| CPC G08B 25/008 (2013.01) [G08B 25/001 (2013.01)] | 20 Claims |

|
1. A method comprising:
receiving, by a first computing device at a first location, a sequence of milestones regarding a security system while the security system is in an alarm state at a second location remote from the first location, the sequence of milestones including first and second milestones indicative of (i) validity of authentication information, and (ii) a request for the security system to exit the alarm state, respectively;
transmitting, by the first computing device, the sequence of milestones to a second computing device located at a third location remote from the first location and the second location;
determining, by the second computing device, that the sequence of milestones was received in a predefined order by the first computing device;
generating, by the second computing device, a command in response to determining that the sequence of milestones was received in the predefined order by the first computing device, the command including instructions to cause the security system to exit the alarm state upon receipt of the command by at least one device of the security system; and
transmitting, by the second computing device via a network between the third location and the second location, the command to the at least one device to cause the security system to exit the alarm state.
|