CN108111303B - Safe connection method of intelligent home gateway - Google Patents

Safe connection method of intelligent home gateway Download PDF

Info

Publication number
CN108111303B
CN108111303B CN201711439751.3A CN201711439751A CN108111303B CN 108111303 B CN108111303 B CN 108111303B CN 201711439751 A CN201711439751 A CN 201711439751A CN 108111303 B CN108111303 B CN 108111303B
Authority
CN
China
Prior art keywords
home gateway
key
party server
date
address
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201711439751.3A
Other languages
Chinese (zh)
Other versions
CN108111303A (en
Inventor
张爱国
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING HUAN ER KANG TECHNOLOGY DEVELOPMENT Co.,Ltd.
Original Assignee
Beijing Huan Er Kang Technology Development Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Huan Er Kang Technology Development Co ltd filed Critical Beijing Huan Er Kang Technology Development Co ltd
Priority to CN201711439751.3A priority Critical patent/CN108111303B/en
Publication of CN108111303A publication Critical patent/CN108111303A/en
Application granted granted Critical
Publication of CN108111303B publication Critical patent/CN108111303B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/09Mapping addresses
    • H04L61/10Mapping addresses of different types
    • H04L61/103Mapping addresses of different types across network layers, e.g. resolution of network layer into physical layer addresses or address resolution protocol [ARP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/141Setup of application sessions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)
  • Small-Scale Networks (AREA)

Abstract

The invention discloses a safe connection method of an intelligent home gateway, which uses a third-party server to register an identifier and an initial key of the home gateway in advance, the home gateway authenticates itself to the third-party server based on registration information and enables the third-party server to acquire a network address and a communication key of itself according to the authentication, then a client authenticates itself to the third-party server based on the registration information, and acquires the network address and the communication key of the home gateway from the third-party server, thereby establishing safe connection with the home gateway.

Description

Safe connection method of intelligent home gateway
[ technical field ] A method for producing a semiconductor device
The invention belongs to the field of intelligent home and computer security, and particularly relates to a secure connection method for an intelligent home.
[ background of the invention ]
In recent years, with the rapid development of the computer industry, computer technology has deepened into the lives of people, and gradually combined with our living environment, the concept of smart home appears. The intelligent home is to connect various electric appliances in the home together by using the technologies of computers, communication, sensors, household appliances and the like, and is controlled by a central controller, thereby providing a very convenient living environment for people.
After the smart home is introduced, people can also remotely control smart devices in the home through a client (such as a smart phone), for example, an air conditioner in the home is turned on before the smart device arrives at the home, and the like. To achieve this, a home gateway is usually provided in a smart home, and serves as an internet outlet for all devices in the smart home, and a client is remotely connected to the home gateway through the internet, so as to control smart devices in the home through the home gateway.
In this case, the security of the home gateway needs to be considered, and on one hand, the internet address of the home gateway is probably not fixed, and the internet address of the remote client is uncertain. Therefore, when the client needs to remotely connect to the home gateway, how to determine the address of the home gateway becomes a problem. Similarly, the home gateway also needs to confirm that the client is a valid client for the remotely connected client.
[ summary of the invention ]
In order to solve the technical problem in the prior art, the invention provides a safe connection method of an intelligent home gateway.
The technical scheme adopted by the invention is as follows:
a safe connection method of an intelligent home gateway comprises the following steps:
(1) the user registers in a credible third-party server, registration information comprises an identifier ID of the home gateway and an initial Key, and the registration information is stored in the third-party server, the home gateway and the client at the same time;
(2) when the home gateway is connected to the internet, the home gateway randomly generates a communication key K and assembles an address notification message packet M0Sending to the third party server, wherein:
M0={ID,EKey(K,ID,Date)}
EKey() Is a symmetric encryption function encrypted by using a Key, and Date is the current Date; and the home gateway monitors the network address of the home gateway at any time, and once the network address of the home gateway changes, the home gateway executes the step (2) again;
(3) the third party server acquires the network address of the connected home gateway and notifies the address of a message packet M0Analyzing to obtain ID and EKey(K,ID,Date);
(4) The third party server obtains corresponding registration information according to the ID obtained by analysis, obtains a corresponding initial Key, and uses the initial Key to EKey(K, ID, Date) decrypting, checking whether the ID obtained by decryption is the same as the ID obtained by analysis, if not, the address notification message packet M0If it is illegal, directly neglecting the address notification message packet M0(ii) a If the three groups are the same, acquiring the triple (K, ID, Date) obtained by decryption;
(5) the third-party server judges whether the triple obtained by decryption already exists in the database, and if so, ignores the address notification message packet M0If not, the triple is stored in the database, and the network of the home gateway is stored at the same timeA network address;
(6) when the client needs to obtain the network address of the home gateway, the client assembles an address inquiry message packet M1Namely:
M1={ID,EKey(ID,Salt,Date1)}
wherein, Salt is a random number, Date1Is the current date;
(7) the client side sends the address inquiry message packet M1Sending to the third party server, the third party server pair M1Analyzing to obtain ID and EKey(ID,Salt,Date1);
(8) The third party server resolves M1The obtained ID obtains corresponding registration information, obtains a corresponding initial Key, and uses the initial Key to EKey(ID,Salt,Date1) Performing decryption, checking the decrypted ID and parsing M1If the obtained ID is the same, if not, the address inquiry message packet M1If it is illegal, the address inquiry message packet M is ignored1Ending the treatment; if the three groups are identical, obtaining the triple (ID, Salt, Date) obtained by decryption1);
(9) The third party server determines the triplet (ID, Salt, Date)1) Whether it already exists in the database, and if so, ignoring the address query message packet M1Ending the treatment; if not, the triple (ID, Salt, Date) is added1) Storing in a database, and continuing the subsequent steps;
(10) the third party server assembles an address response message packet M2Returning to the client, namely: m2=EKey(IP, ID, K), where IP is the network address of the home gateway;
(11) the client uses the initial Key Key to pair M2Decrypting to obtain IP, ID and K;
(12) the client judges whether the ID obtained by decryption is the ID of the home gateway to be connected, if not, the address response message packet M is ignored2If so, the IP can be considered as the network address of the home gateway to which the connection is required, so that the client establishes a network connection with the home gateway based on the IP and performs encrypted communication with the home gateway by using the communication key K.
Further, the third party server is set up by the manufacturer of the home gateway.
Further, the third party server is connected to the internet and has a fixed internet domain name or network address which is pre-stored in the home gateway and the client.
Further, the identifier ID of the home gateway is a globally unique code.
Further, the length of the initial Key is determined according to the requirements of a subsequent encryption algorithm.
The technical effects realized by the invention are as follows: the client can safely acquire the network address of the home gateway and establish safe connection with the home gateway.
[ description of the drawings ]
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this application, and are not to be considered limiting of the invention, in which:
fig. 1 is a diagram of an application scenario of the present invention.
[ detailed description ] embodiments
The present invention will now be described in detail with reference to the drawings and specific embodiments, wherein the exemplary embodiments and descriptions are provided only for the purpose of illustrating the present invention and are not to be construed as unduly limiting the invention.
Referring to fig. 1, a smart home to which the present invention is applied is shown, where the smart home includes a plurality of smart devices and a home gateway, and the plurality of smart devices and the home gateway are connected through an in-home network, such as a WIFI network. The home gateway can be connected to the internet as an internet outlet of the whole smart home. A user may use a client (e.g., a smart phone) to remotely connect to the home gateway via the internet, so that various smart devices in the home may be accessed and controlled via the home gateway.
What the present invention is concerned about is how a client remotely determines the network address of a home gateway on the internet and establishes a secure connection with the home gateway. The detailed description is as follows:
(1) the user first registers with a trusted third party server, and the registration information includes the identifier ID of the home gateway and an initial Key. The registration information is stored in the third party server, the home gateway and the client, respectively, for subsequent use.
Specifically, the third-party server may be set up by a manufacturer of the home gateway, and the third-party server is connected to the internet and has a fixed internet domain name or network address, which is stored in the home gateway and the client in advance, so that the home gateway and the client can be directly connected to the third-party server conveniently.
The identifier ID of the home gateway may be a globally unique code for uniquely identifying the home gateway. The initial Key is a large random number, and the length of the initial Key is determined according to the requirements of a subsequent encryption algorithm, for example, a 128-bit random number.
(2) When the home gateway is connected to the internet, the home gateway randomly generates a communication key K and assembles an address notification message packet M0Sending to the third party server, wherein:
M0={ID,EKey(K,ID,Date)}
EKey() Is a symmetric encryption function that uses the Key for encryption, where any symmetric encryption algorithm known in the art, such as the AES algorithm, may be used. Date is the current Date.
It should be noted that the home gateway monitors its own network address (e.g. IP address) at any time, and once the own network address changes, the home gateway needs to perform step (2) again, that is, randomly generate a new communication key again, and assemble and send a new address notification packet.
(3) The third party server acquires the network address of the connected home gateway and notifies the address of a message packet M0Analyzing to obtain ID and EKey(K,ID,Date)。
Since the home gateway necessarily needs to establish a network connection with the third-party server when sending the message packet, the third-party server can directly acquire the network address of the home gateway through the network connection.
(4) The third party server obtains corresponding registration information according to the ID obtained by analysis, obtains a corresponding initial Key, and uses the initial Key to EKey(K, ID, Date) decrypting, checking whether the ID obtained by decryption is the same as the ID obtained by analysis, if not, the address notification message packet M0If it is illegal, directly neglecting the address notification message packet M0(ii) a And if the three groups are identical, acquiring the decrypted triple (K, ID, Date).
As mentioned above, the registration information is stored in the third party server after the user is registered, and in general, the third party server may use a user database to store all the registration information, and then it may retrieve the corresponding initial key from the database by using the unique identifier ID in the registration information.
(5) The third-party server judges whether the triple obtained by decryption already exists in the database, and if so, ignores the address notification message packet M0And if the three groups do not exist, storing the three groups in the database and simultaneously storing the network address of the home gateway.
The communication key K is a random number that should be different every time, and with the ID and date restrictions, the probability of the true occurrence of the same triplet is extremely small, so if the triplet is already present in the database, it can be considered that the address notification packet has been received before, and the current packet is likely to be a replay attack by a hacker and is illegal.
The above steps (2) - (5) are actually a process in which the home gateway authenticates itself to the third-party server based on the registration information, and the third-party server acquires the network address and the communication key of the home gateway after the authentication.
(6) When the client needs to obtain the network address of the home gateway, the client assembles an address inquiry message packet M1Namely:
M1={ID,EKey(ID,Salt,Date1)}
wherein, Salt is a random number, which is used to play a role of random interference and avoid being attacked by replay. Date (R) data1Is the current date.
(7) The client side sends the address inquiry message packet M1Sending to the third party server, the third party server pair M1Analyzing to obtain ID and EKey(ID,Salt,Date1)。
(8) The third party server obtains corresponding registration information according to the ID obtained by analysis, obtains a corresponding initial Key, and uses the initial Key to EKey(ID,Salt,Date1) Performing decryption, checking the decrypted ID and parsing M1If the obtained ID is the same, if not, the address inquiry message packet M1If it is illegal, the address inquiry message packet M is ignored1Ending the process, if the three groups are the same, obtaining the triple (ID, Salt, Date) obtained by decryption1)。
(9) The third party server determines the triplet (ID, Salt, Date)1) Whether it already exists in the database, and if so, ignoring the address query message packet M1Ending the treatment; if not, the triple (ID, Salt, Date) is added1) And storing in a database, and continuing the subsequent steps.
Like step (5) above, step (9) is also to prevent replay attacks by hackers. The above-described steps (6) - (9) are actually procedures by which the client authenticates itself to the third-party server based on the registration information.
(10) The third party server assembles an address response message packet M2Returning to the client, namely: m2=EKey(IP, ID, K), where IP is the home gatewayThe network address of (2).
(11) The client uses the initial Key Key to pair M2And decrypting to obtain the IP, the ID and the K.
(12) The client judges whether the ID obtained by decryption is the ID of the home gateway to be connected, if not, the address response message packet M is ignored2If so, the IP can be considered as the network address of the home gateway to which the connection is required, so that the client establishes a network connection with the home gateway based on the IP and performs encrypted communication with the home gateway by using the communication key K. In this way, the client establishes a secure connection with the home gateway.
After that, the client may store the IP and K, and when it is needed to connect to the home gateway, the IP and K are used to connect first, but once a certain time finds that the home gateway cannot be connected using the IP and K, which indicates that the network address of the home gateway may have changed, the client repeats steps 6-12 to obtain a new IP and K.
The above description is only a preferred embodiment of the present invention, and all equivalent changes or modifications of the structure, characteristics and principles described in the present invention are included in the scope of the present invention.

Claims (5)

1. A safe connection method of an intelligent home gateway is characterized by comprising the following steps:
(1) the user registers in a credible third-party server, registration information comprises an identifier ID of the home gateway and an initial Key, and the registration information is stored in the third-party server, the home gateway and the client at the same time;
(2) when the home gateway is connected to the internet, the home gateway randomly generates a communication key K and assembles an address notification message packet M0Sending to the third party server, wherein:
M0={ID,EKey(K,ID,Date)}
EKey() Is a symmetric encryption function encrypted by using a Key, and Date is the current Date; and areThe home gateway monitors the network address of the home gateway at any time, and once the network address of the home gateway changes, the home gateway executes the step (2) again;
(3) the third party server acquires the network address of the connected home gateway and notifies the address of a message packet M0Analyzing to obtain ID and EKey(K,ID,Date);
(4) The third party server obtains corresponding registration information according to the ID obtained by analysis, obtains a corresponding initial Key, and uses the initial Key to EKey(K, ID, Date) decrypting, checking whether the ID obtained by decryption is the same as the ID obtained by analysis, if not, the address notification message packet M0If it is illegal, directly neglecting the address notification message packet M0(ii) a If the three groups are the same, acquiring the triple (K, ID, Date) obtained by decryption;
(5) the third-party server judges whether the triple obtained by decryption already exists in the database, and if so, ignores the address notification message packet M0If the triple does not exist, the triple is stored in the database, and the network address of the home gateway is stored at the same time;
(6) when the client needs to obtain the network address of the home gateway, the client assembles an address inquiry message packet M1Namely:
M1={ID,EKey(ID,Salt,Date1)}
wherein, Salt is a random number, Date1Is the current date;
(7) the client side sends the address inquiry message packet M1Sending to the third party server, the third party server pair M1Analyzing to obtain ID and EKey(ID,Salt,Date1);
(8) The third party server resolves M1The obtained ID obtains corresponding registration information, obtains a corresponding initial Key, and uses the initial Key to EKey(ID,Salt,Date1) Performing decryption, checking the decrypted ID and parsing M1If the obtained ID is the same, if not, the address inquiry message packet M1If it is illegal, the address inquiry message packet M is ignored1Ending the treatment; if the three groups are identical, obtaining the triple (ID, Salt, Date) obtained by decryption1);
(9) The third party server determines the triplet (ID, Salt, Date)1) Whether it already exists in the database, and if so, ignoring the address query message packet M1Ending the treatment; if not, the triple (ID, Salt, Date) is added1) Storing in a database, and continuing the subsequent steps;
(10) the third party server assembles an address response message packet M2Returning to the client, namely: m2=EKey(IP, ID, K), where IP is the network address of the home gateway;
(11) the client uses the initial Key Key to pair M2Decrypting to obtain IP, ID and K;
(12) the client judges whether the ID obtained by decryption is the ID of the home gateway to be connected, if not, the address response message packet M is ignored2If so, the IP can be considered as the network address of the home gateway to which the connection is required, so that the client establishes a network connection with the home gateway based on the IP and performs encrypted communication with the home gateway by using the communication key K.
2. The method of claim 1, wherein the third party server is set up by a manufacturer of the home gateway.
3. A method according to any of claims 1-2, characterized in that the third party server is connected to the internet and has a fixed internet domain name or network address, which is pre-stored in the home gateway and client.
4. A method according to claim 3, wherein the identifier ID of the home gateway is a globally unique code.
5. The method according to claim 4, wherein the length of the initial Key Key is determined according to the requirements of the subsequent encryption algorithm.
CN201711439751.3A 2017-12-27 2017-12-27 Safe connection method of intelligent home gateway Active CN108111303B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711439751.3A CN108111303B (en) 2017-12-27 2017-12-27 Safe connection method of intelligent home gateway

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711439751.3A CN108111303B (en) 2017-12-27 2017-12-27 Safe connection method of intelligent home gateway

Publications (2)

Publication Number Publication Date
CN108111303A CN108111303A (en) 2018-06-01
CN108111303B true CN108111303B (en) 2021-06-25

Family

ID=62211788

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711439751.3A Active CN108111303B (en) 2017-12-27 2017-12-27 Safe connection method of intelligent home gateway

Country Status (1)

Country Link
CN (1) CN108111303B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017117024A1 (en) * 2015-12-31 2017-07-06 Acxiom Corporation Salting text in database tables, text files, and data feeds
CN111163035A (en) * 2018-11-07 2020-05-15 中国电信股份有限公司 Method, device and system for managing remote connection of home gateway
CN113225732B (en) * 2020-01-21 2023-07-04 深圳市云海物联科技有限公司 Data transmission method and device and terminal equipment
CN113890778B (en) * 2021-11-04 2023-08-25 深圳海智创科技有限公司 Intelligent home authentication and encryption method and system based on local area network
CN113872761B (en) * 2021-11-17 2023-07-07 湖北工业大学 Batch authentication method for intelligent household equipment, computing equipment and storable medium
CN114710348B (en) * 2022-03-31 2023-07-04 湖北工业大学 Authorization authentication and key negotiation method for user to use home intelligent equipment

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1996972A (en) * 2006-01-06 2007-07-11 株式会社日立制作所 Apparatus for encrypted communication on network
CN101141422A (en) * 2007-10-26 2008-03-12 中国电信股份有限公司 Method and system to access family gateway and family gateway
CN101345621A (en) * 2007-07-09 2009-01-14 华为技术有限公司 Authentication device, system and method for family network
CN103400269A (en) * 2013-07-24 2013-11-20 江苏晓山信息产业股份有限公司 Smart community home gateway-based safety payment method
CN103731756A (en) * 2014-01-02 2014-04-16 中国科学院信息工程研究所 Smart home remote security access control implementation method based on smart cloud television gateway
CN103873487A (en) * 2014-04-04 2014-06-18 中国科学院信息工程研究所 Method for achieving home credible networking based on safety pendent of smart home device

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7778193B2 (en) * 2004-06-07 2010-08-17 Nippon Telegraph And Telephone Corporation Residential network setting method, home gateway apparatus, home gateway program, and recording medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1996972A (en) * 2006-01-06 2007-07-11 株式会社日立制作所 Apparatus for encrypted communication on network
CN101345621A (en) * 2007-07-09 2009-01-14 华为技术有限公司 Authentication device, system and method for family network
CN101141422A (en) * 2007-10-26 2008-03-12 中国电信股份有限公司 Method and system to access family gateway and family gateway
CN103400269A (en) * 2013-07-24 2013-11-20 江苏晓山信息产业股份有限公司 Smart community home gateway-based safety payment method
CN103731756A (en) * 2014-01-02 2014-04-16 中国科学院信息工程研究所 Smart home remote security access control implementation method based on smart cloud television gateway
CN103873487A (en) * 2014-04-04 2014-06-18 中国科学院信息工程研究所 Method for achieving home credible networking based on safety pendent of smart home device

Also Published As

Publication number Publication date
CN108111303A (en) 2018-06-01

Similar Documents

Publication Publication Date Title
CN108111303B (en) Safe connection method of intelligent home gateway
US20230023775A1 (en) Uniform communication protocols for communication between controllers and accessories
US10356092B2 (en) Uncloneable registration of an internet of things (IoT) device in a network
JP6367375B2 (en) System and method for secure communication over a network using linking addresses
US9596097B2 (en) Apparatus and method for transferring network access information of smart household appliances
CN111601306B (en) Secure wireless communication between a controller and an accessory
US11647002B2 (en) Providing a notification system in a virtual private network
WO2022171867A1 (en) System and method for authorizing access to smart devices in a local environment
JP6056970B2 (en) Information processing apparatus, terminal, information processing system, and information processing method
WO2018172776A1 (en) Secure transfer of data between internet of things devices
JP2008028899A (en) Communication system, terminal device, vpn server, program, and communication method
JP2018011191A (en) Apparatus list creation system and apparatus list creation method
US12003478B1 (en) Sharing domain name service resources in a mesh network
US11943202B1 (en) Utilization of multiple exit internet protocol addresses in a virtual private network
US12028456B2 (en) System and method for authorizing access of local and remote client devices to smart devices in a local environment
GB2560895A (en) Secure transfer of data between internet of things devices
GB2560896A (en) Secure transfer of data between internet of things devices
GB2560894A (en) Secure transfer of data between internet of things devices
GB2560746A (en) Secure transfer of data between internet of things devices

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20210602

Address after: 100071 room 418, 88 Xisihuan South Road, Fengtai District, Beijing

Applicant after: BEIJING HUAN ER KANG TECHNOLOGY DEVELOPMENT Co.,Ltd.

Address before: 458030 east house, 6th floor, West unit, building 4, family home of Electric Power Bureau, Jiuzhou Road, Qibin District, Hebi City, Henan Province

Applicant before: Zhang Aiguo

GR01 Patent grant
GR01 Patent grant