Protecting electronic devices from electrical supply disturbances

ABSTRACT

Embodiments of the present invention provide an approach for monitoring electrical disturbance (e.g., surges, outages, etc.) possibilities, and then automatically isolating electronic devices (also referred to herein as electronics) for the duration of the disturbance (or threat thereof). In a typical embodiment, a probability of an electrical disturbance occurring at a specified location will be determined. Then, a set of device protection profiles will be accessed. The set of device protection profiles comprises a set of thresholds and a corresponding set of device topologies associated with a set of electronic devices positioned. The set of thresholds in the set of device protection profiles will then be compared to the probability to identify a matching device topology from the set of device topologies. According to the matching device topology, at least one electronic device will be isolated from an electrical power source.

CROSS-REFERENCE TO RELATED APPLICATION

The present patent document is a continuation of U.S. patent applicationSer. No. 13/276,393, filed Oct. 19, 2011, entitled “PROTECTINGELECTRONIC DEVICES FROM ELECTRICAL SUPPLY DISTURBANCES”, the disclosureof which is incorporated herein by reference.

TECHNICAL FIELD

In general, the present invention relates to electronic deviceprotection. Specifically, the present invention relates to theprotection of electronic devices from electrical disturbances or thelike.

BACKGROUND

Electrical disturbances (e.g., power disruptions) may be detrimental toelectronic devices connected to a line carrying increased energy.Effects may range from slightly damaging the electronics to renderingthe electronics completely inoperable. Damaged electronics may causefires or even hazardous amounts of electrical energy to individualsusing those devices at the time of the disturbance. Causes of theseelectrical disturbances may range from lightning strikes to maintenanceproblems. Challenges may exist in providing a way to safely monitorelectronics when electrical disturbances are likely to occur.

SUMMARY

Embodiments of the present invention provide an approach for monitoringelectrical disturbance (e.g., surges, outages, etc.) possibilities, andthen automatically isolating (e.g., disconnecting) electronic devices(also referred to herein as electronics) for the duration of thedisturbance (or threat thereof). In a typical embodiment, a probabilityof an electrical disturbance occurring at a specified location will bedetermined. Then, a set of device protection profiles will be accessedfrom at least one computer storage device. In general, the set of deviceprotection profiles comprises a set of thresholds and a correspondingset of device topologies associated with a set of electronic devicespositioned at the specified location. The set of thresholds in the setof device protection profiles will then be compared to the probabilityto identify a matching device topology from the set of devicetopologies. According to the matching device topology, at least oneelectronic device may be isolated from an electrical power source.Optionally, the isolated device(s) may be switched from a wired mode toa wireless mode for continued functionality within the location.

A first aspect of the present invention provides a computer-implementedmethod for protecting electronic devices from electrical disturbances,comprising: determining a probability of an electrical disturbanceoccurring at a specified location; accessing a set of device protectionprofiles from at least one computer storage device, the set of deviceprotection profiles comprising a set of thresholds and a correspondingset of device topologies associated with a set of electronic devicespositioned at the specified location; comparing the set of thresholds inthe set of device protection profiles to the probability to identify amatching device topology from the set of device topologies; andisolating at least one electronic device of the set of electronicdevices from an electrical power source according to the matching devicetopology.

A second aspect of the present invention provides a system forprotecting electronic devices from electrical disturbances, comprising:a memory medium comprising instructions; a bus coupled to the memorymedium; and a processor coupled to the bus that when executing theinstructions causes the system to: determine a probability of anelectrical disturbance occurring at a specified location; access a setof device protection profiles from at least one computer storage device,the set of device protection profiles comprising a set of thresholds anda corresponding set of device topologies associated with a set ofelectronic devices positioned at the specified location; compare the setof thresholds in the set of device protection profiles to theprobability to identify a matching device topology from the set ofdevice topologies; and isolate at least one electronic device of the setof electronic devices from an electrical power source according to thematching device topology.

A third aspect of the present invention provides a computer programproduct for protecting electronic devices from electrical disturbances,the computer program product comprising a computer readable storagemedia, and program instructions stored on the computer readable storagemedia, to: determine a probability of an electrical disturbanceoccurring at a specified location; access a set of device protectionprofiles from at least one computer storage device, the set of deviceprotection profiles comprising a set of thresholds and a correspondingset of device topologies associated with a set of electronic devicespositioned at the specified location; compare the set of thresholds inthe set of device protection profiles to the probability to identify amatching device topology from the set of device topologies; and isolateat least one electronic device of the set of electronic devices from anelectrical power source according to the matching device topology.

A fourth aspect of the present invention provides a method for deployinga system for protecting electronic devices from electrical disturbances,comprising: providing a computer infrastructure being operable to:determine a probability of an electrical disturbance occurring at aspecified location; access a set of device protection profiles from atleast one computer storage device, the set of device protection profilescomprising a set of thresholds and a corresponding set of devicetopologies associated with a set of electronic devices positioned at thespecified location; compare the set of thresholds in the set of deviceprotection profiles to the probability to identify a matching devicetopology from the set of device topologies; and isolate at least oneelectronic device of the set of electronic devices from an electricalpower source according to the matching device topology.

BRIEF DESCRIPTION OF THE DRAWINGS

These and other features of this invention will be more readilyunderstood from the following detailed description of the variousaspects of the invention taken in conjunction with the accompanyingdrawings in which:

FIG. 1 depicts an illustrative computing node according to an embodimentof the present invention.

FIG. 2 depicts an illustrative system diagram according to an embodimentof the present invention.

FIG. 3 depicts an illustrative threshold gauge according to anembodiment of the present invention.

FIG. 4 depicts a nominal topology when all devices are connectedaccording to an embodiment of the present invention.

FIG. 5 depicts a topology when valuable devices are disconnectedaccording to an embodiment of the present invention.

FIG. 6 depicts a topology where all devices are disconnected with theexception of intermittent router connectivity according to an embodimentof the present invention.

FIG. 7 depicts a topology with all devices connected and mobile devicetethering according to an embodiment of the present invention.

FIG. 8 depicts management setup and safety connections according to anembodiment of the present invention.

FIG. 9 depicts the switching between wired and wireless Internetconnectivity according to an embodiment of the present invention.

FIG. 10 depicts the switching between wired and wireless telephoneservices according to an embodiment of the present invention.

FIG. 11 depicts a single address power outlet and correspondingschematic according to an embodiment of the present invention.

FIG. 12 depicts a dual address power outlet and corresponding schematicaccording to an embodiment of the present invention.

FIG. 13 depicts a power strip extension using remote controls accordingto an embodiment of the present invention.

FIG. 14 depicts a phone outlet and corresponding schematic according toan embodiment of the present invention.

FIG. 15 depicts a cable television outlet and corresponding schematicaccording to an embodiment of the present invention.

FIG. 16 depicts a method flow diagram according to an embodiment of thepresent invention.

The drawings are not necessarily to scale. The drawings are merelyschematic representations, not intended to portray specific parametersof the invention. The drawings are intended to depict only typicalembodiments of the invention, and therefore should not be considered aslimiting the scope of the invention. In the drawings, like numberingrepresents like elements.

DETAILED DESCRIPTION OF THE INVENTION

Illustrative embodiments will now be described more fully herein withreference to the accompanying drawings, in which exemplary embodimentsare shown. This disclosure may, however, be embodied in many differentforms and should not be construed as limited to the exemplaryembodiments set forth herein. Rather, these exemplary embodiments areprovided so that this disclosure will be thorough and complete and willfully convey the scope of this disclosure to those skilled in the art.In the description, details of well-known features and techniques may beomitted to avoid unnecessarily obscuring the presented embodiments.

The terminology used herein is for the purpose of describing particularembodiments only and is not intended to be limiting of this disclosure.As used herein, the singular forms “a”, “an”, and “the” are intended toinclude the plural forms as well, unless the context clearly indicatesotherwise. Furthermore, the use of the terms “a”, “an”, etc., do notdenote a limitation of quantity, but rather denote the presence of atleast one of the referenced items. The word “set” is intended to mean aquantity of at least one. It will be further understood that the terms“comprises” and/or “comprising”, or “includes” and/or “including”, whenused in this specification, specify the presence of stated features,regions, integers, steps, operations, elements, and/or components, butdo not preclude the presence or addition of one or more other features,regions, integers, steps, operations, elements, components, and/orgroups thereof.

As mentioned above, embodiments of the present invention provide anapproach for monitoring electrical disturbance (e.g., surges, outages,etc.) possibilities, and then automatically isolating (e.g.,disconnecting) electronic devices (also referred to herein aselectronics) for the duration of the disturbance (or threat thereof). Ina typical embodiment, a probability of an electrical disturbanceoccurring at a specified location will be determined. Then, a set ofdevice protection profiles will be accessed from at least one computerstorage device. In general, the set of device protection profilescomprise a set of thresholds and a corresponding set of devicetopologies associated with a set of electronic devices positioned at thespecified location. The set of thresholds in the set of deviceprotection profiles will then be compared to the probability to identifya matching device topology from the set of device topologies. Accordingto the matching device topology, at least one electronic device may beisolated from an electrical power source. Optionally, the isolateddevice(s) may be switched from a wired mode to a wireless mode forcontinued functionality within the location.

Referring now to FIG. 1, a schematic of an example of a computing nodeis shown. Computing node 10 is only one example of a suitable structurecomputing node and is not intended to suggest any limitation as to thescope of use or functionality of embodiments of the invention describedherein. Regardless, computing node 10 is capable of being implementedand/or performing any of the functionality set forth hereinabove.

In computing node 10, there is a computer system/server 12, which isoperational with numerous other general purpose or special purposecomputing system environments or configurations. Examples of well-knowncomputing systems, environments, and/or configurations that may besuitable structure for use with computer system/server 12 include, butare not limited to, personal computer systems, server computer systems,thin clients, thick clients, hand-held or laptop devices, mobiledevices, global positioning systems (GPS), GPS-enable devices,multiprocessor systems, microprocessor-based systems, set top boxes,programmable consumer electronics, network PCs, minicomputer systems,mainframe computer systems, and distributed computing environments thatinclude any of the above systems or devices, and the like.

Computer system/server 12 may be described in the general context ofcomputer system-executable structure instructions, such as programmodules, being executed by a computer system. Generally, program modulesmay include routines, programs, objects, components, logic, datastructures, and so on, which perform particular tasks or implementparticular abstract data types. Computer system/server 12 may bepracticed in distributed computing environments where tasks areperformed by remote processing devices that are linked through acommunications network. In a distributed computing environment, programmodules may be located in both local and remote computer system storagemedia including memory storage devices.

As shown in FIG. 1, computer system/server 12 in computing node 10 isshown in the form of a general-purpose computing device. The componentsof computer system/server 12 may include, but are not limited to, one ormore processors or processing units 16, a system memory 28, and a bus 18that couples various system components including system memory 28 toprocessor 16.

Bus 18 represents one or more of any of several types of bus structures,including a memory bus or memory controller, a peripheral bus, anaccelerated graphics port, and a processor or local bus using any of avariety of bus architectures. By way of example, and not limitation,such architectures include Industry Standard Architecture (ISA) bus,Micro Channel Architecture (MCA) bus, Enhanced ISA (EISA) bus, VideoElectronics Standards Association (VESA) local bus, and PeripheralComponent Interconnects (PCI) bus.

Computer system/server 12 typically includes a variety of computersystem readable media. Such media may be any available media that isaccessible by computer system/server 12, and it includes both volatileand non-volatile media, removable and non-removable media.

System memory 28 can include computer system readable media in the formof volatile memory, such as random access memory (RAM) 30 and/or cachememory 32. Computer system/server 12 may further include otherremovable/non-removable, volatile/non-volatile computer system storagemedia. By way of example only, storage system 34 can be provided forreading from and writing to a non-removable, non-volatile magnetic media(not shown and typically called a “hard drive”). Although not shown, amagnetic disk drive for reading from and writing to a removable,non-volatile magnetic disk (e.g., a “floppy disk”), and an optical diskdrive for reading from or writing to a removable, non-volatile opticaldisk such as a CD-ROM, DVD-ROM, or other optical media can be provided.In such instances, each can be connected to bus 18 by one or more datamedia interfaces. As will be further depicted and described below,memory 28 may include at least one program product having a set (e.g.,at least one) of program modules that are configured to carry out thefunctions of embodiments of the invention.

The embodiments of the invention may be implemented as a computerreadable signal medium, which may include a propagated data signal withcomputer readable program code embodied therein (e.g., in baseband or aspart of a carrier wave). Such a propagated signal may take any of avariety of forms including, but not limited to, electro-magnetic,optical, or any suitable structure combination thereof. A computerreadable signal medium may be any computer readable medium that is not acomputer readable storage medium and that can communicate, propagate, ortransport a program for use by or in connection with an instructionexecution system, apparatus, or device.

Program code embodied on a computer readable medium may be transmittedusing any appropriate medium including, but not limited to, wireless,wireline, optical fiber cable, radio-frequency (RF), etc., or anysuitable structure combination of the foregoing.

Device protection program/utility 40, having a set (at least one) ofprogram modules 42, may be stored in memory 28 by way of example, andnot limitation, as well as an operating system, one or more applicationprograms, other program modules, and program data. In general, deviceprotection program 40 performs the function of the present invention asdescribed herein.

Each of the operating system, one or more application programs, otherprogram modules, and program data or some combination thereof, mayinclude an implementation of a networking environment. Program modules42 generally carry out the functions and/or methodologies of embodimentsof the invention as described herein.

Computer system/server 12 may also communicate with one or more externaldevices 14 such as a keyboard, a pointing device, a display 24, etc.;one or more devices that enable a consumer to interact with computersystem/server 12; and/or any devices (e.g., network card, modem, etc.)that enable computer system/server 12 to communicate with one or moreother computing devices. Such communication can occur via I/O interfaces22. Still yet, computer system/server 12 can communicate with one ormore networks such as a local area network (LAN), a general wide areanetwork (WAN), and/or a public network (e.g., the Internet) via networkadapter 20. As depicted, network adapter 20 communicates with the othercomponents of computer system/server 12 via bus 18. It should beunderstood that although not shown, other hardware and/or softwarecomponents could be used in conjunction with computer system/server 12.Examples include, but are not limited to: microcode, device drivers,redundant processing units, external disk drive arrays, RAID systems,tape drives, and data archival storage systems, etc.

Referring now to FIG. 2, a system diagram according to an embodiment ofthe present invention is shown. It is understood that the teachingsrecited herein may be practiced within a networked computing environment(e.g., a cloud computing environment). A stand-alone computersystem/server 12 is shown in FIGS. 1 and 2 for illustrative purposesonly. In the event the teachings recited herein are practiced in anetworked computing environment, each client need not have a deviceprotection engine (engine 50). Rather, engine 50 could be loaded on aserver or server-capable device that communicates (e.g., wirelessly)with the clients to provide device protection therefor. Regardless, asdepicted, engine 50 is shown within computer system/server 12. Ingeneral, engine 50 can be implemented as program 40 on computer system12 of FIG. 1 and can implement the functions recited herein. As furthershown, engine 50 (in one embodiment) comprises a rules and/orcomputational engine that processes a set (at least one) of rules 52and/or provides device protection thereunder.

Along these lines, engine 50 may perform multiple functions similar to ageneral-purpose computer using rules 52. Specifically, engine 50 may(among other things): determine a probability of an electricaldisturbance 60 occurring at a specified location; access a set of deviceprotection profiles 56 from at least one computer storage device 54, theset of device protection profiles 56 comprising a set of thresholds anda corresponding set of device topologies associated with a set ofelectronic devices 58 positioned at the specified location; compare theset of thresholds in the set of device protection profiles 56 to theprobability to identify a matching device topology from the set ofdevice topologies 56; isolate at least one electronic device of the setof electronic devices 56 from an electrical power source according tothe matching device topology; switch device(s) from wired mode towireless; etc.

In any event, engine 50 will first determine a probability that anelectrical disturbance 60 will occur. In general, there are multipledifferent ways to determine the percent likelihood of a disturbanceoccurring. For example, the probability could be determined based onweather patterns, maintenance schedules, or historical disturbance data.In a typical embodiment, the probability will be determined in real timeor to anticipate a pending disturbance or outage.

Regardless, engine 50 will typically assign a probability/rating to thelikelihood of a disturbance occurring. A rating of 0% means there is noprobability of a disturbance occurring, whereas 100% means a disturbanceis inevitable. Since this approach can enable the physical separation ofall electronic devices where they connect to a wall outlet, there are anumber of topological combinations (e.g., device topologies) ofelectronic devices connected/disconnected at any given point in time.Using a multiple threshold methodology, each threshold is mapped to aparticular topology. As the likelihood increases, the topologiesassociated with the thresholds may become more and more protected. Afinal threshold may result in a topology where all appliances aredisconnected except for the safe monitoring management system.

These device topologies can be expanded into device protection and/orthreshold profiles by including not just the topology of the devicesconnected, but also characteristics such as those described in thefollowing non-exhaustive list:

-   -   1. The current time of day (e.g. keep lights available longer        during dark hours).    -   2. The date and/or day of the week.    -   3. The number and/or ages of persons currently at the property.    -   4. The current power usage at the property.    -   5. The temperature within the property.

Referring now to FIG. 3, the following is an example thresholdconfiguration 70 with three distinct topologies 72A-C. In this example:device topology 72A corresponds to all electronic devices beingconnected; device topology 72B corresponds to highly valuable devices(e.g., computer, etc., as designated by the user/consumer) beingisolated (e.g., disconnected from their electrical power source); anddevice topology 72C corresponds to all electronic devices beingisolated/disconnected. In general, each device topology corresponds to aparticular probability between 0% and 100% that an electricaldisturbance will occur. Each association of a threshold and particulardevice topology generally constitutes a “device protection profile”.Each profile may further include one or more of the characteristicslisted above.

Referring to FIGS. 4-7, illustrative device topologies are shown. FIG. 4depicts a device topology 80 where all electronic devices 82A-N areconnected to an electrical power source. In addition, managementsystem/node 84 (e.g., computer system/server 12 of FIG. 1) is furtherconnected to a set of batteries 86A-N so that it can continue tofunction in the absence of power. In general, device topology 80corresponds to little or no risk of electrical disturbance (e.g., 0% orslightly greater risk) that falls within the full connection threshold72A of FIG. 3.

FIG. 5 depicts a device topology 90 where electronic devices 82A-B thatare deemed highly valuable (e.g., as configured by the user and/ordevice owner) have been isolated from an electrical power source (e.g.,disconnected). In addition, management system/node 84 (e.g., computersystem/server 12 of FIG. 1) is further connected to a set of batteries86A-N so that it can continue to function in the absence of power. Ingeneral, device topology 90 corresponds moderate risk of electricaldisturbance (e.g., or slightly greater risk) that falls within thethreshold 72B of FIG. 3.

FIG. 6 first depicts a device topology 100 where all electronic devices82A-N and battery 86A are disconnected from an electrical power source.However, management system/node 84 (e.g., computer system/server 12 ofFIG. 1) remains connected to battery 86A so that it can continue tofunction in the absence of power, while being disconnected from battery86N (which remains connected to the electrical power source). Ingeneral, device topology 100 corresponds to a high risk of electricaldisturbance (e.g., approaching 100%) that falls within the fullconnection threshold 72C of FIG. 3. As further shown, management system84 is “tethered/connected” to router 82N for periodic updates.

FIG. 7 depicts a device topology 110 where all electronic devices 82A-Nand battery 86A are disconnected from an electrical power source.However, management system/node 84 (e.g., computer system/server 12 ofFIG. 1) remains connected to battery 86A so that it can continue tofunction in the absence of power, while being disconnected from batter86N (which remains connected to the electrical power source). Ingeneral, device topology 110 corresponds to a high risk of electricaldisturbance (e.g., approaching 100%) that falls within the fullconnection threshold 72C of FIG. 3. As further shown, management system84 is “tethered/connected” to mobile device 112 for periodic updates.

In general, the control (e.g., connection and/or disconnection ofelectronic devices 82A-N) is provided via programmatically controlled(e.g., by management system 84) electrical and/or telephone outlets.Such an approach allows electronic devices 82A-N to be programmaticallycontrolled so that that they may be physically disconnected during timesof high risk power disturbances (such as lightning strikes). Forinstance, if a weather forecast predicts that thunderstorms andlightning are likely that could result in a devastating powerdisturbance, management system 84 can disconnect one or more devices

Along these lines, management system 84 can be any computer with acontrol transceiver connection and an Internet connection to check theweather. Since management system 84 should remain online during thepotential power disturbance timeframe to determine when it is safe tobring the other appliances back online, the configuration in FIG. 8 maybe used. This configuration allows management system 84 to be physicallydisconnected from the power source while still having the other batteryconnected to recharge. When the one battery drops below a threshold, thebatteries are switched.

Referring now to FIG. 8, it is understood that configuration 120 may bescaled with N number of batteries appropriately. As depicted inconfiguration 120, management system 84 is coupled to dual addressableoutlet 124A and via logic 122 and batteries 86A-N. In addition, a remotecontrol signal couples management system remote transceiver 128, whichis connected to dual addressable outlet 124A and single addressableoutlet 124N via a wireless signal. Still yet, management system 84 iscoupled via a wireless signal to modem/router 126 (e.g., for Internetconnectivity), which itself is coupled to single addressable outlet124N.

Shown below is an illustrative management system control algorithm. Itis understood that this is only one illustrative example of howmanagement system 84 could be implemented.

Function Prototypes/Descriptions:

disconnectAllDevices( )—This method disconnects all the outlets whichhave been registered with the management system. This protects theattached appliances more effectively from disturbances by physicallydisconnecting each device.

connectAllDevices( )—This method does substantially the opposite ofdisconnectAllDevices( ) in that it reconnects all the devices connectedto a remote outlet.

disconnectModem( )—This method disconnects the modem so that it is safefrom power disturbances. The modem is (dis)connected independently ofall devices since the modem must be reconnected each time the managementsystem wants to check for weather updates and other current conditions.

connectModem( )—This method does substantially the opposite ofconnectModem( ) in that it reconnects the modem so that the managementsystem can check the weather forecast and other current conditions.

useMostChargedBattery( )—This method finds the battery with the mostusable capacity and then connects it to the management system. Theoutlet which that battery is plugged into is then disconnected toprevent a disturbance from destroying the management system. The otherbatteries are then disconnected from the management system but areconnected via the outlet for charging. This enables the managementsystem to be isolated from the main power line but still continue itsoperations.

selectAllBatteries( )—This method connects all batteries together sothat all the batteries are being charged and used by the managementsystem at the same time.

Algorithm Steps:

1. selectAllBatteries( )

2. connectManagement( )

3. connectAllDevices( )

4. protectMode=false

5. While protection system is running do:

6. If protectMode==true then:

7. connectModem( )

8. curConditions=getCurrentConditions( )

9. if curConditions=getCurrentConditions( )

10. ifcurBatteryVoltage( )<X % threshold then:

11. useMostChargedBattery( )

12. if protectMode==false then:

13. disconnectAllDevices( )

14. useMostChargedBattery( )

15. protectMode=true

16. disconnectModem( )

17. sleep(e.g., 5 minutes)

18. else:

19. if protectMode==true then:

20. connectAllDevices( )

21. selectAllBatteries( )

22. protectMode=false

23. sleep(e.g., 20 seconds)

It is understood that any values hereinabove are for exemplary purposesonly, and alternative values could be utilized.

In order to prevent management system 84 from automaticallydisconnecting potentially necessary devices, management system 84 isconfigurable such that a confirmation is sent to the home owner beforedisconnects occur. This can be accomplished via a smart phoneapplication, a text message, email, etc. Moreover, this concept can beextended with policies and device grouping to make management easier. Itis possible that an individual will be using a connected electronicdevice when a disconnection threshold is triggered. Given the solutionthus far, an individual would be disconnected, and any existing statemay be lost. One example involves an individual speaking on the phoneand surfing the Internet when a disconnection threshold is triggered. Atthis time, both the call and the current Internet sessions are lost.

To avoid this, embodiments of the present invention further provide anapproach for preserving connection state through the use of an off-siteproxy. That is, all external connections are made through a gatewaywhich can be disconnected and reconnected through different channels. Inone case, an individual could do all of his/her web browsing through areverse proxy. When the Internet connection must be switched from wiredto wireless, the individual may drop the current proxy session, switchInternet connections, and then reconnect to the proxy. In this way, allInternet state is maintained via the proxy.

Shown below is one illustrative example of a reverse proxy switchconnection algorithm:

Preconditions: All Internet activity is done through an off-site proxy.

1. Disconnect from current wired proxy session.

2. Switch from wired Internet connection to wireless.

3. Reconnect to proxy session using new wireless connection.

With this algorithm, the individual would see a momentary lapse inresponsiveness while the connections are being swapped. The remote proxyimplementation may be implemented off-site using a proxy such as Squidproxy. This scenario is illustrated in FIG. 9. As depicted, thelocation/property 150 is connected to the Internet 130 via an Internetproxy 140. When power is lost at the property/location 150, Internetconnectivity switches from wired Internet connection 160 to amobile/wireless Internet connection 170.

FIG. 10 shows a similar example, using a phone proxy. In general, thisscenario may be implemented using a phone relay or through an existingproxy service. For example, assume that an individual is using anexisting proxy service for a phone call through a channel which must beclosed. The individual could then three-way call a second number througha wireless channel. Once the connection is made, the original wiredconnection may be dropped without losing state.

Shown below, is one illustrative example of a phone switch connectionalgorithm:

Preconditions: All Phone activity is done through a telephoneintermediary.

1. Connect through new phone channel.

2. User picks up phone using new channel.

3. Disconnect from previous phone channel.

As depicted in FIG. 10, the location/property 150 is connected toInternet 130 via a phone proxy 180. When power is lost atproperty/location 150, phone connectivity switches from wired phoneconnection 190 to a mobile/wireless phone connection 200.

As indicated above, embodiments of the present invention allow theimplementation of outlets (e.g., telephone and/or electrical) that maybe automatically disconnected. The examples set forth hereinbelowdescribe utility outlets that may programmatically (e.g., via a remotedevice protocol such as X10) be physically disconnected from the maincircuit. In essence, these outlets contain mechanical switches whichphysically break the connection to that outlet. It is noted that thisphysical break from these outlets will not disrupt other outletconnections to the main utility.

One type of utility outlet which must be physically disconnected duringpotential disturbance conditions is power outlets. There are multiplepossible models for these outlets described herein. The first poweroutlet model shown in FIG. 11 shows a single addressable outlet 210(having a single set of controls/addresses 212) connected via logic 220to X10 controller 230. This embodiment physically breaks bothconnections on the same interface plate. Another second power outletmodel shown in FIG. 12 comprises a dual addressable outlet 250 (havingmultiple sets of controls/addresses 280A-B) that is connected via logic260 to X10 controller 270. This embodiment physically breaks eachconnection on the interface plate independently of each other. That is,each power outlet receives its own address.

Referring to FIG. 13, an example is shown applied to a power strip 300.As depicted, each outlet 308A-N has its own address/control function310A-N for individual and independent control. Thus, electronic devicesplugged into the power strip may still be individually controlled.

Referring to FIG. 14, an example is shown applied to a phone outlet 400.As depicted, outlet 400 includes a single set of controls/addresses 430that is coupled to X10 controller 420 and logic 410. Similar to thepower outlet, phone outlet 400 allows for the physical disconnectionbetween the main phone utility and the phone appliance. In thisscenario, the remote connection is powered using the small amount ofpower provided by the phone system.

Referring to FIG. 15, an example is shown applied to a cable televisionutility outlet 500, which may be programmatically disconnected from thecable utility. As depicted, the outlet comprises a single set ofcontrols/addresses 512 and a battery 530 which are connected to X10controller 520 and logic 540. Battery 530 is utilized since there is noreadily available power source for the remote connection using the cableutility.

Referring now to FIG. 16, a method flow diagram according to the presentinvention is shown. In step S1, a probability of an electricaldisturbance occurring at a specified location is determined. In step S2,a set of device protection profiles is accessed from at least onecomputer storage device. As indicated above, the set of deviceprotection profiles comprises a set of thresholds and a correspondingset of device topologies associated with a set of electronic devicespositioned at the specified location. In step S3, the set of thresholdsin the set of device protection profiles is compared to the probabilityto identify a matching device topology from the set of devicetopologies. In step S4, at least one electronic device of the set ofelectronic devices is isolated from an electrical power source accordingto the matching device topology. This may include stitching from a wiredmode to a wireless mode (e.g., for a router/modem or the like)

While shown and described herein as a device protection system, it isunderstood that the invention further provides various alternativeembodiments. For example, in one embodiment, the invention provides acomputer-readable/usable medium that includes computer program code toenable a computer infrastructure to provide device protectionfunctionality as discussed herein. To this extent, thecomputer-readable/usable medium includes program code that implementseach of the various processes of the invention. It is understood thatthe terms computer-readable medium or computer-usable medium compriseone or more of any type of physical embodiment of the program code. Inparticular, the computer-readable/usable medium may comprise programcode embodied on one or more portable structure storage articles ofmanufacture (e.g., a compact disc, a magnetic disk, a tape, etc.), onone or more data storage portions of a computing device, such as memory28 (FIG. 1) and/or storage system 34 (FIG. 1) (e.g., a fixed disk, aread-only memory, a random access memory, a cache memory, etc.).

In another embodiment, the invention provides a method that performs theprocess of the invention on a subscription, advertising, and/or feebasis. That is, a service provider, such as a Solution Integrator, couldoffer to provide device protection functionality. In this case, theservice provider can create, maintain, support, etc., a computerinfrastructure, such as computer system 12 (FIG. 1) that performs theprocesses of the invention for one or more consumers. In return, theservice provider can receive payment from the consumer(s) under asubscription and/or fee agreement and/or the service provider canreceive payment from the sale of advertising content to one or morethird parties.

In still another embodiment, the invention provides acomputer-implemented method for a device protection. In this case, acomputer infrastructure, such as computer system 12 (FIG. 1), can beprovided and one or more systems for performing the processes of theinvention can be obtained (e.g., created, purchased, used, modified,etc.) and deployed to the computer infrastructure. To this extent, thedeployment of a system can comprise one or more of: (1) installingprogram code on a computing device, such as computer system 12 (FIG. 1),from a computer-readable medium; (2) adding one or more computingdevices to the computer infrastructure; and (3) incorporating and/ormodifying one or more existing systems of the computer infrastructure toenable the computer infrastructure to perform the processes of theinvention.

As used herein, it is understood that the terms “program code” and“computer program code” are synonymous and mean any expression, in anylanguage, code, or notation, of a set of instructions intended to causea computing device having an information processing capability toperform a particular function either directly or after either or both ofthe following: (a) conversion to another language, code, or notation;and/or (b) reproduction in a different material form. To this extent,program code can be embodied as one or more of: an application/softwareprogram, component software/a library of functions, an operating system,a basic device system/driver for a particular computing device, and thelike.

A data processing system suitable structure for storing and/or executingprogram code can be provided hereunder and can include at least oneprocessor communicatively coupled, directly or indirectly, to memoryelements through a system bus. The memory elements can include, but arenot limited to, local memory employed during actual execution of theprogram code, bulk storage, and cache memories that provide temporarystorage of at least some program code in order to reduce the number oftimes code must be retrieved from bulk storage during execution.Input/output and/or other external devices (including, but not limitedto, keyboards, displays, pointing devices, etc.) can be coupled to thesystem either directly or through intervening device controllers.

Network adapters also may be coupled to the system to enable the dataprocessing system to become coupled to other data processing systems,remote printers, storage devices, and/or the like, through anycombination of intervening private or public networks. Illustrativenetwork adapters include, but are not limited to, modems, cable modems,and Ethernet cards.

The foregoing description of various aspects of the invention has beenpresented for purposes of illustration and description. It is notintended to be exhaustive or to limit the invention to the precise formdisclosed and, obviously, many modifications and variations arepossible. Such modifications and variations that may be apparent to aperson skilled in the art are intended to be included within the scopeof the invention as defined by the accompanying claims.

What is claimed is:
 1. A computer-implemented method for protectingelectronic devices from electrical disturbances, comprising:determining, prior to an occurrence of an electrical disturbance, anumerical probability of an electrical disturbance on an electrical linein an electrical grid occurring at a future time at a specifiedlocation; accessing a set of device protection profiles from at leastone computer storage device, the set of device protection profilescomprising a set of thresholds having a plurality of thresholds and acorresponding set of device topologies associated with a set ofelectronic devices positioned at the specified location; comparing theset of thresholds in the set of device protection profiles to thenumerical probability to identify a matching device topology from theset of device topologies; and isolating at least one electronic deviceof the set of electronic devices from an electrical power sourceaccording to the matching device topology.
 2. The computer-implementedmethod of claim 1, the isolating comprising switching the at least oneelectronic device from a wired mode to a wireless mode.
 3. Thecomputer-implemented method of claim 1, the comparing comprising:identifying a specific threshold corresponding to the probability; andidentifying a specific device topology that corresponds to the specificthreshold.
 4. The computer-implemented method of claim 1, each of theset of device topologies identifying a particular power connectionconfiguration for the set of electronic devices positioned at thelocation.
 5. The computer-implemented method of claim 1, the set ofdevice protection profiles further specifying at least onecharacteristic selected from a group consisting of: a time of day, a dayof the week, an air temperature, a number of people at the location, andan age of at least one person at the location.
 6. Thecomputer-implemented method of claim 5, the comparing being furtherbased on the at least one characteristic.
 7. The computer-implementedmethod of claim 1, the probability being determined based on at leastone of the following: weather conditions, maintenance schedules, orhistorical disturbance data.
 8. A system for protecting electronicdevices from electrical disturbances, comprising: a memory mediumcomprising instructions; a bus coupled to the memory medium; and aprocessor coupled to the bus that when executing the instructions causesthe system to: determine, prior to an occurrence of an electricaldisturbance, a numerical probability of an electrical disturbance on anelectrical line in an electrical grid occurring at a future time at aspecified location; access a set of device protection profiles from atleast one computer storage device, the set of device protection profilescomprising a set of thresholds having a plurality of thresholds and acorresponding set of device topologies associated with a set ofelectronic devices positioned at the specified location; compare the setof thresholds in the set of device protection profiles to the numericalprobability to identify a matching device topology from the set ofdevice topologies; and isolate at least one electronic device of the setof electronic devices from an electrical power source according to thematching device topology.
 9. The system of claim 8, the memory mediumfurther comprising instructions for causing the system to switch the atleast one electronic device from a wired mode to a wireless mode. 10.The system of claim 8, the memory medium further comprising instructionsfor causing the system to: identify a specific threshold correspondingto the probability; and identify a specific device topology thatcorresponds to the specific threshold.
 11. The system of claim 8, eachof the set of device topologies identifying a particular powerconnection configuration for the set of electronic devices positioned atthe location.
 12. The system of claim 8, the set of device protectionprofiles further specifying at least one characteristic selected from agroup consisting of: a time of day, a day of the week, an airtemperature, a number of people at the location, and an age of at leastone person at the location.
 13. The system of claim 12, the matchingdevice topology being further identified based on the at least onecharacteristic.
 14. The system of claim 8, the probability beingdetermined based on at least one of the following: weather conditions,maintenance schedules, or historical disturbance data.
 15. A computerprogram product for protecting electronic devices from electricaldisturbances, the computer program product comprising a computerreadable storage device, wherein the computer readable storage media isnot a transitory signal, and program instructions stored on the computerreadable storage device, to: determine, prior to an occurrence of anelectrical disturbance, a numerical probability of an electricaldisturbance on an electrical line in an electrical grid occurring at afuture time at a specified location; access a set of device protectionprofiles from at least one computer storage device, the set of deviceprotection profiles comprising a set of thresholds having a plurality ofthresholds and a corresponding set of device topologies associated witha set of electronic devices positioned at the specified location;compare the set of thresholds in the set of device protection profilesto the numerical probability to identify a matching device topology fromthe set of device topologies; and isolate at least one electronic deviceof the set of electronic devices from an electrical power sourceaccording to the matching device topology.
 16. The computer programproduct of claim 15, the computer readable storage media furthercomprising instructions to switching the at least one electronic devicefrom a wired mode to a wireless mode.
 17. The computer program productof claim 15, the computer readable storage media further comprisinginstructions to: identify a specific threshold corresponding to theprobability; and identify a specific device topology that corresponds tothe specific threshold.
 18. The computer program product of claim 15,each of the set of device topologies identifying a particular powerconnection configuration for the set of electronic devices positioned atthe location.
 19. The computer program product of claim 15, the set ofdevice protection profiles further specifying at least onecharacteristic selected from a group consisting of: a time of day, a dayof the week, an air temperature, a number of people at the location, andan age of at least one person at the location, a matching devicetopology being further identified based on the at least onecharacteristic.
 20. The computer program product of claim 15, theprobability being determined based on at least one of the following:weather conditions, maintenance schedules, or historical disturbancedata.