Saturday, May 3, 2014

You can create your own your program algorithms, programming interfaces, Web Services running on LA

Authentication and enter the building automation controllers via TCP / IP @ Home Automation eHouse.Pro
Building Automation System eHouse links and Remote Control of room on Ethernet, WiFi, Internet. Reception Case status of the controllers can get through UDP broadcasts (without permanent connection) or by connecting to the server over TCP / IP. Send control commands controllers is possible only after the TCP / IP which has a higher connection reliability and enhances its securit. Connection eHouse smart home controllers via TCP / IP requires authentication (login) in ensuring the security of the system which includes Lan, Wifi, Internet, Interanet. Home Automation eHouse consists of Ethernet controllers (CommManager, LevelManager, EthernetRoomManager, etc..), Which can be directly connected via an Ethernet network by using TCP / IP. Connection is established on the basis of Berkeley support when using TCP / IP. Each Ethernet controller system eHouse spyshop automation multiple TCP / IP servers to enable the establishment and maintenance spyshop in connection with the application for several independent and control panels. There are several ways to authorize eHouse system over TCP / IP: Authentication Methods in chalange dynamic code - Dynamic response authentication and password encryption functions, and a simple password authentication or open No Authorization Must level security (authentication) are selected in configuration, in each controller. Select a security level implies the activation of a livelihood before safer. System authentication by using chalange - response method spyshop involves receiving a unique code (queries) from the server when the connection initiation by application clients. Then, the application client must calculate the response of the algorithm according to the server (or controller TCP / IP server software). The algorithm is unique for each installation spyshop of the changes in the system and key encryption. The algorithm is also dependent on many parameters such as phone numbers SMS gateway, timestamp, "Vendors / Resale" code. The application client must, within a couple of seconds to give the correct spyshop answer, otherwise the connection is dropped. spyshop Server to receive the data from the client, spyshop the time and compare the difference, spyshop virtually impossible to send the same message again. It also protects spyshop the system against sabotage or other activities of hackers, reject all connections spyshop from unauthorized foreign systems and limited spyshop control spyshop systems from eHouse dedicated applications. The algorithm thus protecting them snifeur Ethernet, packet analyzers, Spy applications, viruses, Trojans. This encryption algorithm is only dedicated native applications eHouse system. It may be available on base license agreement, directly to third party developed software for eHouse automation, and sell Controllers eHouse under their own tribe. It is the safest algorithm in communication with the LAN, Wifi, Internet, etc.. . Dynamic spyshop encryption spyshop and password authentication function minced by a simple algorithm spyshop or is the same as before, but the password is encrypted by the client application and simple character by character or function. Application clients chifre password with constant dynamic code received from the server character by character. Replies are sent to the server as both the request and response in order to check the time stamp. This algorithm is relatively safe in LAN, Wifi, Intranet. This algorithm spyshop does not exclude the algorithm more secure autentication for communication, which may still be used. So it possible to connect from the outside spyshop (the Internet) and a native panel eHouse application method validation system. Open password authentication algorithm similar to the previous, but the password is set in encoded way. The software coupons for repeat customers time and then, send the password in clear text. The time stamp is checked to ignore "smart packages" on the internet by preventing repeat the same package by hackers or by link failures, rtransmisyon, etc.. . Due to the transmission of passwords in clear text is a method not recommended spyshop for outdoor LAN communication is closed and properly secured. When enabled, this method also allows the use of previous methods (more secure). No Waiver spyshop No authentication is a method that allows you to connect to any of the controllers by sending a string controller (13). This method is not recommended for normal operation, and only for testing at the beginning of development, in order to facilitate a quick start and make it easier for developers to test environment eHouse. When enabled, this method also allows the use of all methods before. Using three methods of the past to make it easier for controllers to connect to both the LAN, Wifi, Intranet, Internet, however, because of a simple encryption algorithm recommended limiting secure connection and wireless spyshop LAN.
You can create your own your program algorithms, programming interfaces, Web Services running on LAN and provide services outside of the oven

No comments:

Post a Comment