105 and backendsystem 110. Link determination module 300 may determine, for example,whether the first network 120 is available, and if it is, determinewhether backend system 110 is available to create the communicationlink. If the communication link is available, communication module 140-agenerates the communication link between device 105 and backend system110 via the second network 120. Information transfer module 310 ofcommunication module 140 may then transfer information from device 105to backend system 110. The information may include, for example,information about an alarm event determined using alarm module 145 (seeFIG. 1).

In the event that link determination module 300 determines that acommunication link between device 105 and backend system 110 is notpossible, call module 305 may operate to create a communication linkbetween device 105 and central station 115. In at least one example,call module 305 initiates a two-way cellular call between device 105 andcentral station 115 via the second network 125. Once the communicationlink between device 105 and central station 115 is initiated using callmodule 305, information transfer module 310 may transfer informationfrom device 105 to central station 115. The information transferred viainformation transfer module 310 may be dependent upon, at least in part,the type of communication link generated between device 105 and centralstation 115. In the case of a two-way cellular call, the informationtransferred may include, for example, a caller ID. Other information mayinclude, for example, an alarm code, a residence address, or otheravailable detail. In the case of a communication link over another typeof communication medium such as the Internet, additional detail may beprovided in the transferred information.

The label of “call” module 305 does not necessarily limit thefunctionality of call module 305 to making calls in order to create acommunication link between device 105 and central station 115. Othertypes of communication links are possible via the second network 125,and call module 305 may operate to generate any one of a number ofdifferent types of communication links using various technologies, suchas any one of the technologies discussed above related to networks 120,125.

FIG. 4 is a block diagram illustrating one example of a response module180-a. Response module 180-a may be one example of response module 180depicted in FIGS. 1 and/or 2. As depicted, response module 180-a mayinclude a detection module 400, an ID verification module 405, a backendconfirmation module 410, a dispatch module 415, and a user outreachmodule 420.

When communications are incoming from backend system 110, responsemodule 180-a may have a different protocol or operating procedure thanwhen information is incoming directly from device 105 via network 125.During operation of environments 100, 200, wherein communications fromdevice 105 are transferred through the first network 120 and backendsystem 110 to central station 115, detection module 400 detects acommunication incoming from backend system 110, identifies a deviceand/or a location for the incoming information via the ID verificationmodule 405, and then uses the dispatch module 415 and/or the useroutreach module 420 to perform an intervening action. The backendconfirmation module 410 may operate to confirm that the incominginformation is being sent from the backend system 110 rather than fromanother source.

In the event of a backend failure (e.g., inability for device 105 tocommunicate with backend system 110), the response module 180-a mayinitiate a separate operating procedure. In the separate (e.g.,redundant or backup) procedure, the detection module 400 detectsincoming information. In at least some examples, the incominginformation received from the backend system 110 is different orprovided in a different format and/or communication medium from theinformation delivered directly from device 105 via the second network125. In at least some arrangements, the information sent directly fromdevice 105 via the second network 125 is unique as compared tocommunication from backend system 110 and immediately triggers thealternative operating procedure referenced as a backup procedure. Forexample, the information received by detection module 400 may be in theform of a caller ID sent via a two-way cellular call, whereininformation delivered from backend system 110 does not include a callerID or send information via a two-way cellular call.

Once the information is received by detection module 400, responsemodule 180-a operates the ID verification module 405 to determine whichdevice 105 and/or location at which the device 105 resides. Once the IDverification is complete, central station 115 may be able to recognizethe type of system (e.g., security or automation) and its relatedcapabilities. The backend confirmation module 410 may check to confirmthat no information associated with the identified device and/orlocation has been received from the backend system 110. If no suchinformation has been received from the backend system 110, responsemodule 180-a may operate at least one of the dispatch module 415 anduser outreach module 420 to perform an intervening action. For example,dispatch module 415 may operate to dispatch at least one of servicepersonnel or police, fire, or medical personnel to the location ofdevice 105 or its associated monitored property. In another example,user outreach module 420 may operate to attempt communication withsomeone associated with device 105 (e.g., a home or business owner,security guards, etc.) via, for example, a text message, a cellularcall, an email, or a social media message.

In at least some examples, the information conveyed to central station115 from device 105 through the second network 125 provides limitedinformation. As a result, the response from the central station 115 viathe user outreach module 420 may include, for example, a message thatthe system is receiving a non-descript emergency signal from thelocation of device 105 and a request for confirmation of thecircumstances and events ongoing at the location of device 105 or theproperty being monitored by device 105. In other arrangements,additional information may be conveyed via the second network 125 thatprovides sufficient guidance for central station 115 to dispatchspecific resources via dispatch module 415.

FIG. 5 is a flow diagram illustrating one embodiment of a method 500 forbackend failure redundancy. In some configurations, the method 500 maybe implemented by the communication module 140 of device 105 shown inFIGS. 1 and/or 2. In other examples, method 500 may be performedgenerally by device 105 shown in FIGS. 1 and/or 2, or even moregenerally by the environments 100, 200 shown in FIGS. 1 and/or 2,respectively. In some configurations, method 500 may be implemented inconjunction with response module 180 and/or operation of central station115 generally as described above.

At block 505, an alarm advance may be detected. The alarm event may bedetected or determined using, for example, communication module 140 orthe alarm module 145 of device 105. At block 510, an attempt is made toestablish a connection between a device (e.g., control panel) and abackend system. The connection is typically established over a networksuch as the first network 120 for connection to a backend system such asbackend system 110. At block 515, when it is determined that noconnection is possible between the device (e.g., control panel) in thebackend system, a two-cellular call is initiated between the device(e.g., control panel) and a central station, such as central station115.

The inability to create a connection between a control panel and thebackend system may be due to problems with the network over whichcommunication is typically provided between the control panel andbackend system, or in the backend system itself. Failure of the backendsystem may initiate a redundant backup procedure in which the two-waycellular call or other type of communication is initiated between thecontrol panel and the central station. The two-way cellular call and/orother communication may be performed over the same or different networkas the network typically used for communication between the controlpanel and backend system.

At block 520, a caller ID is delivered from the control panel to thecentral station via the two-way cellular call. While a caller ID may beused as a specific example of the type of information delivered from thecontrol panel to the central station, other types of information may beconveyed including, for example, an alarm code, location information,etc.

At block 525, an intervening action is performed in response to thecaller ID delivered to the central station. The intervening action mayinclude, for example, outreach to a user of a control panel via, forexample, a two-way cellular call, a text or other communication outsideof the two-way cellular call used to deliver the caller ID to thecentral station, or dispatching service or emergency personnel to thelocation of the control panel.

FIG. 6 is a flow diagram illustrating one embodiment of a method 600 forbackend failure redundancy. In some configurations, the method 600 maybe implemented by the communication module 140 described above withreference to FIGS. 1 and 2, or generally the device 105 or environment100, 200 described above with reference to FIGS. 1 and/or 2.

At block 605, an alarm event is detected. The alarm event may be any ofa number of different events or conditions detected by any number ofsensors or other feedback mechanisms (e.g., sensor 130 shown in FIG. 2).At block 610, an attempt is made to establish a connection between acontrol panel and a backend system. The control panel may include or bepart of the device 105 described with reference to FIGS. 1 and/or 2. Thebackend system may be the backend system 110 described in reference toFIGS. 1 and/or 2. The attempt to establish the connection between thecontrol panel and the backend system may be performed via, for example,the first network 120 of FIGS. 1 and/or 2.

At block 615, if no connection between the control panel and backendsystem is made, a direct communication is initiated between the controlpanel and a central station. The central station may include the centralstation 115 of FIGS. 1 and/or 2. The direct communication may beprovided via a separate network such as the second network 125 of FIGS.1 and/or 2. The direct communication may include, for example, a two-waycellular call.

At block 620, information is delivered from the control panel to thecentral station via the direct communication. The information deliveredmay include, for example, a caller ID, alarm code, location information,or other information relative to the device 105 or environment 100, 200,generally. Other steps of method 600 may relate to responsivecommunications from the control station such as, for example, anintervening action (e.g., dispatching services or contacting a userassociated with the control panel).

FIG. 7 is a flow diagram illustrating one embodiment of a method 700 forbackend failure redundancy. In some configurations, the method 700 maybe implemented by the communication module 140, device 105, orenvironment 100, 200, generally, which are described above withreference to FIGS. 1-4.

At block 705, an attempt is made to establish a connection between acontrol panel and a backend system. The control panel may include all orportions of device 105 described with reference to FIGS. 1 and/or 2. Thebackend system may be accessible via a network. At block 710,confirmation is made that no connection is available between the controlpanel and backend system. The failure to connect the control panel thebackend system may result from problems with the network or withfailures at the backend system.

Block 715 includes initiating a two-cellular call between the controlpanel and a central station. The two-way cellular call may be madeacross a different network than the network used to connect the controlpanel to the backend system. At block 720, information is communicatedbetween a control panel and a central station via the two-way cellularcall. The information may include, for example, a caller ID or otherinformation that may be conveyed from the control panel to the centralstation without requiring two-way communication back from the centralstation to the control panel. As discussed above, the two-way cellularcall initiated in block 715 and used for communicating information inblock 720 may be replaced with other types of communication via othertypes of networks. A two-way cellular call may have particular relevancein the applications described herein because of the ease and relativelylow cost of including a cellular radio in the control panel (e.g.,device 105) and at the central station. The cellular radio may providean alternative means of communicating information from the control panelto the central station by bypassing the typical lines of communicationbetween the device and backend system and between the backend system andthe central station. The cellular radio may provide an entirely separatenetwork or line of communication to better ensure that the backendfailure redundancy does not fail for the same or similar reasons as thecommunication failure between the device and the backend system.

FIG. 8 is a flow diagram illustrating one embodiment of a method 800 forbackend failure redundancy. In some configurations, the method 800 maybe implemented by the communication module 140, device 105, orenvironment 100, 200 described above with reference to FIGS. 1-4.

At block 805, an alarm event is detected. The alarm event may be any ofa number of different events or circumstances associated with anenvironment (e.g., environment 100, 200). The alarm event may bedetected at least in part by a sensor such as sensor 130 described withreference to FIGS. 1 and/or 2.

At block 810, an attempt is made to connect the control panel to abackend system. If the connection is made, an alarm message is deliveredto the backend system at block 850. At block 855, an alarm message isdelivered from the backend system to a central station. Thereafter, thecentral station may perform an intervening action such as dispatchingservice for emergency personnel, or contacting a user of the controlpanel.

If the connection between the control panel and backend system is notmade, block 815 shows that a two-way cellular call is initiated betweenthe control panel and the central station. This separate communicationeffectively bypasses communications typically routed through the backendsystem as described with reference to blocks 850 and 855. The two-waycellular call is just one of numerous examples of the type ofcommunication that may be possible between the control panel and thecentral station, and does not limit which of these communication mediumsmay be used.

At block 820, the cellular connection between the control panel and thecentral station is confirmed. Once confirmation is complete, a caller IDis delivered from the control panel to central station in block 825.Other types of information besides a caller ID may be delivered from thecontrol panel to the central station via the two-way cellular call. Someexample types of information include, for example, an alarm code,information about the control panel, and a location of the controlpanel.

At block 830, confirmation of the control panel in the database is made.This confirmation is used to ensure that the control panel from whichthe caller ID is received, or the associated monitored property, is partof the network or system that is being monitored by the central station.At block 835, confirmation is made that no alarm signal has beenreceived from the backend system. If a separate alarm signal is receivedfrom the backend system for a particular control panel, a differentprotocol or operating procedure may be initiated to deal with such asituation of conflicting signals. In the event that no alarm signal hasbeen received from the backend system, a method 800 may proceed toadditional operating steps.

At block 840, an attempt is made to contact the user of the controlpanel, some other authorized person associated with the control panel,and/or the property associated with the control panel. The attemptedcontact may be made using, for example, a two-cellular call, text,email, or contact via social media. If communication is initiated withthe user, an inquiry may be made concerning why or how the caller IDspecifically and/or the other information received directly from thecontrol panel occurred.

At block 845, assistance may be dispatched in response to the receivedinformation from the control panel. The assistance may be in the formof, for example, service personnel or emergency services.

Alternative methods may relate specifically to operating procedures forthe control panel. The control panel may have a certain operatingprocedure in the event that information is received from the backendsystem related to an alarm event. A separate operating procedure may beused when a signal is received directly from the control panel. Varioussteps may be taken to confirm that the signal or information receiveddirectly from the control panel is accurate. Upon receiving a signaldirectly from the control panel, further steps may be taken to initiatechecks on the backend system and/or the network used to communicatebetween the control panel and the backend system. Typically, no signalis received directly from the control panel to the central stationunless a failure has occurred at the backend system or the network usedto communicate between the backend system and the control panel.

FIG. 9 depicts a block diagram of a controller 900 suitable forimplementing the present systems and methods. The controller 900 may bean example of the device 105, mobile computing device 155, and/or homeautomation controller 160 illustrated in FIG. 1. In one configuration,controller 900 includes a bus 905 which interconnects major subsystemsof controller 900, such as a central processor 915, a system memory 920(typically RAM, but which may also include ROM, flash RAM, or the like),an input/output controller 925, an external audio device, such as aspeaker system 930 via an audio output interface 935, an externaldevice, such as a display screen 935 via display adapter 940, an inputdevice 945 (e.g., remote control device interfaced with an inputcontroller 950), multiple USB devices 965 (interfaced with a USBcontroller 970), one or more cellular radios 990, and a storageinterface 980. Also included are at least one sensor 955 connected tobus 905 through a sensor controller 960 and a network interface 985(coupled directly to bus 905).

Bus 905 allows data communication between central processor 915 andsystem memory 920, which may include read-only memory (ROM) or flashmemory (neither shown), and random access memory (RAM) (not shown), aspreviously noted. The RAM is generally the main memory into which theoperating system and application programs are loaded. The ROM or flashmemory can contain, among other code, the Basic Input-Output system(BIOS) which controls basic hardware operation such as the interactionwith peripheral components or devices. For example, a communicationmodule 140-b or a response module 180-b to implement the present systemsand methods may be stored within the system memory 920. Thecommunication module 140-b may be an example of the communication module140 illustrated in FIGS. 1, 2, and/or 3. The response module 180-b maybe an example of the response module 180 illustrated in FIGS. 1, 2,and/or 4. Applications (e.g., application 150) resident with controller900 are generally stored on and accessed via a non-transitory computerreadable medium, such as a hard disk drive (e.g., fixed disk 975) orother storage medium. Additionally, applications can be in the form ofelectronic signals modulated in accordance with the application and datacommunication technology when accessed via interface 985.

Storage interface 980, as with the other storage interfaces ofcontroller 900, can connect to a standard computer readable medium forstorage and/or retrieval of information, such as a fixed disk drive 975.Fixed disk drive 975 may be a part of controller 900 or may be separateand accessed through other interface systems. Network interface 985 mayprovide a direct connection to a remote server via a direct network linkto the Internet via a POP (point of presence). Network interface 985 mayprovide such connection using wireless techniques, including digitalcellular telephone connection, Cellular Digital Packet Data (CDPD)connection, digital satellite data connection, or the like. In someembodiments, one or more sensors (e.g., motion sensor, smoke sensor,glass break sensor, door sensor, window sensor, carbon monoxide sensor,and the like) connect to controller 900 wirelessly via network interface985. In one configuration, the cellular radio 990 may include a receiverand transmitter to wirelessly receive and transmit communications via,for example, a cellular network. The cellular radio 990 may be used totransmit information to the central station 115 via the second network125.

Many other devices or subsystems (not shown) may be connected in asimilar manner (e.g., entertainment system, computing device, remotecameras, wireless key fob, wall mounted user interface device, cellradio module, battery, alarm siren, door lock, lighting system,thermostat, home appliance monitor, utility equipment monitor, and soon). Conversely, all of the devices shown in FIG. 9 need not be presentto practice the present systems and methods. The devices and subsystemscan be interconnected in different ways from that shown in FIG. 9. Theaspect of some operations of a system such as that shown in FIG. 9 arereadily known in the art and are not discussed in detail in thisapplication. Code to implement the present disclosure can be stored in anon-transitory computer-readable medium such as one or more of systemmemory 920 or fixed disk 975. The operating system provided oncontroller 900 may be iOS®, ANDROID®, MS-DOS®, MS-WINDOWS®, OS/2®,UNIX®, LINUX®, or another known operating system.

Moreover, regarding the signals described herein, those skilled in theart will recognize that a signal can be directly transmitted from afirst block to a second block, or a signal can be modified (e.g.,amplified, attenuated, delayed, latched, buffered, inverted, filtered,or otherwise modified) between the blocks. Although the signals of theabove described embodiment are characterized as transmitted from oneblock to the next, other embodiments of the present systems and methodsmay include modified signals in place of such directly transmittedsignals as long as the informational and/or functional aspect of thesignal is transmitted between blocks. To some extent, a signal input ata second block can be conceptualized as a second signal derived from afirst signal output from a first block due to physical limitations ofthe circuitry involved (e.g., there will inevitably be some attenuationand delay). Therefore, as used herein, a second signal derived from afirst signal includes the first signal or any modifications to the firstsignal, whether due to circuit limitations or due to passage throughother circuit elements which do not change the informational and/orfinal functional aspect of the first signal.

While the foregoing disclosure sets forth various embodiments usingspecific block diagrams, flowcharts, and examples, each block diagramcomponent, flowchart step, operation, and/or component described and/orillustrated herein may be implemented, individually and/or collectively,using a wide range of hardware, software, or firmware (or anycombination thereof) configurations. In addition, any disclosure ofcomponents contained within other components should be consideredexemplary in nature since many other architectures can be implemented toachieve the same functionality.

The process parameters and sequence of steps described and/orillustrated herein are given by way of example only and can be varied asdesired. For example, while the steps illustrated and/or describedherein may be shown or discussed in a particular order, these steps donot necessarily need to be performed in the order illustrated ordiscussed. The various exemplary methods described and/or illustratedherein may also omit one or more of the steps described or illustratedherein or include additional steps in addition to those disclosed.

Furthermore, while various embodiments have been described and/orillustrated herein in the context of fully functional computing systems,one or more of these exemplary embodiments may be distributed as aprogram product in a variety of forms, regardless of the particular typeof computer-readable media used to actually carry out the distribution.The embodiments disclosed herein may also be implemented using softwaremodules that perform certain tasks. These software modules may includescript, batch, or other executable files that may be stored on acomputer-readable storage medium or in a computing system. In someembodiments, these software modules may configure a computing system toperform one or more of the exemplary embodiments disclosed herein.

The foregoing description, for purpose of explanation, has beendescribed with reference to specific embodiments. However, theillustrative discussions above are not intended to be exhaustive or tolimit the invention to the precise forms disclosed. Many modificationsand variations are possible in view of the above teachings. Theembodiments were chosen and described in order to best explain theprinciples of the present systems and methods and their practicalapplications, to thereby enable others skilled in the art to bestutilize the present systems and methods and various embodiments withvarious modifications as may be suited to the particular usecontemplated.

Unless otherwise noted, the terms “a” or “an,” as used in thespecification and claims, are to be construed as meaning “at least oneof.” In addition, for ease of use, the words “including” and “having,”as used in the specification and claims, are interchangeable with andhave the same meaning as the word “comprising.” In addition, the term“based on” as used in the specification and the claims is to beconstrued as meaning “based at least upon.”

What is claimed is:
 1. A control panel comprising: a processor; a memoryin electronic communication with the processor; and instructions storedin the memory, the instructions being executable by a processor to:detect an alarm event; attempt to establish a connection over a firstnetwork with a backend system; if no connection with the backend systemis made, initiate a communications link over a second network distinctfrom the first network with a central station, wherein the communicationlink comprises a two-way cellular call; and deliver information to thecentral station via the communications link, wherein the information isassociated with the alarm event and comprises a caller identification(ID).
 2. The control panel of claim 1, wherein the control panel islocated at a residence, and the control panel comprises controls for ahome security system.
 3. The control panel of claim 1, furthercomprising dispatching emergency assistance through the central stationin response to receiving the caller ID.
 4. The control panel of claim 1,wherein the first network includes the Internet.
 5. The control panel ofclaim 4, wherein the central station is a call center and the callcenter places a separate two-way call over the second network to adesignated person responsible for the control panel upon receipt of thecaller ID.
 6. The control panel of claim 1, wherein the control panelincludes a cellular radio.
 7. The control panel of claim 1, wherein theinstructions are executable by a processor to perform an interveningaction after the caller ID is delivered.
 8. The control panel of claim7, wherein the intervening action includes at least one of dispatchingfire, police or medical assistance, or dispatch maintenance service. 9.The control panel of claim 1, wherein the information further comprisesat least one of an alarm code or a residence address.
 10. The controlpanel of claim 1, wherein the control panel is not configured to deliverinformation over the first network that comprises a caller ID or todeliver information via a two-way cellular call over the first network.11. A computer-program product comprising a non-transitorycomputer-readable medium storing instructions executable by a processorto: detect an alarm event; attempt to establish a connection between acontrol panel and a backend system over a first network; if noconnection between the control panel and backend system is made,initiate direct communication between the control panel and a centralstation over a second network distinct from the first network, whereinthe direct communication includes a two-way cellular call; and deliverinformation from the control panel to the central station via the directcommunication, wherein the information relates to the alarm event andincludes a caller identification (ID).
 12. The computer-program productof claim 11, wherein the first network includes the Internet and thecentral station is a call center; and wherein the instructions arefurther executable by the processor to place a separate two-way callover a network different from the first network to a designated personresponsible for the control panel upon receipt of the caller ID.
 13. Acomputer-implemented method comprising: detecting an alarm event;attempting to establish a connection over a first network between acontrol panel and a backend system; confirming that no connectionbetween control panel and backend system is made; initiating a two-waycellular call over a second network distinct from the first networkbetween the control panel and a central station; and communicatinginformation between the control panel and the central station via thetwo-way cellular call, wherein the information relates to the alarmevent and includes a caller identification (ID).
 14. The method of claim13, wherein the alarm event includes one of detecting smoke, fire, or anintruder, or a medical emergency.
 15. The method of claim 13, furthercomprising: confirming whether an alarm signal has been received fromthe backend system to the central station in connection with the controlpanel.
 16. The method of claim 13, further comprising: accessing adatabase to confirm whether the information received by the centralstation corresponds with a control panel being monitored by the centralstation.
 17. The computer-implemented method of claim 13, wherein thefirst network includes the Internet and the central station is a callcenter, and further comprising: placing a separate two-way call over thesecond network to a designated person responsible for the control panelupon receipt of the caller ID.