Home automation system including encrypted device connection based upon publicly accessible connection file and related methods
First Claim
1. A home automation (HA) system comprising:
- a plurality of addressable HA devices that are not publicly accessible via the Internet and each having a unique device identifier (ID) and a unique last cloud session ID associated therewith;
a remote user device configured to generate a connection request to communicate with a given addressable HA device; and
a cloud server configured tocooperate with said remote user device to generate a device-specific connection file based upon the connection request and a hash of the unique device ID and the unique last cloud session ID, andstore the device-specific connection file so that the device-specific connection file is publicly accessible via the Internet, the device-specific connection file comprising instructions for establishing an encrypted on-demand tunneling connection to the given addressable HA device for operation of the given addressable HA device, the encrypted on-demand tunneling connection comprising first and second encrypted connections;
said given addressable HA device being configured to retrieve the device-specific connection file, and establish the first encrypted connection with said cloud server;
said cloud server configured to cooperate with said remote user device to establish the second encrypted connection therewith based upon the first encrypted connection.
2 Assignments
0 Petitions
Accused Products
Abstract
A home automation (HA) system may include addressable HA devices that are not publicly accessible via the Internet and a remote user device configured to generate a connection request to communicate with a given addressable HA device. The HA system may also include a cloud server configured to cooperate with the remote user device to generate a connection file based upon the connection request, and store the connection file so that the connection file is publicly accessible via the Internet. The connection file may include instructions for establishing an encrypted connection to the given addressable HA device. The given addressable HA device may be configured to retrieve the connection file and establish the encrypted connection with the remote user device via the cloud server.
-
Citations
17 Claims
-
1. A home automation (HA) system comprising:
-
a plurality of addressable HA devices that are not publicly accessible via the Internet and each having a unique device identifier (ID) and a unique last cloud session ID associated therewith; a remote user device configured to generate a connection request to communicate with a given addressable HA device; and a cloud server configured to cooperate with said remote user device to generate a device-specific connection file based upon the connection request and a hash of the unique device ID and the unique last cloud session ID, and store the device-specific connection file so that the device-specific connection file is publicly accessible via the Internet, the device-specific connection file comprising instructions for establishing an encrypted on-demand tunneling connection to the given addressable HA device for operation of the given addressable HA device, the encrypted on-demand tunneling connection comprising first and second encrypted connections; said given addressable HA device being configured to retrieve the device-specific connection file, and establish the first encrypted connection with said cloud server; said cloud server configured to cooperate with said remote user device to establish the second encrypted connection therewith based upon the first encrypted connection. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A cloud server for a home automation (HA) system comprising a plurality of addressable HA devices that are not publicly accessible via the Internet and each having a unique device identifier (ID) and a unique last cloud session ID associated therewith, and a remote user device configured to generate a connection request to communicate with a given addressable HA device, the cloud server comprising:
a processor and a memory coupled thereto and configured to cooperate with the remote user device to generate a device-specific connection file based upon the connection request and a hash of the unique device ID and the unique last cloud session ID, store the device-specific connection file so that the device-specific connection file is publicly accessible via the Internet, the device-specific connection file comprising instructions for establishing an encrypted on-demand tunneling connection to the given addressable HA device for operation of the given addressable HA device so that the given addressable HA device establishes a first encrypted connection of the encrypted on-demand tunneling connection with the cloud server upon retrieval of the device-specific connection file, and cooperate with the remote user device to establish a second encrypted connection of the encrypted on-demand tunneling connection with the remote user device based upon the first encrypted connection. - View Dependent Claims (8, 9)
-
10. A method of establishing an encrypted on-demand tunneling connection with a given one of a plurality of addressable home automation (HA) devices in an HA system, the plurality of addressable HA devices not being publicly accessible via the Internet and each having a unique device identifier (ID) and a unique last cloud session ID associated therewith, the HA system comprising a remote user device configured to generate a connection request to communicate with the given addressable HA device, the method comprising:
using a cloud server of the HA system to cooperate with the remote user device to generate a device-specific connection file based upon the connection request and a hash of the unique device ID and the unique last cloud session ID, store the device-specific connection file so that the device-specific connection file is publicly accessible via the Internet, the device-specific connection file comprising instructions for establishing the encrypted on-demand tunneling connection to the given addressable HA device for operation of the given addressable HA device so that the given addressable HA device establishes a first encrypted connection of the encrypted on-demand tunneling connection with the cloud server upon retrieval of the device-specific connection file, and cooperate with the remote user device to establish a second encrypted connection of the encrypted on-demand tunneling connection with the remote user device based upon the first encrypted connection. - View Dependent Claims (11, 12, 13)
-
14. A non-transitory computer readable medium comprising computer executable instructions that when executed by a processor of a cloud server of a home automation (HA) system, cause the cloud server to perform operations for establishing an encrypted on-demand tunneling connection with a given one of a plurality of addressable HA devices in an HA system, the plurality of addressable HA devices not being publicly accessible via the Internet and each having a unique device identifier (ID) and a unique last cloud session ID associated therewith, the HA system comprising a remote user device configured to generate a connection request to communicate with the given addressable HA device, the operations comprising:
-
cooperating with the remote user device to generate a device-specific connection file based upon the connection request and a hash of the unique device ID and the unique last cloud session ID; and storing the device-specific connection file so that the device-specific connection file is publicly accessible via the Internet, the device-specific connection file comprising instructions for establishing the encrypted on-demand tunneling connection to the given addressable HA device for operation of the given addressable HA device so that the given addressable HA device establishes a first encrypted connection of the encrypted on-demand tunneling connection with the cloud server upon retrieval of the device-specific connection file; and cooperating with the remote user device to establish a second encrypted connection of the encrypted on-demand tunneling connection with the remote user device based upon the first encrypted connection. - View Dependent Claims (15, 16, 17)
-
Specification