GB2619808A - Private and secure chat connection mechanism for use in a private communication architecture - Google Patents

Private and secure chat connection mechanism for use in a private communication architecture Download PDF

Info

Publication number
GB2619808A
GB2619808A GB2305950.4A GB202305950A GB2619808A GB 2619808 A GB2619808 A GB 2619808A GB 202305950 A GB202305950 A GB 202305950A GB 2619808 A GB2619808 A GB 2619808A
Authority
GB
United Kingdom
Prior art keywords
pcvs
chatroom
pmg
secure
host
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
GB2305950.4A
Other versions
GB202305950D0 (en
GB2619808B (en
Inventor
Wei Chen Ben
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Primes Lab Inc
Original Assignee
Primes Lab Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US17/736,103 external-priority patent/US20220385638A1/en
Priority claimed from US17/992,945 external-priority patent/US20230083939A1/en
Priority claimed from US18/134,576 external-priority patent/US20230254292A1/en
Application filed by Primes Lab Inc filed Critical Primes Lab Inc
Publication of GB202305950D0 publication Critical patent/GB202305950D0/en
Publication of GB2619808A publication Critical patent/GB2619808A/en
Application granted granted Critical
Publication of GB2619808B publication Critical patent/GB2619808B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/16Arrangements for providing special services to substations
    • H04L12/18Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
    • H04L12/1813Arrangements for providing special services to substations for broadcast or conference, e.g. multicast for computer conferences, e.g. chat rooms
    • H04L12/1822Conducting the conference, e.g. admission, detection, selection or grouping of participants, correlating users to one or more conference sessions, prioritising transmission
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/04Real-time or near real-time messaging, e.g. instant messaging [IM]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Telephonic Communication Services (AREA)
  • Information Transfer Between Computers (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

A method for establishing secure chat in a public cloud network. The public cloud network comprises a plurality of internet ecosystems each comprising a secure chat portal (SCP), virtual machine servers (VMS) linked to the SCP, and virtual private metaverses (VPM). Each VPM includes a virtual local area network (LAN) router linked to a corresponding VMS, and a LAN mode secure chatroom linked to the virtual LAN router. A chat host, Host User-1, sends a client credential, 1500/1540, to at least one invitee, Invitee User-2, through a VMS. The host and the invitee sign-in to the SCP with the client credential, 1501/1511. A peer-to-peer (P2P) communication channel, 1541, is then established between the host and the invitee through the SCP. The host launches a secure chat application, 1503, and starts a secure chatroom with a chatroom credential, 1505. The host then sends, 1542, the chatroom credential to the invitee. The invitee launches the secure chat application, 1515, and signs-in to the secure chatroom with the chatroom credential, 1517. The host authenticates the invitee with the chatroom credential, 1507 and secure chat may proceed. Hosting or joining the secure chatroom requires no previous registration.

Description

Private and Secure Chat Connection Mechanism for Use in a Private Communication Architecture
Background of the Invention
1. Field of the Invention
[0001] The present invention relates generally to networking and more particularly to the use of private cloud networks.
2. Description of the Prior Art
[0002] In the Internet connected environment, the Smart Device Clients including smart phone, tablet, &Book reader, notebook, PC and various smart gadgets are ubiquitous and omnipresent. Other than connectivity, one of the values of the Smart Device Clients is to be able to connect at any time and anyplace to acquire services from one or many serving parties or servers. The services include audio, video contents, live or archived information, and execution of applications, social media, messaging, email, storage, backup, calendar, contact, synchronization, sharing, remote desktop, Internet of Things (IoT) and others. Other services include real-time private and secure video, audio, text and application communication between at least two Smart Device Clients. There are different types of servers that serve these various requests from the Smart Device Clients. In general, these types of servers can be categorized to fall into two groups: a public cloud and a private cloud. Servers in Lhe public cloud, implied by Lhe name "public", provide services that tend to be free with limited functionality or fee-based with more sophisticated services and interact with the public. Examples of the public cloud server include data center, social media services and storage/content provider through the Internet. On the other hand, servers in the private cloud tend to address the private need. The services provided are more private and personal as opposed to those offered by the public cloud.
[0003] One example of the application of the private cloud server (PCS) is a private cloud storage server (PCSS). The PCSS sits within the local area network (LAN) managed by the user. It provides on-line and backup storage for the user either within the LAN or in the wide area network (WAN). The user is able to use a Smart Device Client to access information within the PCSS at anytime from anywhere. The PCSS and the associated Smart Device Client therefore form an example of the PCS and a Client architecture.
[0004] Conventionally, there are many storage server solutions, including network attached storage (NAS), Windows/Mac/Linux server, and direct attached storage (DAS) to fulfill the FOSS requirement. But the challenge for the Smart Device Clients in the field has been how to avoid the cumbersome setup to penetrate the firewall behind the router on the LAN to access the FOSS in a home or office environment. There are at least four kinds of solutions to this challenge.
[0005] One solution is to assign a fixed Internet Protocol (IP) address and open certain ports for the router in front of the PCSS, such that the Smart Device Client is able to locate the PCSS from outside the LAN and to authenticate itself, penetrate the firewall and establish a secure communication channel with the PCSS.
[0006] A second solution applies when a fixed IP address is not available. The user configures the LAN router of the PCSS and opens cerLain porLs Lo map Lo Lhe PCSS. The rouLer is Lherefore able Lo be located by the intended Smart Device Client through a dynamic domain name service (DDNS) service on the WAN. The Smart Device Client can authenticate itself, penetrate the firewall and establish a secure communication channel with the POSS.
[0007] A third solution is to rely on another routing server in the WAN to conduct the virtual private network (VPN) communication between the Smart Device Client and the PCSS. The VPN communication allows the Smart Device Client to locate the PCSS, authenticate itself, penetrate the firewall and establish a secure communication channel with the PCSS.
[0008] A fourth solution is to rely on another routing server in the WAN to conduct the remote desktop protocol (RDP) or virtual network computing (VNC) communication between the Smart Device Client and the PCSS. The RDP/VNC communication allows the Smart Device Client to locate the PCSS, authenticate itself, penetrate the firewall and establish a secure communication channel with the PCSS. Other solutions can be mix-and match of the above-mentioned solutions.
[0009] In a first scenario, a fixed ID address is required and the router needs to be set up and configured. The down side is that a fixed ID involves more cost and is usually not available in the home and small business environment. The router set up and configuration can be very complicated and are not user friendly with most consumers.
[0010] In a second scenario, a DDNS service is required and the router needs yet more complex set up. Again, the DDNS set up involves additional cost and complexity Into the system. The router set up and configuration can be very complicated and is not user friendly with most consumers.
[0011] In a third and fourth scenarios, an outside routing server or service needs to be established, while a router set up is not necessary. The ouLside rouLing server or service conLrols and handles login/authentication between the Smart Device Client and the server. The private cloud becomes less private and less secure through the public cloud-based server or service. If for any reason the server or service is down, the communication and availability of the PCSS will be jeopardized.
[0012] All of these scenarios require technical expertise that may be suitable for conventional corporate environment, but these scenarios are not suitable for consumer oriented Smart Device Client centric deployment.
[0013] Inmost conventional systems, an outside or public cloud-based routing server is used by the Smart Device Client during access to a Private Cloud Service. Using an outside server creates a number of concerns to the Smart Device Client owner.
[0014] First, the sense of trust is always in question, because the outside or public cloud-based routing server is a middleman during all communication transactions between the Smart Device Client and the Private Cloud Service. It may hold all user account info, password and their corresponding IP addresses of the Smart Device Client and the Private Cloud Service. The routing server is able to sniff any communication in-between and render it insecure.
[0015] Second, being an outside and public cloud-based routing server, the business model of the owner of server may not always be in-line or in-sync with the Smart Device Client owner. If the routing server is out of service due to any business reason, there is no remedy or option of replacement to restore the service. The routing server potentially poses a tremendous business risk to the user as the vital link in the communication can be broken without recourse.
[0016] Conventionally, in the case of communication between two Smart Device Clients, both parties need to sign into a public cloud-based server in order Lo conducl real-Lime video, audio, Lexl or application communication. The privacy and security are easily compromised due to the fact that the communication has to go through a public cloud-based server, as outlined above.
[0017] In addition, the ToT devices which are the building blocks of the smart appliances at home, have been plagued by the fragmentation of various standards from Matter, Apple HomeKit, Google Nest, Amazon Alexa, and many others. Due to the interoperability, compatibility, as well as the privacy and security issues of the IoT devices, the adoption rate of the smart appliances at home has been below expectation.
[0018] Accordingly, what is needed is a system and method that addresses the above identified issues. The present invention addresses such a need.
Summary of the Invention
[0019] Amethod for use with a public cloud network is disclosed. The method includes setting up at least one public cloud aortal (PCP), at least one virtual machine server (VMS), at least one PCP Admin Device, at least one private cloud virtual private network (VPN) server (PCVS), at least one VPN tunnel, and at least one PCVS smart device client on the side of the PCVS to provide cloud-based web services, and at least one private metaverse (PM) which includes at least one private router, at least one private local area network (LAN), at least one private matter gateway (PMG), at least one PMG Admin Device, at least one private network service (PNS), and at least one PMG smart device client on the side of the PMG private LAN in a client server relationship. The PCVS smart device client, such as a smart phone, tablet, notebook, or Tesla dashboard operates in the public cloud, while a PMG smart device client, such as a notebook (NB), Internet of Things (IoT) device, network attached storage (NAS), seL-Lop-box (SIB), smarL appliance, or media server, resides on Lhe private and secure LAN. The present invention is based on a decentralized peer-to-peer (P29) communication architecture to provide to the users with access convenience as well as privacy and security at the same time. The at least one PCP and the at least one VMS which includes PCVS, usually reside in a hyperscale data center located on a public cloud network, while the at least one PM along with PMG and the at least one PMG smart device client or network service reside in the client's remote premises or reside in a hyperscale data center located on a public cloud network. The private cloud VPN server relays communication between the PCVS smart device client on the side of the PCVS and the PMG. The PCVS will call back the PMG on demand based on the PCVS smart device client request. The at least one VPN tunnels are enabled and established between the PCVS and PMC. The at least one VPN tunnels are enabled and established between the PCVS and PCVS smart device client. The two VPN tunnels are channeled into one single VPN tunnel between the PCVS smart device client and the PMG through the PCVS. All communication from this point onwards between the PCVS smart device client and the PMG through the PCVS is secure and private. All PMG smart device clients along with the network services on the private LAN of the PM are available for access in the LAN mode for future VPN connection from the PCVS smart device clients. From this point on, the PMG and the PCVS are in standby mode waiting for future access from the PCVS smart device clients in the public cloud from Internet. A LAN mode Secure Chatroom mechanism can be realized to achieve private and secure communication between and among users on the Internet.
[0020] The at least one PCP is initially accessed by the at least one PCVS client to log in and acquire the connection credentials including the PCVS server passcode, the VMS domain name, the PCVS VPN client profile file, and the PCVS VPN client passcode. The PCVS VPN client profile file and the PCVS VPN client passcode can then be sent to any authorized PCVS client for future access. With these two credentials, the authorized PCVS client can then connect through Lhe PCP Lo Lhe Large Led VMS and in Lurn Lo Lhe corresponding PCVS. Once connected, the first VPN tunnel between the PCVS client and the PCVS is enabled. The at least one PMG in the private LAN of the PM, will enable a third VPN tunnel on demand with the at least one PCVS in the public cloud as soon as (or if) the proper credentials are established. The at least one PCVS in the public cloud will in turn call back the at least one PMG in the private LAN to enable a first VPN tunnel. The at least one PMG in the private LAN of the PM, will in turn establish a first VPN tunnel with the at least one PCVS in the public cloud as soon as (or if) the first VPN tunnel is enabled by PCVS. A second VPN channel is also enabled by the PCVS for the at least one PCVS smart device client. The at least one PCVS smart device client starts request for connection to the at least one PCVS through the PCVS VPN client profile to establish a third VPN tunnel on demand, in case that the at _east one PCVS smart device client intends to access to any PMG smart device client or a PNS on the private LAN of the PM. The at least one PCVS in the public cloud will in turn call back the at least one PMG in the private LAN of the PM, to establish a third VPN tunnel on demand, and relay communication between the PCVS smart device client from the Internet and the PMG residing on the private LAN of the PM. The second VPN tunnel on demand and the third VPN tunnel on demand are channeled into one single VPN tunnel between the PCVS smart device client and the PMG through the PCVS. From this point onwards, all communication between the PCVS smart device client and the PMG through the PCVS is secure and private. All PMG smart device clients along with the network services on the private LAN of the PM are available for access in the LAN mode for future VPN connection from the PCVS smart device clients. Both the PMG and the PCVS are in standby mode waiting for future access from the PCVS smart device clients in the public cloud from Internet.
[0021] In summary, the present invention sets up at least one PCVS in a client server relationship with at least one PMG. The at least one PCVS and the at least one PMG privately and securely communicates with each other through the public cloud network. It sets up the at leasL one PCVS smarL device clienL in a clienL server relaLionship with the at least one PCVS. It sets up at least one PMG smart device client and at least one PMG PNS in a client server relationship with the at least one PMG. It sets up at least one PCVS smart device client in a client server relationship with the at least one PMG. The at least one PCVS smart device client and the at least one PMG communicates with each other through the public cloud network. The at least one PCVS smart device client and the at least one PMG smart device client privately and securely communicates with each other through the public cloud network. The at least one PCVS smart device client and the at least one PMG PNS privately and securely communicates with each other through the public cloud network.
[0022] The VPN tunnels are based on the industry standard that guarantee privacy and security, as well as future proof interoperability and compatibility in communication. All PMG clients, including IoT devices, along with the network services on the private LAN are thus available for access in the LAN mode, from the PCVS client thought VPN connection in a private and secure manner. Unlike the prior art, which is dependent on the cloud mode access of the clients or the IoT devices on the private LAN through a cloud-based relay server, the present invention relies solely on the LAN mode access through the VPN channels. The access content itself is never and cannot be monitored or recorded due to the strength of the industry recognized VPN tunnel, The present invention is therefore much more private and secure in access communication compared with those of offered by most other prior art. The network connection is based on the Internet protocol. The solution is therefore platform agnostic and simultaneously compatible with all existing fragmented IoT device platforms, be it Matter, Apple HomeKit, Google Nest, or Amazon Alexa, as long as the IoT devices are LAN discoverable and networkable. The term "platform" is interchangeable with the term "ecosystem" through the text. For further consideration of security, the connection credentials including the PCVS server passcode, the VMS domain name, the PCVS VPN client profile file, and the PCVS VPN client passcode, can all be /evoked and re-issued per Lhe requesL of Lhe admin account of the PCVS clients from the cloud through Internet.
[0023] The present invention requires the future PMG clients, i.e., the IoT devices, to operate in LAN mode, instead of in cloud mode, in order to achieve absolute privacy and security for the users. By doing so, the ToT devices no longer need to provide their own cloud-based relay server. The consequential benefits to the users are: a. Breaking up the monopoly in app and IoT device access from mobile operating system (OS) providers like Apple and Google; b. Access convenience from anywhere in the world through Internet; c. True access privacy and security; d. Int eroperahi lity and compatibility with Matter, Apple HomeKit, Google Nest, and Amazon Alexa, at the same time; e. Lowering the entry barrier in IoT device manufacturing, as no more cloud-based relay server is required from the IoT manufacturers; f. Re-instilling confidence in consumers to spur future IoT device sales; g. Opening up new vertical app for IoT markets in secure chat, audio, and video and others; and h. Future proof implementation, based on the industry Internet protocol in network and communication access.
[0024] For the purpose of accessing one PMG smart device client, or IoT device at home from another PCVS smart device client anywhere in the world, the present invention maintains the benefits of access convenience, ease of deployment, great privacy and security, full compatibility/interoperability, and high performance.
[0025] These and other objectives of the present invention will no doubt become obvious to those of ordinary skill in the art after reading the following detailed description of the preferred embodiment that is illustrated in the various figures and drawings. Brief De scrip Lion of Lhe Drawings [0026] These and other objectives of the present invention will no doubt become obvious to those of ordinary skill in the art after reading the following detailed description of the preferred embodiment that is illustrated in the various figures and drawings.
Brief Description of the Drawings
[0027] Fig. 1 is a block diagram of a conventional Cloud Network Infrastructure.
[0028] Fig. 2 is a block diagram of a Cloud Network Infrastructure for the connection mechanism based on session-based message box communication among the Private Cloud Routing Server, the PCCBS, the PNS, the PCBS smart device client, and the PCCBS smart device client. [0029] Fig. 3 is a block diagram of a first embodiment of a Cloud Network Infrastructure for the connection mechanism based on channeling multiple VPN tunnels among the PMG, the Private Cloud VPN Server, the PNS, the PMG smart device client, and the PCVS smart device client in accordance with the present invention.
[0030] Fig. 4 is a diagram of a second embodiment of a communication flow of P2P Connection Mechanism among PMG, PCVS, PCVS smart device client, and a PMG smart device client through a Cloud Network in accordance with the present invention.
[0031] Fig. 5 is a block diagram of a third embodiment of a Cloud Network Infrastructure for the connection mechanism based on channeling multiple VPN tunnels among the PMG, the Private Cloud VPN Server, the PNS, the PMG smart device client, and the PCVS smart device client in accordance with the present invention.
[0032] Fig. 6 is a block diagram of a conventional chatrcom connection mechanism between two user Endpoint devices in one of the Internet ecosystems on the public cloud.
[0033] Fig. 7 is a block diagram of a fourth embodiments of a communication flow of P2P Connection Mechanism among PMG, PCVS, PCVS smart device client, and a PMG smart device client through a Cloud NeLwork, while Lhe aL ledsL one PM along wiLh PMG and Lhe aL ledsL one PMG smart device client or network service reside in a hyperscale data center, instead of in the client's remote premises, located on a public cloud network in accordance with the present invention. [0034] Fig. 8 is a block diagram of a fifth embodiments of a communication flow of P2P Connection Mechanism among PMG, PCVS, PCVS smart device client, and a PMG smart device client through a Cloud Network based on server farm, computer resources aggregation and virtual machine server, while the at least one PM along with PMG and the at least one PMG smart device client or network service reside in a hyperscale data center, instead of in the client's remote premises, located on a public cloud network in accordance with the present invention.
[0035] Fig. 9 is a block diagram of a sixth embodiment of LAN mode secure chatroom connection mechanism between two user Endpoint devices in one of the Internet ecosystems on the public cloud, while the at least one PM along with PMG and the at least one PMG smart device client or network service reside in a hyperscale data center, instead of in the client's remote premises, located on a public cloud network in accordance with the present invention.
[0036] Fig. 10 shows the communication flow of Registering to a Public Cloud Portal by a PCP Admin Device in accordance with the present invention.
[0037] Fig. 11 shows the communication flow of Initializing and Provisioning of the PMG by PMG Admin Device in accordance with the present invention.
[0038] Fig. 12 shows the communication flow of Connection from the PCVS VPN Utility to the PMG VPN Utility and the connection between a PCVS Device Client and a PMG Device Client on a private LAN in accordance with the present invention.
[0039] Fig. 13 shows the communication flow of the Private Cloud VPN Server by PCVS Device Client in accordance with the present invention.
[0040] Fig. 14 shows the communication flow of Connection from the PCVS VPN Utility to the PMG VPN Utility and the connection between a PCVS Device ClienL and a PMG Device ClienL on a privaLe LAN in accordance with the present invention.
[0041] Fig. 15 is the communication flow of conducting a LAN mode secure chat between Host User-1 and Invitee User-2 through their Endpoint devices in accordance with the present invention.
Detailed Description
[0042] The present invention relates generally to networking and more particularly to the use of private cloud networks. The following description is presented to enable one of ordinary skill in the art to make and use the invention and is provided in the context of a patent application and its requirements. Various modifications to the embodiments and the generic principles and features described herein will be readily apparent to those skilled in the art. Thus, the present invention is not intended to be limited to the embodiments shown, but is to be accorded the widest scope consistent with the principles and features described herein.
[0043] The term "Client" is interchangeable with "Smart Device Client" throughout discussion in the context. The term "router" is in general interchangeable with "gateway", "access point" and/or "NAT" (network address translation) in the discussion.
[0044] A system and method in accordance with the present invention addresses the following challenges in a consumer-oriented environment for a Smart Device Client in a wide area network (WAN) to be able to obtain services from a Private Cloud Storage Server (PCSS) or any Private Cloud Server (PCS): 1. Access the PCS at anytime from anywhere.
2. Access the PCS behind the firewall with fixed or dynamic Internet Protocol (IP) address.
3. Require no public cloud-based routing server in the WAN.
4. Require no additional router setup in a local area network (LAN).
S. Authenticate with the PCS.
6. Establish a secure communication channel with the PCS.
[0045] If such challenges can be met and resolved, the deployment of the PCS or service will increase exponentially, due to plug and play simplicity and availability. The technical and business concern will also be removed by not utilizing a public cloud-based routing server. The PCS being utilized for storage, remote desktop service and Internet of Things (IoT) becomes very affordable and ubiquitous in the private cloud infrastructure.
[0046] In the private cloud environment, if there are more than one PCSs or services co-existing at the same time, it is advantageous to separate out the functions of PCS into two functional blocks including a Private Cloud Routing Service (PRS) and a Private Network Service (PNS). The PNS is designed to be managed and accessed on the private network environment, be it wired or wireless, by the Smart Device Client. Examples of a PNS include application program server to provide remote desktop protocol (RDP), VNC, office tools, media player, and other user specific applications. The PNS may also function as a storage server that contains multiple terabytes of storage serving the private cloud. Functions of the PRS of the multiple Private Matter Gateways (PMGs) can then be aggregated together into just one PMG. The PMG can generally be referred to as a Private Cloud Router.
[0047] A system and method in accordance with the present invention addresses the following challenges in the consumer-oriented environment for utilizing the Smart Device Client in the WAN to be able to manage and access the PNS from a PMG: 1. Access the PMG at anytime from anywhere.
2. Access the PMG behind the firewall with fixed or dynamic LP address.
3. Require no outside or public cloud-based routing server in the WAN.
4. Require no additional router setup in the LAN.
5. Authenticate with the PMG.
6. Establish a secure communication channel with the PNS to manage and access.
[0048] If the PMG can fulfill the above-mentioned challenges, heterogeneous PCSs from different manufacturers and vendors can then be broken down into simpler PNSs and remove the complexity of private cloud setup, configuration and access.
[0049] The purpose of a system and method in accordance with the invention is to provide a PMG, the PNS and Client architecture without utilizing a routing server. The system and method in accordance with the present invention addresses the above identified challenges that to allow a Client to be able to access the PNS from anywhere at anytime. The system and method also access the PNS behind a firewall with fixed or dynamic IP, requires no additional router setup and no public cloud-based routing server in the WAN, to authenticate with the EMS, and to establish a secure communication channel directly with the PNS.
[0050] As shown in Fig. 1, a cloud network infrastructure includes a public cloud 100, a public cloud server 113, a public routing server 112, a public virtual private network (VPN) routing server 114, a Smart Device Client 101 in the WAN, a Router P 102 and a Router S 103. The Router S 103 connects between a LAN 105 and the Internet in the public cloud 100. The Router_P 102 connects between a LAN 104 and the Internet in the public cloud 100. Behind the LAN 104, there are Smart Device Clients 106, 10; and a PCS 108. Behind the LAN 105, there are Smart Device Clients 109, 110 and 111. The Smart Device Client can be a PC, notebook, tablet, Tesla dashboard, smart phone, eBook reader, GPS, smart TV, set top box, MP3 player, or any networkable embedded device.
[0051] The SmarL Device ClienLs are denoLed in Lhe Cloud NeLwork Infrastructure as 101, 106, 107, 109, 110, and 111. Any one of the Smart Device Clients above is interchangeable in the context and discussion. The focus on this discussion is the Smart Device Client 109, as the representative in this context.
[0052] Physically, there are three scenarios that a Smart Device Client 101, 107 or 109 can connect to the PCS 108. First, a Smart Device Client 107 determines whether the target is in the locally accessible LAN 104 and decides to connect to the PCS 108 directly. Second, the Smart Device Client 101 determines the target is not in the locally accessible LAN 104 and decides to connect through the WAN to the public cloud 100. The WAN locates the Router_P 102 and the LAN 104, and then connects to the PCS 108. Third, the Smart Device Client 109 determines the target is not in the locally accessible LAN 105 and decides to passes through the LAN 105, Router S 103, and connects to the public cloud 100 in the WAN.
[0053] The Smart Device Client 109 then locates the Router _P 102, the LAN 104 and connects to the PCS 108. The first and the second scenario are two special cases and derivatives of the third scenario. Therefore, it is beneficial to focus on the third scenario that is broader in scope and complexity.
[0054] As shown in Fig. 2, a cloud network infrastructure includes a public cloud 200, a public cloud server 213, a public routing server 212, a public VPN routing server 214, a PCCBS Smart Device Client 201 in the WAN, a Router _P 202 and a Router _S 203. The Router _S 203 connects between a LAN 205 and the Internet in the public cloud 200. The routing server message box (not shown) or a Client Message Box message box S 215 can be hosted inside an email server, text message server, web server, or any kind of server that can host secure message for information exchange between the Private Cloud Routing Server (PCRS) 208, and the Private Cloud Call-Back Server (PCCBS) 216, as a server, the PCRS smart device client 206, 207, and the PCCBS smart device clieriL 209, 210, 211, 201, 221, as a cliera. The Call-Back Server Message Box (not shown) or Client Message Box message_box_S 215, is accessible and under the secure and private control of either PCRS 208, and the PCCBS 216, as a server, or the PCRS smart device client 206, 207, and the PCCBS smart device client 239, 210, 211, 201, 221, as a client. The security and business model of the message box is well understood and expected in the industry by the user. For any reason either message box is down, it can be replaced or redeployed immediately without jeopardizing the communication between the server and the client in the private cloud infrastructure.
[0055] Fig. 3 shows a block diagram of a first embodiment of a Cloud Network Infrastructure for a secure connection mechanism among the PMG, the Private Cloud VPN Server, the PMG Smart Device Clients, and the private cloud VPN server (PCVS) Smart Device Clients for the exploring and accessing of PNS across the public cloud. There are five phases in the connection mechanism between a PCVS Device Client in the cloud, and a PMG Device Client on the private LAN. The five phases are: - Phase one, acquiring connection credentials from a public cloud portal (PCP) Admin Device; - Phase two, pairing and registration with a PCVS from a PMG; - Phase three, establishing initial VPN tunnels between the PCVS and the PMG; - Phase four, connecting to the PMG on demand between the PCVS smart device client and the PMG through the PCVS; and - Phase five, running vertical peer-to-peer (P2P) private and secure PCVS smart device client applications between at least one PCVS smart device client and at least one PMG smart device client, aL leasL one PMG neLwork service, or yeL anoLher PCVS smarL device client.
[0056] In Phase one: acquiring the connection credentials from the PCP Admin Device: To start with, a PCP Admin Device 377, which is itself a PCVS device client 301, logins to a PCP Device Utility (not shown) of a PCP 330 to acquire PCVS Device Client Credentials 379 and PCVS Server Credentials 380. The PCVS Device Client Credentials 379 include a PCVS Client Profile 383 and a PCVS Client Login 382. The PCVS Server Credentials 380 include a Domain PCVS 375 and a Passcode PCVS 376. Both of the PCVS Device Client Credentials 379 and the PCVS Server Credentials 380 are stored in a PCP Device Client Utility 378. The PCVS Server Credentials 380 are later sent through email to a PMG Admin Device 373 for connection to a PMG 308. The PCVS Device Client Credentials 379 are later sent through email to a PCVS Device Client 321 for connection to a PCVS 316.
[0057] In Phase two, pairing and registration with the PCVS from the PMG: The PMG Admin Device 373 uses the utility PMG _Device Utility 374 to initialize and provision the PMG 308 from PMG Admin Device 373. As shown in Fig. 3, the PMG 308 contains a PMG _Device Utility 371 and a PMG VPN Utility 372. The PMG Admin Device 373 is located on the same physical LAN 304 as that of the PMG 308, in order to conduct configuration for security purpose to avoid hacking exposure on Internet or WAN. The Admin Device 373 is itself a PMG Smart Device Client 307. It contains an application utility PMG Device Utility 374, which in turn contains an entry of the Domain PCVS 375 and an entry of the Passcode PCVS 376. The entry of the Domain PCVS 375 is used to set the server domain address of the corresponding PCVS. The entry of the Passcode PCVS 376 is used to set the server passcode of the corresponding PCVS. The PMG Admin Device 373 first configures the PCVS Server credentials by setting its domain name through the entries of the Domain PCVS 375 and the passcode Passcode PCVS 376. The PCVS Server credentials, the Domain PCVS 375 and the Passcose PCVS 376 are used to communicate with the PMG Device Utility 371 in the PMG 308.
[0058] In Phase three, establishing the initial VPN tunnels between the PCVS and the PMG: After the PCVS 316 pairing and registration with the PCVS 316 from the PMG 309, the PMG VPN Utility 372 connects to a PCVS VPN Utility 3720 and enables a third VPN channel between the PMG VPN Utility 372 and the PCVS VPN Utility 3720. The PCVS VPN Utility 3720 then calls back to a Private Metaverse (PM) 370, which contains at least one PMG (e.g., the PMG 308), which in turn contains the PMG VPN Utility 372 to enable a first VPN channel between the PCVS VPN Utility 3720 and the PMG VPN Utility 372. The PCVS VPN Utility 3720 can establish a third VPN tunnel on demand between the PCVS VPN Utility 3720 and the PMG VPN Utility 372. The PCVS VPN Utility 3720 can also establish a third VPN tunnel on demand between the PCVS VPN Utility 3720 and the PMG VPN Utility 372, pending the completion in establishing a second VPN tunnel on demand between the PCVS smart device client 309, 310, 311 or 321, and the PCVS 316. Afterwards, the PMG VPN Utility 372 can establish a first VPN tunnel between the PMG VPN Utility 372 and the PCVS VPN Utility 3720. The PCVS VPN Utility 3720 also enables a second VPN channel between the PCVS VPN Utility 3720 and any PCVS Device Client 301, 309, 310, 311, or 321, from the cloud in the Internet. The PCVS 316 is then ready for further action on demand from any PCVS Device Client 301, 309, 310, 311, or 321. The PCVS VPN Utility 3720 communicates with the PCVS Device Utility 3710, internally inside the PCVS 316. The PCVS Device Utility 3710 stays in a loop waiting on demand for the future PCVS smart device client request.
[0059] In Phase four, connecting to the PMG on demand between the PCVS smart device client and the PMG through the PCVS: The PCVSVPN Utility 3720 communicates with the PCVS Device Utility 3710, internally inside the PCVS 316. The PCVS Device Utility 3720 stays in a loop waiting on demand for the PCVS smart device client request. The PCVS Device Client 321 first registers to the PCVS Device Utility 3710, with the PCVS Client Credentials, including the PCVS Client Profile and PCVS ClienL Login. The PCVS Device ULiliLy 3710 passes Lhe PCVS Client Credentials and the connection request internally inside PCVS 316, to the PCVS VPN Utility 3720. After registration, the PCVS Device Client 321 connects to the PCVS VPN Utility 3720 and establishes a second VPN tunnel on demand between PCVS Device Client 321 and PCVS VPN Utility 3720. The PCVS VPN Utility 3720 then establishes a third VPN tunnel on demand between the PCVS VPN Utility 3720 and the PM 370, which contains at least one PMG (e.g., the PMG 308), which in turn contains the PMG VPN Utility 372. The second VPN tunnel on demand and the third VPN tunnel on demand are channeled into a single VPN between PCVS Device Client 321 and pr4G VPN Utility 372, which resides in the PMG 308.
[0060] In Phase five, running the vertical P2P private and secure PCVS smart device client applications between the at least one PCVS smart device client and the at least one PMG smart device client, the at least one PMG network service, or yet another PCVS smart device client: The PCVS Smart Device Client 301, 311 and 321, through the communication path 322, 324 and 323 respectively are able to locate the PMG 308 with the mechanism disclosed in Figs. 8-13. The PMG 308 and the Private Cloud VPN Server 316 then build a virtual LAN (VLAN) 340 and a VLAN 3400 allowing the authorized PCVS Smart Device Clients 301, 311 and 321 to join in as members of the VLAN 340 and the VLAN 3400, and in turn connecting to a PMG Device Client 306, or a PUS 328 (e.g., PMG Network Service), or yet another PCVS Device Client (not shown), assuming another PCVS Device Client (not shown) has also successfully connected to the PCVS VPN Utility 3720. Refer to Fig. 8 for details in VPN tunnels and connection flow. The PCVS Smart Device Client 301 through the installed program can initiate a private and secure communication as a host. The PCVS Smart Device Client 311 or 321 through the installed program can receive the communication invitation as a guest and:inn the private and secure communication session with the host PCVS Smart Device Client 301, through a vertical P2P private and secure PCVS smart device client application (not shown) offered by Public Cloud Portal 330.
[0061] In Phase five, the at least one PMG smart device client and a PCVS smart device client application form a client server relationship. The PCVS smart device client application includes an application Utility on a public cloud network. The functionality of the at least one PMG smart device client is defined by a class code sent to a PCVS smart device client application. The vendor-specific software modules or applications are loaded by the PCVS smart device client application to support the corresponding PMG smart device client from different manufacturers. The device classes include audio, video, human interface device, IP Camera, Smart Lock, Smart Lightbulb, remote control, thermostat, printer, mass storage, Bluetooth, application specific, vendor specific, and others.
[0062] As shown in Fig. 3, when the PCVS Smart Device Client 301 wants to start a communication session as a host, the program installed on the host PCVS Smart Device Client first locates and logs-in to the PCP 330 through the communication path 322. After the Private Cloud VPN Server 316 locating the PMG 308, it joins the VLAN 340. The PCVS Smart Device Client commits to join chat communication as a host 301. The program allows the PCVS Smart Device Client 301 to create and host a communication session. The program broadcasts the host session to invite communication guest 321. Afterwards, the program starts scanning for recognizable guest PCVS Smart Device Client 321. Once the guest is authenticated, the PCVS Smart Device Client 301 can start private and secure communication as a host with the authenticated guest PCVS Smart Device Client 321. The private and secure communication includes video, audio, text or application. The application can be a program, utility, operation or transaction that is recognizable by both host and guest.
[0063] If the PCVS Smart Device Client 311 or 321 wants to join a communication session as a guest, the program installed on the guest PCVS Smart Device Client first locates and logs-in to the PCP 330 through the communication path 324 or 323 respectively. After the PrivaLe Cloud VPN Server 316 locaLinc Lhe PMG 308, IL Joins Lhe VLAN 340 under the server. The PCVS Smart Device Client 311 or 321 commits to join the communication as a client. The program waits for a communication invitation. Once it receives a communication invitation, the PCVS Smart Device Client 311 or 321 may join a communication session as a guest. The program then starts scanning for recognizable host. Upon identifying the host, the program goes through the communication log-in authentication prompted by the host. Once authenticated, the PCVS Smart Device Client 311 or 321 can join the communication session. The PCVS Smart Device Client 311 or 321 starts private and secure communication as a guest with the host PCVS Smart Device Client 301. The private and secure communication includes video, audio, text or application. The application can be a program, utility, operation or transaction that is recognizable by both host and guest.
[0064] In another embodiment of the present invention, the PCVS Smart Device Client can establish a private and secure communication with any service that is reachable on the physical LAN LAN1 350 or the VLAN 340 and the VLAN 3400, under the PMG and the Private Cloud VPN Server. As shown in Fig. 3, once the PCVS Smart Device Client 301, 311 or 321 locates and logs-in to the PCP 330, it may access any PNS 328 that is reachable on the physical LAN LAN1 350, and the physical LAN LAN2 360, the VLAN 340 and the VLAN 3400 under the PMG and the Private Cloud VPN Server through a secure communication path 325. The ENS includes audio, video contents, live or archived information, and execution of applications, social media, messaging, email, storage, backup, calendar, contact, synchronization, sharing, remote desktop, IoT and others.
[0065] A number of entities are introduced to allow for the secure communication path 325 including but not limited to: Administrator, Admin Device, PMG Utility, PCVS Utility, PMG smart device client, PCVS smart device client. These entities are defined herein below. Utility is a utility running in the PMG. Admin Device is a device that_ administrator uses Lo configure Lhe PMG. PMG smart device client is a device that an Invitee uses to communicate with the PMG. Invitee is a physical party invited by the Admin to access the PMG service and resources. Invitee Device is a PMG Smart Device Client that the Invitee uses to communicate with the PMG.
[0066] A number of terms are introduced including Passcode PCVS, Domain PCVS Client, PCVS Client Profile, and PCVS Client Login. These terms are defined hereinbelow. Passcode PCVS is a passcode generated by the PCP for the corresponding PCVS 316. Domain PCVS is the domain address generated by the PCP Passcode PCVS and Domain PCVS together form the PCVS Server credentials. PCVS_Client_Profile is the VPN profile file for the PCVS smart device client to connect to the corresponding PCVS 316. PCVS Client Login is the VPN login password for the PCVS smart device client to connect to the corresponding PCVS 316. PCVS Client Profile and PCVS Client Login together form the PCVS Client credentials.
[0067] Other terms not associated with the PMG are: PM and Virtual LAN subnet. They are defined herein below. The PM is a private network subsystem which includes a network router, a private LAN, a PMG, at least one PNS, and at least one PMG smart device client. The virtual LAN subnet is the subnet setting of the PMG VPN (virtual private network) . It is configurable and changeable to specify the private subnet for security purpose.
[0068] The device client 301 is itself a PCVS Smart Device Client. It contains an application utility, the PCP Device Client Utility 378, which in turn contains the PCVS Device Client Credentials 379 and the PCVS Server Credentials 380. The PCVS Device Client Credentials 379 contains the PCVS Client Profile and the PCVS Client Login. The PCVS Server Credentials 380 contains the Domain PCVS and the Passcode PCVS.
[0069] The typical PCVS Smart Device Client 321 contains a PCVS Device C1ienf Ufilify 381 which in turn contains the PCVS Client Profile 383 and the PCVS Client Login 382. The PCVS Client Profile 383 is used to connect to the corresponding PCVS 316. The PCVS Client Login 382 is used to login to the corresponding PCVS 316. The PCVS 316 contains the PCVS Device Utility 3710 and the PCVS VPN Utility 3720. The PCVS Device Utility 3710 is used to communicate with the PMG Admin Device 373. The PCVS VPN Utility 3720 is able to communicate with the PMG 308 through the at least one VPN tunnel. The Private Cloud VPN Server 316 acts as a middleman to relay communication between the PCVS smart device clients 321, 301, 311 and the PMG 308. It will call back the PMG 308 on demand based on the PCVS smart device client request.
[0070] Fig. 4 is a diagram of a communication flow of a third embodiment of P2P Connection Mechanism between PMG, PCVS, a PMG smart device client and a PCVS smart device client through a Cloud Network. It shows in accordance with the present invention that no public cloud Routing Server is required for the PCVS smart device clients to connect and access to either the Server PMG 428, PCVS 427, or another PMG smart device client, or the network services under the server through Cloud Network. As shown in Fig. 4, a PCVS Device Clientl 425 and a PMG 428 on the Cloud Network can communicate with each other without going through the Public Routing Server 112 or the Public VPN Routing Server114 in Fig. 1. Unlike the prior art in Fig. 7, initially, one of the PCVS Device Clients, a PCP Admin Device 450, connects to a PCP 451, which is a cloud-based public cloud portal, which contains a PCP Device Utility 447, as in circle 1, 403. The PCP Admin Device 450 acquires PCVS Server Credentials as well as PCVS Client Credentials from the PCP Device Utility 447. The PCVS Server Credentials include Domain PCVS, the PCVS server domain, and Passcode PCVS, the PCVS server passcode. The PCVS Client Credentials include PCVS Client Profile, the client login profile file, and PCVS Client Login, the login password of the client profile. The PCVS Server Credentials are sent to a PMG Admin Device 420 via email or other means. The PCVS Client Credentials are sent to authorized PCVS Device ClienLs, such as Lhe PCVS Device ClienL1 425, for fuLure P2P connection with one of the PMG Device Clients, such as a PMG Device Client2 426 on the private LAN of the PMG 428. The PCP 451 contains at least one PCP Device Utility (e.g., the PCP Device Utility 447), which in turn contains at least one VMS (e.g., a VMS 432), which in turn contains at least one PCVS (e.g., a PCVS 427), which in turn contains a PCVS Device Utility 424 and a PCVS VPN Utility 423.The VMS 432 along with the PCVS 427 forms a one-to-one corresponding relationship with the PMG 428, deployed in the private LAN. The PCP Device Utility 447 is a public cloud portal which is scalable and may correspond to the at least one VMS (e.g., the VMS 432) and the at least one PCVS (e.g., the PCVS 427).
[0071] The PMG Admin Device 420, after receiving the PCVS Server Credentials, first initializes and provisions the PMG 428 with the server credentials through a PMG Device Utility 421, as described in circle 2, 400. The PMG Device Utility 421 then passes the info internally inside the PMG 428, to a PMGVPM Utility 422. It then registers to the PCVS VPN Utility 423 with the PCVS Server credentials info that includes the Domain PCVS and Passcode PCVS through the TCP/UDP protocols, as in circle 4, 401. The PCVS_VPN Utility 423 then calls back to a PM 452, which contains at least one PMG (e.g., the PMG 428), which in turn contains the PMG VPN Utility 422 to enable a first VPN channel between the PCVS VPN Utility 423 and the PMG VPN Utility 422, as in circle 3, 405. Afterwards, the PMG VPN Utility 422 establishes a first VPN tunnel between the PMG VPN Utility 422 and the PCVS VPN Utility 423, as in circle 5, 413. The PCVS VPN Utility 423 also enables a second VPN channel between the PCVS VPN Utility 423 and any PCVS Device Client (e.g., the PCVS Device Clientl 425 or a CVS Device Client3 453), as in circle 9, 445 or 446, from the cloud on the Internet. The PCVS 427 is then ready for further action on demand from any PCVS Device Client (e.g., the PCVS Device Clientl 425) from the cloud on the Internet. The PCVS VPN Utility 423 communicates with the PCVS Device Utility 424, internally inside the PCVS 427. The PCVS Device Utility 424 stays in a loop waiLing on demand for Lhe PCVS smaLL device clienL requesL, as circle 7, 402. The PCVS Device Clientl 425 first registers to the PCVS Device Utility 424, with the PCVS Client Credentials, including the PCVS Client Profile and PCVS Client Login, as in circle 8, 404 or 414. The PCVS Device Utility 424 passes the PCVS Client Credentials and the connection request internally inside the PCVS 427, to the PCVS VPN Utility 423. After registration, the PCVS Device Clientl 425 connects to the PCVS VPN Utility 423 and establishes a second VPN tunnel on demand between the PCVS Device Clientl 425 and the PCVS VPN Utility 423, as in circle 10, 406 or 416. The second VPN tunnel on demand as in circle 10, 406 and the first VPN tunnel as in circle 5, 413 are channeled into a single VPN between the PCVS Device Clientl 425 and the PMG VPN Utility 422 and in turn connecting to a PMG Device Client2 426, as in circle 11, 411, or a PMG Network Service 436 as in circle 11, 431, or yet another PCVS Device Client (e.g., the PCVS Device Client3 453) as in circle 10, 416, assuming another PCVS Device Client (e.g., the PCVS Device Client3 453) has also successfully connected to the PCVS VPN Utility 423. The PCVS Device Clientl 425 and the PCVS Device Client3 453 therefore form a P2P private and secure communication channel between them, which is the foundation for further secure chat applications in text, audio, video, file sharing, screen sharing, storage access, and crypto currency transaction.
[0072] Compared with the prior art in Figs. 6 and 7, the present invention is more scalable and expandable, as it introduces a few new entities, including the PCP 451, the PCP Device Utility 447, the VMS 432, the PM 452, the PCP Admin Devices 450, the PMG Admin Device 420, the PCVS Server Credentials, and the PCVS Client Credentials. It connects first to the PCP 451, then to at least one PCP Device Utility (e.g., the PCP Device Utility 447), then to the at least one VMS (e.g., the VMS 432), then to the at least one PCVS (e.g., the PCVS 427), then to at least one PM (e.g., the PM 452), then to the at least one PMG (e.g., the PMG 428), then to at least one PMG Device Client (e.g., the PMG Device Cl_ent2 426), or to at least one PMG NeLwork Service (e.g., Lhe PMGNeLwork Service 436), or Lo yeL anoLher PCVS Device Client (e.g., the PCVS Device Client3 453). The PCP Admin Device 450 starts with acquiring the PCVS Server Credentials and Client Credentials from the PCP 451. Afterwards, the PCVS Server Credentials are sent to the PMG Admin Device 420 to set to the PMG 428 for connection with the corresponding PCVS 427, which is inside the VMS 432, which is inside the PCP 451. Further, there are at least three VPN tunnels binding together before the final two VPN tunnels forming a single VPN tunnel for the peer-to-peer communication between a PCVS smart device client 425 and a PMG smart device client 426, the PMG Network Service 436, or yet another PCVS smart device client (e.g., the PCVS Device Client3 453) in a vertical P2P private and secure PCVS smart device client application.
[0073] Fig. 5 shows a block diagram of a third embodiment of the invention. The Public Cloud 500 accommodates Internet Platform Owner-1 Cloud 541, Internet Platform Owner-2 Cloud 542, Internet Platform Owner-3 Cloud 543, and Internet Platform Owner-N Cloud 544. The PMG 508 connects to a LAN 504 of a Private LAN Router 502, in a manner similar to the way the PCRS 208 connects to the LAN 204 of the Router _F 202 in Fig. 2. As long as the Private Metaverse-1 550, and the physical LAN 504 are all explorable and accessible by the PCVS Smart Device Clients (e.g., a VR goggle 551, a NE 552, a smart phone 553, a tablet 554, a VR goggle 561, a NB 562, a smartphone 563 and a Tesla dashboard 564), across the cloud through User-1 Virtual Machine Server 531 and the Private Cloud VPN Server 516, and the PMG 508, all PNS (including Barter AT Home 526 and Chat In Home 527), and PMG Smart Device Clients 521, 522, and 525 become accessible. The above effect can be called a Virtual Teleporter. The PCVS Smart Device Client (e.g., a VR goggle 551, a NB 552, a smart phone 553, a tablet 554, a VR goggle 561, a NB 562, a smartphone 563 and a Tesla dashboard 564), virtually teleport itself to the User-1 Private LAN 504, as a User-1 Virtual Teleporter 528, as if it physically resides on the private LAN. The PCVS Smart Device Client is then able to access all PMG Smart Device Clients and network services 521, 522, 525, 526, and 527 privaLely and securiLy due Lo LheVPNconnecLionuaLure. °Lhek than the metadata access, no other third party including the Internet Platform Owner-1 Cloud 541 is able to track or monitor the VPN access as well as the IoT data content. Through the Virtual Teleporter effect, a plurality of usage models are available: (A) Access to home from anywhere (ATHFA), which involves with all PMG Smart Device Clients and network services 521, 522, 525, 526, and 527. (B) Work from home from anywhere (WFHFA), which involves with PMG Smart Device Clients relevant to office equipment such as NB 521 and NAS 322. (C) Chat in home from anywhere (CIHFA), which involves with a PNS, Chat In Home network service 527. (B) Barter at home from anywhere (BAHFA), which involves a PNS, Barter At Home network service 526. The Teleporter effect of access to the PMG Smart Device Client 525 is the example ofATHFA; while the access to the PMG Smart Device Clients 521 and 522 are the examples of WFHFA; while the access to the PMG network service 527 is the example of CIHFA; while the access to the PMG network service 526 is the example of BAHFA. The Teleporter effect of the Virtual Teleporter 528 will unify the Internet Platform Owner-1 Cloud 541, the Internet Platform Owner-2 Cloud 542, the Internet Platform Owner-3 Cloud 543, and the Internet Platform Owner-N Cloud 544 into a single unified platform 501, allowing platform agnostic access with the above mentioned usage models.
[0074] Fig. 6 shows a block diagram of a conventional chatroom connection mechanism between two user Endpoint devices in one of the Internet ecosystems on the public cloud. The Public Cloud 600 accommodates Internet Ecosystem-1 Cloud 641, Internet Ecosystem-2 Cloud 642, and Internet Ecosystem-M Cloud 644. The Cloud mode Chatroom-1 627 connects to Chat Relay Server-1 631 through the network connection 686, while another Cloud mode Chatroom-N 627 connects to Chat Relay Server-N 657 through the network connection 685. Both Chat Relay Server-1 631 and Chat Relay Rerver-N 634 are connected to the upstream Chat Portal 630 through the network connection 684 and 683 respectively. The Chat Portal 630 is web accessible on the Public Cloud 600 between any combinations of the User-1 EndpoinL devices, 661, 6662, 663, 665 and User-2 EndpoinL devices, 651, 652, 653, 655 through the network connection 682 and 681 respectively. The nature of the conventional chat, which is one kind of network service, has many attributes as: 1) It requires user registration before usage. 2) It is very convenient to conduct chat between or among users from anywhere in the cloud. 3) All chat communication goes through the Chat Relay Server as a middleman or go-between. The chat communication is not private and secure. Regardless of end-to-end encryption or not, it is therefore trackable and monitorable by the chat ecosystem provider as in WhatsApp, LINE, WeChat, Teams Chat, FaceTime, Webex, and Zoom. 4) The scope of the third-party collectable user data includes user account information, device information, and usage data. 5) The scope of the third-party collectable user metadata includes the phone numbers involved in the conversation, the time and date of messages sent and received, and the location of the device.
[0075] Fig. 7 shows a block diagram of a fourth embodiment of the invention. It is communication flow of one of the embodiments of P29 Connection Mechanism between PMG, PCVS, a PMG smart device client and a PCVS smart device client through a Cloud Network. It is a special case configuration based on Fig. 4, which is a second embodiment of the present invention. The bold dash enclosure 7511 shows that the at least one PM 752 along with PMG 728 and the at least one PMG smart device client 726 or network service 736 may reside with VMS 732 in the same hyperscale data center located on a public cloud network, or in a hyperscale data center Located on a public cloud network. It shows in accordance with the present invention that no public cloud Routing Server is required for the PCVS smart device clients to connect and access to either the Server PMG 728, PCVS 727, or another PMG smart device client, or the network services under the server through Cloud Network. As shown in Fig. 7, a PCVS Device Client' 725 and a PMG 728 on the Cloud Network can communicate with each other without going through the Public Routing Server 112 or the Public VPN Routing Server114 in Fig. 1. Unlike the prior art in Fig. 7, iniLially, one of Lhe PCVS Device ClienLs, a PCP Admit' Device 750, connects to a PCP 751, which is a cloud-based public cloud portal, which contains a PCP Device Utility 747, as in circle 1, 703. The PCP Admin Device 750 acquires PCVS Server Credentials as well as PCVS Client Credentials from the PCP Device Utility 747. The PCVS Server Credentials include Domain PCVS, the PCVS server domain, and Passcode PCVS, the PCVS server passcode. The PCVS Client Credentials include PCVS Client Profile, the client login profile file, and PCVS Client Login, the login password of the client profile. The PCVS Server Credentials are sent to a PMG Admin Device 720 via email or other means. The PCVS Client Credentials are sent to authorized PCVS Device Clients, such as the PCVS Device Client1 725, for future P2P connection with one of the PMG Device Clients, such as a PMG Device Client2 726 on the private LAN of the PMG 728. The PCP 751 contains at least one PCP Device Utility (e.g., the PCP Device Utility 747), which in turn contains at least one VMS (e.g., a VMS 732), which in turn contains at least one PCVS (e.g., a PCVS 727), which in turn contains a PCVS Device Utility 724 and a PCVS VPN Utility 723.The VMS 732 along with the PCVS 727 forms a one-to-one corresponding relationship with the PMG 728, deployed in the private LAN. The PCP Device Utility 747 is a public cloud portal which is scalable and may correspond to the at least one VMS (e.g., the VMS 732) and the at least one PCVS (e.g., the PCVS 727).
[0076] The PMG Admin Device 720, after receiving the PCVS Server Credentials, first initializes and provisions the PMG 728 with the server credentials through a PMG Device Utility 721, as described in circle 2, 700. The PMG Device Utility 721 then passes the info internally inside the PMG 728, to a PMG VPN Utility 722. It then registers to the PCVS VPN Utility 723 with the PCVS Server credentials info that includes the Domain PCVS and Passcode PCVS through the TCP/UDP protocols, as in circle 4, 701. The PCVS VPN Utility 723 then calls back to a PM 752, which contains at least one PMG (e.g., the PMG 728), which in turn contains the PMG VPN Utility 722 to enable a first VPN channel between the PCVS VPN Utility 723 and Lhe PMG VPN ULiliLy 722, as in circle 3, 705. ALLerwards, Lhe PMG VPN Utility 722 establishes a first VPN tunnel between the PMG VPN Utility 722 and the PCVS VPN Utility 723, as in circle 5, 713. The PCVS VPN Utility 723 also enables a second VPN channel between the PCVS VPN Utility 723 and any PCVS Device Client (e.g., the PCVS Device Clientl 725 or a CVS Device Client3 753), as in circle 9, 745 or 746, from the cloud in the Internet. The PCVS 727 is then ready for further action on demand from any PCVS Device Client (e.g., the PCVS Device Clientl 725) from the cloud in the Internet. The PCVS VPN Utility 723 communicates with the PCVS Device Utility 724, internally inside the PCVS 727. The PCVS Device Utility 724 stays in a loop waiting on demand for the PCVS smart device client request, as circle 7, 702. The PCVS Device Clientl 725 first registers to the PCVS Device Utility 724, with the PCVS Client Credentials, including the PCVS Client Profile and PCVS Client Login, as in circle 8, 704 or 714. The PCVS Device Utility 724 passes the PCVS Client Credentials and the connection request internally inside the PCVS 727, to the PCVS VPN Utility 723. After registration, the PCVS Device Clientl 725 connects to the PCVS VPN Utility 723 and establishes a second VPN tunnel on demand between the PCVS Device Clientl 725 and the PCVS VPN Utility 723, as in circle 10, 706 or 716. The second VPN tunnel on demand as in circle 10, 706 and the first VPN tunnel as in circle 5, 713 are channeled into a single VPN between the PCVS Device Clientl 725 and the PMG VPN Utility 722 and in turn connecting to a PMG Device Client2 726, as in circle 11, 711, or a PMG Network Service 736 as in circle 11, 731, or yet another PCVS Device Client (e.g., the PCVS Device Client3 753) as in circle 10, 716, assuming another PCVS Device Client (e.g., the PCVS Device Client3 753) has also successfully connected to the PCVS VPN Utility 723. The PCVS Device Clientl 725 and the PCVS Device Client3 753 therefore form a 92P private and secure communication channel between them, which is the foundation for further secure chat applications in text, audio, video, file sharing, screen sharing, storage access, and crypto currency transaction.
[0077] The presenL invenLion is more scalable and expandable, as IL introduces a few new entities, including the PCP 751, the PCP_Device Utility 747, the VMS 732, the PM 752, the PCP Admin Devices 750, the PMGAdmin Device 720, the PCVS Server Credentials, and the PCVS Client Credentials. It connects first to the PCP 751, then to at least one PCP Device Utility (e.g., the PCP Device Utility 747), then to the at least one VMS (e.g., the VMS 732), then to the at least one PCVS (e.g., the PCVS 727), then to at least one PM (e.g., the PM 752), then to the at least one PMG (e.g., the PMG 728), then to at least one PMG Device Client (e.g., the PMG Device Client2 726), or to at least one PMG Network Service (e.g., the PMG Network Service 736), or to yet another PCVS Device Client (e.g., the PCVS Device Client3 753). The PCP Adatin Device 750 starts with acquiring the PCVS Server Credentials and Client Credentials from the PCP 751. Afterwards, the PCVS Server Credentials are sent to the PMG Admin DPV1CP 720 to set to the PMG 728 for connection with the corresponding PCVS 727, which is inside the VMS 732, which is inside the PCP 751. Further, there are at least three VPN tunnels binding together before the final two VPN tunnels forming a single VPN tunnel for the peer-to-peer communication between a PCVS smart device client 725 and a PMG smart device client 726, the PMG Network Service 736, or yet another PCVS smart device client (e.g., the PCVS Device Client3 753) in a vertical P2P private and secure PCVS smart device client application. The fourth embodiment is a special case configuration of the second embodiment, while the at least one PM 752 along with PMG 728 and the at least one PMG smart device client 726 or network service 736 reside in the same hyperscale data center as with VMS 732 located on a public cloud network, or in a hyperscale data center located on a public cloud network as indicated in the dash enclosure 7511, instead of in the client's remote premises, located on a public cloud network.
[0078] Fig. 8 shows a block diagram of a fifth embodiment of the invention. It is a communication flow of P2P Connection Mechanism between PMG, PCVS, a PMG smart device client and a PCVS smart device client through a Cloud Network based on server farm, computer resources agqregaLion and virLual machine server. FurLher, Fig. 8 expands upon Fig. 7 by adding a server farm 830 and a computer resources aggregation 831 to exemplify the implementation of the PMG connection mechanism in a hyperscale data center. The hyperscale data center may have at least one server farm (e.g., the server farm 830), at least one computer resources aggregation (e.g., the computer resources aggregation 831), at least one PCP (e.g., a PCP 851), and at least one VMS (e.g., a VMS 832). The VMS 832 is scalable in quantity and size. The hyperscale datacenter or the service provider may construct and deploy at least one PCP (e.g., a PCP 851) and a large number of independent PCVS (e.g., a PCVS 827) in its corresponding VMSs (e.g., the VMS 832) in order to service its corresponding PMG (e.g., a PMG 828) and the corresponding PMG smart device clients (e.g., a PMG Device Client2 826). The bold dash enclosure 8511 shows that the at least one PM 852 along with PMG 828 and the at least one PMG smart device client (not shown) or network service 836 may reside in the same hyperscale data center as with VMS 832 located on a public cloud network, or in a hyperscale data center located on a public cloud network. In essence, a community pair of 929 communication relationship between the PCVS smart device client (e.g., a PCVS Device Client" 825) and the PMG smart device client (e.g., the PMG Device Client2 826) may be constructed and deployed by the platform owner who is responsible for maintaining the VMS 832 with or without the topology of the computer resources aggregation 831 and the server farm 830. A possible business model, for example, is for an Internet platform owner to offer to a large number of subscribers to host their private and secure PCVS 827 in the VMS 832. In addition, a separate private and secure PMG 828 is also offered to allow the individual subscriber to install the PMG 828 in their private LAN. Through the invention, the platform subscriber may establish from anywhere, a P29 communication between its PCVS smart device client (e.g., the PCVS Device Client' 825), such as a smart phone, a tablet or a Tesla dashboard, and a PMG smart device client e.g., the PMG Device Client2 826), such as a NB, ToT device, NAS, STB, smart appliance, or media server, residing on the subscriber's private and secure LAN. Fig. 8 shows in accordance with the present invention that no public cloud Routing Server is required for the PCVS smart device clients (e.g., the PCVS Device Clientl 825) to connect and access to either the Server PMG 828, PCVS 827, or another PMG smart device client (e.g., the PMG Device Client2 826), or the network services (not shown) under the server through the Cloud Network. As shown in Fig. 8, the PCVS Device Clientl 825 and the PMG 828 on the Cloud Network may communicate with each other without going through the Public Routing Server 112 or the Public VPN Routing Server 114 in Fig. 1 (not shown). Initially, one of the PCVS Device Clients, a PCP Admin Device 850, connects to the PCP 851, which is a cloud-based public cloud portal, which contains a PCP Device Utility 847, as in circle 1, 803. The PCP Admin Device 850 acquires PCVS Server Credentials as well as PCVS Client Credentials from the PCP Device Utility 847. The PCVS Server Credentials include Domain PCVS, the PCVS server domain, and Passcode PCVS, the PCVS server passcode. The PCVS Client Credentials include PCVS Client Profile, the client login profile file, and PCVS Client Login, the login password of the client profile. The PCVS Server Credentials are sent to a PMG Admin Device 820 via email or other means. The PCVS Client Credentials are sent to authorized PCVS Device Clients, such as the PCVS Device Clientl 825, for future P2P connection with one of the PMG Device Clients, such as the PMG Device Client2 820 on the private LAN of the PMG 828. The PCP 851 contains at least one PCP Device Utility (e.g., a PCP Device Utility 847), which in turn contains the at least one VMS (e.g., the VMS 832), which in turn contains at least one PCVS (e.g., the PCVS 827), which in turn contains a PCVS Device Utility 824 and a PCVS VPN Utility 823. The VMS 832 along with the PCVS 827 forms a one-to-one corresponding relationship with the PMG 828, deployed in the private LAN. The PCP Device Utility 847 is a public cloud portal which is scalable and may correspond to the at least one VMS (e.g., the VMS 832) and the at least one PCVS (e.g., the PCVS 827).
[0079] The PMG Admin Device 820, after receiving the PCVS Server Credentials, first initializes and provisions the PMG 828 with the server credenLials Lhrough Lhe PMG Device ULiliLy 821, as described in circle 2, 800. The PMG Device Utility 821 then passes the info internally inside the PMG 828, to a PMG VPN Utility 822. It then registers to the PCVS VPN Utility 823 with the PCVS Server credentials info that includes the Domain PCVS and Passcode PCVS through the TCP/UDP protocols, as in circle 4, 801. After registration, the PCVS VPN Utility 823 then calls back to a PM 852, which contains at least one PMG (e.g., the PMG 828), which in turn contains the PMG VPN Utility 822 to enable a first VPN channel between the PCVS VPN Utility 823 and the PMG VPN Utility 822, as in circle 3, 805. The PCVS VPN Utility 823 can also establish a second VPN tunnel on demand between the PCVS VPN Utility 823 and the PMG VPN Utility 822, pending the completion in establishing a second VPN tunnel on demand, as in circle 10, 806. Afterwards, the PMG VPN Utility 822 establishes a first VPN tunnel between the PMG_VPN Utility 822 and the PCVS VPN Utility 823, as in circle 5, 813. The PCVS VPN Utility 823 also enables a second VPN channel between the PCVS VPN Utility 823 and any PCVS Device Client (e.g., the PCVS Device Client1 825), as in circle 9, 845, from the cloud on the Internet. The PCVS 827 is then ready for further action on demand from any PCVS Device Client (e.g., the PCVS Device Clientl 825) from the cloud in the Internet. The PCVS VPN Utility 823 communicates with the PCVS Device Utility 824, internally inside the PCVS 827. The PCVS Device Utility stays in a loop waiting on demand for the PCVS smart device client request, as circle 7, 802. The PCVS Device Clientl 825 first registers to the PCVS Device Utility 824, with the PCVS Client Credentials, including the PCVS Client Profile and PCVS Client Login, as in circle 8, 804. The PCVS Device Utility 824 passes the PCVS Client Credentials and the connection request internally inside the PCVS 827, to the PCVS VPN Utility 823. After registration, the PCVS Device Client1 825 connects to the PCVS VPN Utility 823 and establishes a second VPN tunnel on demand between the PCVS Device Clientl 823 and the PCVS VPN Utility 823, as in circle 10, 806. The second VPN tunnel on demand as in circle 10, 806 and the first VPN tunnel as in circle 5, 813 are channeled into a single VPN between Lhe PCVS Device ClienL1 825 and Lhe PMG VPN ULiliLy 822 and in burn connecting to the PMG Device Client2 826, as in circle 11, 811, or a PMG Network Service (not shown) as in circle 11, 811. The fifth embodiment is yet another expansion of the fourth embodiment deployed under server farm and computer resources aggregation, while the at least one PM 852 along with PMG 828 and the at least one PMG smart device client (not shown) or network service 836 reside in the same hyperscale data center as with VMS 832 located on a public cloud network, or in a hyperscale data center located on a public cloud network as indicated in the dash enclosure 8511, instead of in the client's remote premises, located on a public cloud network.
[0080] Fig. 9 shows a block diagram of a sixth embodiment of the invention, which is a LAN mode secure chatroom connection mechanism between two user Endpoint devices in one of the Internet ecosystems on the public cloud. The Public Cloud 900 accommodates Internet Ecosystem-1 Cloud 941, Internet Ecosystem-2 Cloud 942, and Internet Ecosystem-M Cloud 944. The LAN mode Secure Chatroom-1 927 connects to the Virtual LAN Router-1 902 in the Virtual Private Metaverse-1 950 through the network connection 998, while a Virtual Private Matter Gateway PMG-1 908 and the Virtual Teleporter-1 928 connecting to the Virtual LAN Router-1 902 through network connection 992, 994 and 996 respectively. The Virtual Teleporter-1 928 is not a physical device. Instead, it is the result of the Virtual teleoorter effect created after the user Endpoint device successfully teleports itself to the Virtual Private Metaverse-1 950 underneath the Virtual LAN Router-1 902 and Virtual Private LAN-1 904. The Virtual LAN Router-1 902 connects upstream to the Virtual Machine Server-1 931 through the network connection 988. The Virtual Machine Server-1 931 in turn connects upstream to the Secure Chat Portal 930 through the network connection 986. The LAN mode Secure Chatroom-N 957 connects to the Virtual LAN Router-N 903 and the Virtual LAN-N 903 in the Virtual Private Metaverse-N 959 through the network connection 997, while a Virtual Private Matter Gateway PMG-N 9008 and the Virtual Teleporter-N 958 connecting to the Virtual LAN Router-N 903 and the VlrLual LAN-N 905 LILL ugh ne Lwor k connec Lion 991, 993 and 995 respectively. The Virtual LAN Router-N 903 connects upstream to the Virtual Machine Server-N 934 through the network connection 987. The Virtual Machine Server-N 934 in turn connects upstream to the Secure Chat Portal 930 through the network connection 985. The Secure Chat Portal 930 is web accessible on the Public Cloud 900 between any combinations of the user-1 Endpoint devices, a VR goggle 961, a smart phone 963, a Tesla dashboard 964, a pair of AR glasses 965 and user-2 Endpoint devices, a VR goggle 951, a smart phone 953, a Tesla dashboard 954, a pair of AR glasses 955 through the network connection 982 and 981 respectively. The Public Cloud 900 accommodates Internet Ecosystem-1 Cloud 941, Internet Ecosystem-2 Cloud 942, and Internet Ecosystem-M Cloud 944. The Virtual PMG-1 908 connects to a Virtual LAN-1 904 of a Private LAN-1 Router 902, in a manner similar to the way the PCPS 208 connects to the LAN 204 of the Router _P 202 in Fig. 2. As long as the Virtual Private Metaverse-1 950, and the Virtual LAN-1 904 are all explorable and accessible by the PCVS Smart Device Clients, or the User Endpoint Devices (e.g., a VR goggle 951, a smart phone 953, a Tesla dashboard 954, a pair of AR glasses 955, a VR goggle 961, a smartphone 963, a Tesla dashboard 964, and a pair of AR glasses 965), across the cloud through User-1 Virtual Machine Server-1 931 and the Virtual PMG-1 908, all PNS including LAN mode Secure Chatroom-1 927, and Virtual PMG-1 Smart Device Clients (not shown) become accessible. The above effect can be called a Virtual Teleporter effect. The PCVS Smart Device Client, or the User Endpoint Devices (e.g., a VR goggle 951, a smart phone 953, a Tesla dashboard 954, a pair of AR glasses 955, a VR goggle 961, a smartphone 963, a Tesla dashboard 964, and a pair of AR glasses 965), virtually teleports itself to the Virtual Private LAN-1 904, as a Virtual Teleporter-1 928, as if it physically resides on the virtual private LAN-1 904. The PCVS Smart Device Client, or the User Endpoint Device is then able to access all PMG-1 Smart Device Clients and network services, including the LAN mode Secure Chatroom 927 privately and security due to the nature of the VPN connection. Other than the metadata access, no other third party including the Internet EcosysLem-1 Cloud 941 provider is able Lo Lrack or moniLor Lhe VPN access as well as the secure chat data content. The Teleporter effect of the Virtual Teleporter-1 928 will unify the Internet Ecosystem-1 Cloud 941, the Internet Ecosystem-2 Cloud 942, and the Internet Ecosystem-M Cloud 944 into a single unified Ecosystem 901, allowing platform agnostic access with the above-mentioned usage models. There are a number of benefits of the LAN mode Secure Chat deriving from the Virtual teleporter effect out of the Virtual Teleporter-1 928: 1) No registration is required for users to host or join the chatroom. No registration is required for the LAN mode secure chat User-1 and User-2 from any one of their Endpoint devices 951, 953, 954, 955, 961, 963, 964, and 965. With no registration, it avoids collection of the user metadata including the phone numbers involved in the conversation, the time and date of messages sent and received, and the location of the device. 2) The secure chat connection is fully de-centralized. 3) Due to the nature of the two smart VPN tunnels through connections 984, 988, and 982, the secure chat session is end-to-end encrypted. What happens in VPN, stays in VPN. 4) The Virtual Teleporter effect can unify different Internet Ecosystem-1 941, Internet Ecosystem-2 942, and Internet Ecosystem-M 944. The secure chat is therefore platform agnostic. 5) The LAN mode Secure Chat is conducted via the two smart VPN tunnels through connections 984, 988, and 982 and then teleported to a Virtual Private Metaverse-1 950 underneath its virtual LAN 904. It is therefore private and secure. What happens insecure chat, stays in secure chat. What happens in VPN, stays in VPN. 6) Being private and secure in secure chat, it avoids collection of the user data Includes user account information, device information, and usage data by any other third party including the ecosystem owner. Similar process can apply in the creation of another LAN mode Secure Chatroom-N 957 which was conducted via Virtual Private Matter Gateway PMG-N 9008, Virtual Teleporter-N 958, Virtual Private Metaverse-N 959, Virtual LAN Router-N 903, Virtual LAN-N 905, Virtual Machine Server-N 934, corresponding network connection 991, 993, 995, 997, 987, and 985.
[0081] Fig. 10 shows Lhe conununicaLionflow, of Regis Lering Lo a Public Cloud Portal by a PCP Adritin Device in accordance with the present invention. The PCP Admin Device first opens the PCP Device Utility from the WAN, via step 1000. Next, "Register a Public Cloud Portal" command on the PCP Device Utility is selected, via step 1001. Next, the PCVS Server Credentials as well as the PCVS Client Credentials are acquired, via step 1002. The PCVS Server Credentials contains the PCVS server domain, Domain PCVS, and the server passcode, Password PCVS. The PCVS Client Credentials contains the PCVS Client Profile and the PCVS Client Login. Next, the PCVS Server Credentials including the Domain PCVS and the Password PCVS are sent to the PMG Admin Device, via step 1003. The PCVS Client Credentials including PCVS Client Profile and the PCVS Client Login are sent to the PCVS Device Client, via step 1004, for future P2P communication with the targeted PMG Device Clients, PMG Network Service, or another PCVS Device Client.
[0082] In the meantime, the PCP Device Utility starts accepting command from PCP Admin Device to register to the PCP, via step 1010. The PCVS Server Credentials and the PCVS Client Credentials are either generated or retrieved by the PCP Device Utility, via step 1011. Both credentials are then sent back to the PCP Admin Device, via step 1040.
[0083] Fig. 11 shows the communication flow of the Initializing and Provisioning of the PMG by the PMG Admin Device in accordance with the present invention. As shown in Fig. 11, the PMG Admin Device first opens PMG Device Utility from PMG LAN, via step 1101. Thereafter, discover and select PMG on LAN, via step 1102. Then the "Initialize and Provision" command on PMG Device Utility is selected, via step 1103. Thereafter, the PMG is configured by setting PCVS Server Credentials, including the PCVS server domain, Domain PCVS, and the PCVS server passcode, Passcode_PCVS, as the unique PMG identity, via step 1104. The PCVS Server Credentials are then sent to PMG Device Utility, via step 1140.
[0084] The PCVS Server Credentials (Domain PCVS, Passcode PCVS) are the accepted, via step 1110, and stored as the identity for PMG, via step 1111. Then the PMG is registered to a PCVS as a corresponding client, via step 1112.
[0085] Fig. 12 shows the communication flow of Connection from the PCVS VPN Utility to the PMG VPN Utility and the connection between a PCVS Device Client and a PMG Device Client on a private LAN in accordance with the present invention. The PMG VPN Utility first connects to PCVS VPN Utility using PCVS Server Credentials via WAN, via step 1200. The PCVS _VPN Utility accepts PCVS Server Credentials from PMG VPN Utility via WAN, via step 1210. Next, the PCVS VPN Utility sends to PMG VPN Utility further connection or update info, if necessary, via step 1211 and 1241. The PMG_VPN Utility then receives from PCVS VPN Utility further connection or update info, if necessary, via step 1201. Next, the PCVS VPN Utility calls back PMG VPN Utility to enable a first VPN channel, via steps 1212 and 1242. Then, the PMG_VPN Utility connects to PCVS VPN Utility to enable a third VPN channel, via step 1202. Next, the PMG_VPN Utility connects to PCVS VPN Utility to establish a first VPN tunnel from PMG VPN Utility to PCVS VPN Utility, via steps 1203 and 1243. Then, the PCVS VPN Utility establishes a third VPN tunnel from PCVS VPN Utility to PMG VPN Utility, via step 1213. Next, the PCVS VPN Utility waits for a second VPN tunnel on demand to be established from PCVS Device Client to PCVS VPN Utility, via step 1215. Then, the PCVS VPN Utility establishes a second VPN tunnel on demand from PCVS Device Client to PCVS VPN Utility, via steps 1216 and 1246. Next, the PMG VPN Utility waits for a second VPN tunnel on demand to be established from PCVS Device Client to PCVS VPN Utility, via step 1205. Then, the PMG VPN Utility establishes P29 communication channel from PCVS Device Client to PMG VPN Utility, via steps 1208 and 1248. Then, the PCVS VPN Utility establishes 929 communication channel from PCVS Device Client to PMG VPN Utility, via step 1218. After this point, the second VPN tunnel on demand and the third VPN tunnel on demand are channeled in Lo a single VPN Lurixiel bebweexi PCVS Device ClienL and PMG VPN Utility. The PCVS Device Client can then start private and secure connection to at leas:, one PMG Device Client, or the PMG Network Service (not shown) on the private PMG LAN, or another PCVS Device Client (not shown) on the public cloud in the Internet, after the third VPN tunnel on demand and the second VPN tunnel on demand are channeled into a single VPN tunnel between PCVS Device Client and PMG VPN Utility, via step 1231.
[0086] Compared with the third embodiment, the first embodiment has the benefits of a true connection on demand mechanism between the PCVS Device Client and the PCVS VPN Utility via the second VPN tunnel on demand; and between the PCVS VPN Utility and the PMG _VPN Utility, and ultimately to the PMG device clients, via the third VPN tunnel on demand. On the surface, it appears to he more secure than the third embodiment. But due to the commonality of applying the second VPN tunnel on demand, both in the first embodiment and the third embodiment, the final single VPN channel in both embodiments are as secure from the nature of the VPN connection mechanism. The first embodiment can offer a true on demand VPN connection due to its complexity in applying a third VPN tunnel on demand, which is to combine with the second VPN tunnel on demand to channel into a single VPN channel between the PCVS Device Client and the PMG VPN Utility, and ultimately to the PMG device clients. Its architecture is more complex by utilizing three VPN tunnels, instead of two VPN tunnels in the third embodiment. The first embodiment does not require the third VPN tunnel to be on all the time, or to have to keep it alive all the time. It is therefore consuming less energy in the nature of the on-demand connection mechanism. It may appear that by doing so, it is more secure from the on-demand nature of the third VPN tunnel. But the fact is that the connection mechanism from the second VPN tunnel on demand has more than addressed the security concern in the ultimate single VPN channel between the PCVS Device Client and the PMG VPN Utility. In terms of connection simplicity, efficiency, and security, the third embodiment is therefore a preferred embodiment.
[0087] Fig. 13 shows the communication flow of the Private Cloud VPN Server by PCVS Device Client in accordance with the present invention. From the PCVS Device Client standpoint, the PCVS Device Utility is open from the WAN, via step 1300. Next, the PCVS Device Client registers with the PCVS Device Utility with PCVS Client Credentials including PCVS Client Profile and PCVS Client Login, via step 1301.
Next, it starts P2P negotiation using PCVS Client Credentials to communicate with PCVS VPN Utility, via steps 1302 and 1341. The corresponding PCVS Device Utility also starts P2P negotiation using PCVS Client Credentials to communicate with PCVS Device Client, via step 1311. Next, a VPN tunnel between PCVS Device Client and the PCVSD VPN Utility is established, via steps 1303, 1312, and 1342. The PCVS Device Client then starts secure P2P communication with PCVS VPN Utility, via steps 1304 and 1343. On the side of PCVS Device Utility, it passes control to PCVS VPN Utility, via step 1313.
[0088] Fig. 14 shows the communication flow of a third embodiment of Connection from the PCVS VPN Utility to the PMG VPN Utility and the connection between a PCVS Device Client and a PMG Device Client on a private LAN in accordance with the present invention. The PMG_VPN Utility first connects to PCVS VPN Utility using PCVS Server Credentials via WAN, via step 1400. The PCVS VPN Utility accepts PCVS Server Credentials from PMG VPN Utility via WAN, via step 1410. Next, the PCVS VPN Utility sends to PMG VPN Utility further connection or update info, if necessary, via steps 1411 and 1441. The PMG VPN Utility then receives from PCVS VPN Utility further connection or update info, if necessary, via step 1401. Next, the PCVS VPN Utility calls back PMG VPN Utility to enable a first VPN channel, via steps 1412 and 1442. Next, the PMG VPN Utility connects to PCVS VPN Utility to establish a first VPN tunnel from PMG VPN Utility to PCVS VPN Utility, via steps 1403 and 1442. Next, the PCVS VPN Utility waits for the second VPN tunnel to be established from PCVS Device Client to PCVS VPN Utility, via step 1415. Then, the PCVS VPN Utility establishes a second VPN tunnel on demand from PCVS Device Client Lc PCVS VPN ULiliLy, via sLeps 1416 and 1446. NexL, Lhe PMG VPN Utility waits for the second VPN tunnel to be established from PCVS Device Client to PCVS VPN Utility, via step 1405. Then, the PMG VPN Utility establishes P2P communication channel from PCVS Device Client to PMG VPN Utility, via step 1408, 1418 and 1448. After this point, the second VPN tunnel and the first VPN tunnel are channeled into a single VPN tunnel between PCVS Device Client and PMG_VPN Utility. The PCVS Device Client can then start private and secure connection to at least one PMG Device Client, or the PMG Network Service (not shown) on the private pmc. LAN, or another PCVS Device Client (not shown) on the public cloud in the Internet, after the second VPN tunnel on demand and the first VPN tunnel are channeled into a single VPN tunnel between PCVS Device Client and PMG_VPN Utility, via step 1431.
[0089] Fig. 15 the communication flow of conducting a LAN mode secure chat between Host User-1 and Invitee User-2 through their Endpoint devices in accordance with the present invention. As shown in Fig.9, User-1 has at its disposal of the Endpoint devices: a VR goggle 961, a smart phone 963, a Tesla dashboard 964, and a pair of AR glasses 965; while User-2 has at its disposal of the Endpoint devices: a VR goggle 951, a smart phone 953, a Tesla dashboard 954, and a pair of AR glasses 955. In order to initiate a secure chat, it takes a Host and an Invitee as a guest. Anyone can be a host or an invitee. In Fig. 15, it assumes that User-1 is the Host User-1, while User-2 is the Invitee User-2. First, the Host User-1 sends the client credentials 1300 to the Invitee User-2 1500, 1540. The Invitee User-2 then receives the client credentials 1510. The Host User-1 then signs in the Secure Chat Portal 930 with the client credentials 1501. The Invitee User-2 in turn signs in the Secure Chat Portal 930 with the client credentials 1511. Afterwards, both the Host User-1 and the Invitee User-2 establish peer-to-peer communication channel between them through 1304, 1502, 1512, and 1541. The Host User-1 then launches the LAN mode Secure Chat app 1503, creates a chat instance 1504, and starts a secure chatroom on the Virtual Private Metaverse-1 950 with Lhe generaLed chalroom credenlials including a chalroom ID and a chatroom passcode 1505. The Host User-1 then sends the chatroom credentials to the Invitee User-2 through one of other means of communication channel such as email 1506, 1542. In the meantime, the Invitee User-2 was waiting for the chatroom credentials 1513. Once the chatroom credentials are received 1514, the Invitee User-2 launches the LAN mode Secure Chat app 1515. It then searches and locates the chatroom with the acquired chatroom ID 1516. The Invitee User-2 then sign in the secure chatroom with the acquired chatroom passcode 1517, 1543. The Host User-1 in turn authenticates the Invitee User-2 chatroom credentials 1507, 1544 and starts the LAN mode secure chat 1508. Once the Invitee User-2 is authenticated 1518, it starts the LAN mode Secure Chat 1519 and is able to chat with the Host User-1 1545. Both the Host User-1 and the Invitee user-2 continue the secure chat session until it closes due to exit or time expiration 1509, 1520.
[0090] Compared with the first embodiment, the third embodiment has the benefits of a simpler architecture by utilizing only two VPN tunnels, instead of three VPN tunnels from the first embodiment. But the third embodiment requires the first VPN tunnel to be on all the time, or at least to have to keep alive all the time. It may appear that by doing so, it is less secure from the always-on nature of the first VPN tunnel. But the fact is that the connection mechanism from the second VPN tunnel on demand has more than addressed the security concern in the ultimate single VPN channel between PCVS Device Client and PMG VPN Utility. In terms of connection simplicity, efficiency, and security, the third embodiment is therefore a preferred embodiment. The second embodiment is a functional representation of the third embodiment. The fourth embodiment is a special case configuration of the second embodiment, while the at least one PM along with PMG and the at least one PMG smart device client or network service reside in the same hyperscale data center as with VMS located on a public cloud network, or in a hyperscale data center located on a public cloud network, instead of in the client's remote premises, locaLedona public cloud neLwork. The fifLhembodimenL is yeLanoLher expansion of the fourth embodiment deployed under server farm and computer resources aggregation. The sixth embodiment is an actual implementation of the fourth embodiment to address the application of the secure chatroom and realize non-trackable and non-monitorable chat session between the at least two users through their Endpoint devices on the cloud, while the at least one PM along with PMG and the at least one PMG smart device client or network service reside in the same hyperscale data center as with VMS located on a public cloud network, or in a hyperscale data center located on a public cloud network, instead of in the client's remote premises, located on a public cloud network.
[0091] Most of the content providers, such as Netflix, HBO, Amazon, Pandora, and others, enforce a mechanism called geo-hlocking to enforce their exclusive digital territorial rights. In contrast, geo-home is a mechanism for allowing access to the online content at home, while geo-portal is a mechanism for allowing access to the online content at the portal. Although the legality of the enforcement of geo-blocking is controversial and is interpreted differently from regions to regions, some of the international travelers employ VPN relay services to circumvent IP-based geo-blocks, in order to access home or foreign based online content that are not available from outside the country they are in. The downside of this practice, other than legality, is that it involves additional subscription to the VPN service and the limited selections by choosing either geo-home or geo-portal. The present invention provides a mechanism for the platform owner to dynamically configure PCVS on demand to flexibly offer to the users on the choices among geo-blocking, geo-portal, or geo-home in accessing the on-line content, in addition to the original features in allowing the private and secure access to the PMG device clients and network services in the private LAN from anywhere in the cloud through Internet.
[0092] Although the present invention has been described in accordance wiLh Lhe ambodimenLs shown, one of ordinary skill in Lhe art will readily recognize that there could be variations to the eMbodiments and those variations would be within the spirit and scope of the present invention. Accordingly, many modifications may be made by one of ordinary skill in the art without departing from the spirit and scope of the appended claims.
[0093] Those skilled in the art will readily observe that numerous modifications and alterations of the device and method may be made while retaining the teachings of the invention. Accordingly, the above disclosure should be construed as limited only by the metes and bounds of the appended claims.
[0094] Those skilled in the art will readily observe that numerous modifications and alterations of the device and method may he made while retaining the teachings of the invention. Accordingly, the above disclosure should be construed as limited only by the metes and bounds of the appended claims.

Claims (23)

  1. Claims What is claimed is: 1. A method for establishing a secure chat in a public cloud network, the public cloud network comprising a plurality of internet ecosystems each comprising a secure chat portal (SCP), N virtual machine servers (VMS) linked to the SCP, and N virtual private metaverses (VPM) each including a virtual local area network (LAN) router linked to a corresponding VMS, and a LAN mode secure chatroom linked to the virtual LAN router, the method comprising: a host sending a client credential to the at least one invitee through a VMS of the N virtual machine servers; the host and the at least one invitee signing in with the client credential to the SCP; establishing a peer-to-peer (P2P) communication channel between the host and the at least one invitee through the SCP; the host launching a secure chat application; the host starting the LAN mode secure chatroom with a chatroom credential of the LAN mode secure chatroom; the host sending the chatroom credential to the at least one invitee; the at least one invitee launching a secure chat application; the at least one invitee signing in the LAN mode secure chatroom with the chatroom credential; and the host authenticating the at least one invitee with the chatroom credential; wherein N is a natural number.
  2. 2. The meLhod of claim 1 wherein Lhe chaLroom credenLial comprises chatroom identification and chatroom passcode.
  3. 3. The method of claim 1 further comprising the at least one invitee locating the LAN mode secure chatroom with the chatroom credential.
  4. 4. The method of claim 1 further comprising starting the secure chat in the LAN mode secure chatroom-
  5. 5. Themethodof claim 1 further comprising starting the secure chat applications in text, audio, video, file sharing, screen sharing, storage access, and crypto currency transaction.
  6. 6. The method of claim I wherein no registration is required for users to either host or join the secure chatroom.
  7. 7. The method of claim 1 further comprising the host creating a chat server instance.
  8. 8. The method of claim 1 wherein the N virtual machine servers each comprise a private cloud virtual private network (VPN) server (PCVS).
  9. 9. A public cloud network comprising: a host; at least one invitee; a public cloud comprising an internet ecosystem comprising: at least one secure chat portal (SCP) linked to the host and the at least one invitee; at least one virtual machine servers (VMS) linked to the SCP, the host and the at least one invitee; and at least one virtual private metaverse (VPM) comprising: at least one virtual local area network (LAN) router linked to the VMS; and aL leasL one LAN mode secure chaLroom linked Lo Lhe virtual LAN router; wherein the host sends a client credential to the at least one invitee through the VMS, the host and the at least one invitee sign in with the client credential to the SCP, a peer-to-peer (929) communication channel is established between the host and the at least one invitee through the SCP, the host launches a secure chat application, the host starts the LAN mode secure chatroom with a chatroom credential of the LAN mode secure chatroom, the host sends the chatroom credential to the at least one invitee, the at least one invitee launches a secure chat application, the at least one invitee signs in the LAN mode secure chatroom with the chatroom credential, and the host authenticates the at least one invitee with the chatroom credential.
  10. 10. The public cloud network of claim 9 wherein the VPM further comprises a virtual teleporter linked to the virtual LAN router.
  11. 11. The public cloud network of claim 9 wherein the VPM further comprises a virtual private matter gateway linked to the virtual LAN router.
  12. 12. The public cloud network of claim 9 wherein the host is a virtual reality (VR) goggle, a smartphone, a vehicle dashboard, and a pair of augmented reality (AR) glasses.
  13. 13. The public cloud network of claim 9 wherein the invitee is a virtual reality (VR) goggle, a smartphone, a vehicle dashboard, and a pair of augmented reality (AR) glasses.
  14. 14. The public cloud network of claim 9 wherein the chatroom credential comprises chatroom identification and chatroom passcode.
  15. 15. The public cloud network of claim 9 wherein the at least one inviLee locaLes Lhe LAN mode secure chaLroom wiLh Lhe chaLroom credential.
  16. 16. The public cloud network of claim 9 wherein a secure chat is initiated in the LAN mode secure chatroom through the virtual private matter gateway and the virtual teleporter.
  17. 17. The public cloud network of claim 9 wherein a secure chat comprises applications in text, audio, video, file sharing, screen sharing, storage access, and crypto currency transaction.
  18. 18. The public cloud network of claim 9 wherein no registration is required for users to either host or join the secure chatroom.
  19. 19. The public cloud network of claim 9 wherein the host creates a chat server instance.
  20. 20. The public cloud network of claim 9 wherein the VMS comprises a private cloud virtual private network (VPN) server (PCVS).
  21. 21. A non-transitory computer-readable medium storing executable instructions that, in response to execution, cause a computer to perform operations comprising: setting up a public cloud network comprising a plurality of internet ecosystems each comprising a secure chat portal (SCP), N virtual machine servers (VMS) linked to the SOP, and N virtual private metaverses (VPM) each including a virtual local area network (LAN) router linked to a corresponding VMS, and a LAN mode secure chatroom linked to the virtual LAN router; a host sending a client credential to at least one invitee through a VMS of the N virtual machine servers; the host and the at least one invitee signing in with the client credential to the SOP; esLablishing a peer-Lo-peer (P2P) conununicaLion channel beLween the host and the at least one invitee through the SOP; the host launching a secure chat application; the host starting the LAN mode secure chatroom with a chatroom credential of the LAN mode secure chatroom; the host sending the chatroom credential to the at least one invitee; the at least one invitee launching a secure chat application; the at least one invitee signing in the LAN mode secure chatroom with the chatroom credential; and the host authenticating the at least one invitee with the chatroom credential; wherein N is a natural number.
  22. 22. The non-transitory computer-readable medium of claim 21 wherein the chatroom credential comprises chatroom identification and chatroom passcode.
  23. 23. The non-transitory computer-readable medium of claim 21 wherein the N virtual machine servers each comprise a private cloud virtual private network (VPN) server (PCVS).
GB2305950.4A 2022-05-04 2023-04-24 Private and secure chat connection mechanism for use in a private communication architecture Active GB2619808B (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US17/736,103 US20220385638A1 (en) 2011-09-09 2022-05-04 Private Matter Gateway Connection Mechanism for Use in a Private Communication Architecture
US17/992,945 US20230083939A1 (en) 2011-09-09 2022-11-23 Private Matter Gateway Connection Mechanism for Use in a Private Communication Architecture
US18/134,576 US20230254292A1 (en) 2011-09-09 2023-04-14 Private and Secure Chat Connection Mechanism for Use in a Private Communication Architecture

Publications (3)

Publication Number Publication Date
GB202305950D0 GB202305950D0 (en) 2023-06-07
GB2619808A true GB2619808A (en) 2023-12-20
GB2619808B GB2619808B (en) 2024-10-02

Family

ID=86605516

Family Applications (1)

Application Number Title Priority Date Filing Date
GB2305950.4A Active GB2619808B (en) 2022-05-04 2023-04-24 Private and secure chat connection mechanism for use in a private communication architecture

Country Status (2)

Country Link
GB (1) GB2619808B (en)
TW (1) TWI836974B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180019981A1 (en) * 2015-12-18 2018-01-18 Wickr Inc. Decentralized Authoritative Messaging
KR20210015570A (en) * 2019-07-31 2021-02-10 (주)팍스넷 Techniques for sharing chat room

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6750881B1 (en) * 1997-02-24 2004-06-15 America Online, Inc. User definable on-line co-user lists
TWI632465B (en) * 2015-03-19 2018-08-11 美商金士頓數位股份有限公司 Method for use with a public cloud network, private cloud routing server and smart device client

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180019981A1 (en) * 2015-12-18 2018-01-18 Wickr Inc. Decentralized Authoritative Messaging
KR20210015570A (en) * 2019-07-31 2021-02-10 (주)팍스넷 Techniques for sharing chat room

Also Published As

Publication number Publication date
GB202305950D0 (en) 2023-06-07
GB2619808B (en) 2024-10-02
TWI836974B (en) 2024-03-21
TW202345559A (en) 2023-11-16

Similar Documents

Publication Publication Date Title
US11356417B2 (en) Private cloud routing server connection mechanism for use in a private communication architecture
US20230254292A1 (en) Private and Secure Chat Connection Mechanism for Use in a Private Communication Architecture
US10305856B2 (en) System and method for logging communications
US11863529B2 (en) Private cloud routing server connection mechanism for use in a private communication architecture
US9781087B2 (en) Private and secure communication architecture without utilizing a public cloud based routing server
US9246872B2 (en) Methods and arrangements for enabling data transmission between a mobile device and a static destination address
US20140359704A1 (en) Private cloud routing server, private network service and smart device client architecture without utilizing a public cloud based routing server
US20220329569A1 (en) Metaverse Application Gateway Connection Mechanism for Use in a Private Communication Architecture
US11509629B2 (en) Securing access to network devices utilizing two factor authentication and dynamically generated temporary firewall rules
US9935930B2 (en) Private and secure communication architecture without utilizing a public cloud based routing server
TWI574164B (en) Private cloud routing server connection mechanism for use in a private communication architecture
US20220385638A1 (en) Private Matter Gateway Connection Mechanism for Use in a Private Communication Architecture
US11683292B2 (en) Private cloud routing server connection mechanism for use in a private communication architecture
GB2528997A (en) Private cloud routing server, private network service and smart device client architecture without utilizing a public cloud based routing server
GB2607362A (en) Private cloud routing server connection mechanism for use in a private communication architecture
GB2619808A (en) Private and secure chat connection mechanism for use in a private communication architecture
US20230083939A1 (en) Private Matter Gateway Connection Mechanism for Use in a Private Communication Architecture
CA2838356A1 (en) Remote vpn provisioning of an endpoint
GB2618407A (en) Private matter gateway connection mechanism for use in a private communication architecture
GB2618402A (en) Metaverse application gateway connection mechanism for use in a private communication architecture
CN117014435A (en) Private secure chat join mechanism for private communication architecture
TWI769965B (en) Connection method and computer-readable medium for use in a private communication architecture
CN117014177A (en) Meta universe application gateway linking mechanism for private communication architecture
CN117014251A (en) Private substance gateway linking mechanism for private communication architecture
GB2532831A (en) Private cloud routing server connection mechanism for use in a private communication architecture