SlideShare a Scribd company logo
1 of 8
Download to read offline
Architecture




Architecture Technical Overview   1
Personal Zone
Basic concepts already exist:

• In a local network, devices often trust each other
  implicitly (UPnP/DLNA is quite explicitly based on this)

• Discovery can be achieved with multicast

• Devices that are registered to the same owner often
  share the same applications / rights / profiles / settings
  (Kindle, Android, iPad/iPod/iPhone)




                     Architecture Technical Overview           2
Personal Zone
               defines Personal Zones:

 Devices belong to Personal Zones
 Discovery is 'local' with a Personal Zones
 Discovery requests originating from outside the Personal
  Zone are mediated
 Devices outside the Personal Zones are firewalled
 The Personal Zone does not need to match the physical
  network
   – mobile phones can be included
     (which are typically not in the same network as home
     electronics)
   – the Personal Zone can include non-IP devices (Bluetooth,
     ZigBee)
 Devices authenticate themselves to the Personal Zone
  (and vice versa)
                       Architecture Technical Overview          3
Webinos Architecture
      PZH - Personal Zone Hub                      PZP - Personal Zone Proxy
        – Resides on Server                           – Resides locally on the           –           TLS – Transport Layer
        – Logical Entity: 1 PZH per                      device                                      Security
           user                                       – Present on every webinos                        Secure/Certified
        – Each PZH server can host                       device                                          connection between
           multiple PZH’s                                                                                webinos components

                          Peter: PZH                                                John: PZH
                          (Personal Zone Hub)                   TLS               (Personal Zone Hub)

                           Security Policy                                         Security Policy
                                          Server / PZH                                                  Server / PZH
                                        (Logical Entity)                                              (Logical Entity)
                                 TLS




                                                                                              TLS
Peter’s Personal Zone                                                                                                    John’s Personal Zone




                        Peter: PZP                                             Peter: PZP
                          Peter: PZP
                             Peter: PZP                                          Peter: PZP
                                                                                     John: PZP
                             (Personal Zone Proxy)                                     (Personal Zone Proxy)
                               Security Policy                                          Security Policy
                                                     Devices                                                      Devices

                                                                          4
Personal Zone Hub
Central to a Personal Zone is the Personal Zone Hub (PZH)

The main task of the PZH are:
 User authentication service
 Session creation for messages and synchronization
 Single-sign on point for web services
 Host for webinos web services
 Master repository for context data
 Central repository of policy rules
 Policy enforcement point for remote communication


                      Architecture Technical Overview       5
Personal Zone Proxy
Every device is associated with a Personal Zone Proxy
  (PZP)
 Routes all 'Internet' messages to PZH
 Routes 'local' messages to other PZPs
 Can perform PZP to PZP communication for optimisation
  reasons
 The PZP acts as a stand-in when devices are
  temporarily not connected to the Internet
 Performs functions of PZH when PZH is not accessible
 PZP is stores various information (context information,
  event messages) until next sync with PZH is possible
 PZP is responsible for discovery of local bearers
  (Bluetooth, ZigBee, NFC)

                    Architecture Technical Overview     6
Device Integration




                         JSON
            Binding




                         Messaging
Device 1
            JSON-RPC
Device 2     Packages




                         JSON

            Binding




            Architecture Technical Overview   7
webinos Device/PZP
Architecture
                                     PZH
                                                                           TLS
Browser/ Widget
Web Runtime                          PZP                                                           Session Manager
                                                               Context Manager               TLS      Authenticatio  HTTPS



                                            Policy Manager
                                                                                                           n
                                                                                             Certificate Manager Key Storage
                              WebSocket                      User      Data      Device


                                                                                     Sync Manager

                                                                               Messaging Manager
                                     RPC                      Error recovery           Routing                  Messaging queue
     webinos API
                                                                RPC Handler/Manager                  Discovery Manager
  APIs
         APIs
                APIs
                       APIs
                              APIs




                                                                                                 Native Discovery
                                                                                                  Mechanisms
                                           Native Device OS

                                                                                 8                    Drivers

More Related Content

Viewers also liked

webinos Security privacy
webinos Security privacywebinos Security privacy
webinos Security privacywebinos project
 
IoT Mashup - Webinos architecture 101 - Baldwin
IoT Mashup - Webinos architecture 101 - BaldwinIoT Mashup - Webinos architecture 101 - Baldwin
IoT Mashup - Webinos architecture 101 - Baldwinwebinos project
 
IoT Mashup - Security for internet connected devices - Lyle
IoT Mashup - Security for internet connected devices - LyleIoT Mashup - Security for internet connected devices - Lyle
IoT Mashup - Security for internet connected devices - Lylewebinos project
 
IoT Mashup - Webinos iot-2013-07-23 Raggett
IoT Mashup - Webinos iot-2013-07-23 RaggettIoT Mashup - Webinos iot-2013-07-23 Raggett
IoT Mashup - Webinos iot-2013-07-23 Raggettwebinos project
 
iotmaship - Webinos iot and m2m - allott
iotmaship - Webinos iot and m2m - allottiotmaship - Webinos iot and m2m - allott
iotmaship - Webinos iot and m2m - allottwebinos project
 
webinos Open Day Introduction
webinos Open Day Introductionwebinos Open Day Introduction
webinos Open Day Introductionwebinos project
 
[Hello world]git internal
[Hello world]git internal[Hello world]git internal
[Hello world]git internalNAVER D2
 

Viewers also liked (10)

webinos Security privacy
webinos Security privacywebinos Security privacy
webinos Security privacy
 
IoT Mashup - Webinos architecture 101 - Baldwin
IoT Mashup - Webinos architecture 101 - BaldwinIoT Mashup - Webinos architecture 101 - Baldwin
IoT Mashup - Webinos architecture 101 - Baldwin
 
webinos APIs
webinos APIswebinos APIs
webinos APIs
 
IoT Mashup - Security for internet connected devices - Lyle
IoT Mashup - Security for internet connected devices - LyleIoT Mashup - Security for internet connected devices - Lyle
IoT Mashup - Security for internet connected devices - Lyle
 
IoT Mashup - Webinos iot-2013-07-23 Raggett
IoT Mashup - Webinos iot-2013-07-23 RaggettIoT Mashup - Webinos iot-2013-07-23 Raggett
IoT Mashup - Webinos iot-2013-07-23 Raggett
 
IoT Mashup - Welcome
IoT Mashup - WelcomeIoT Mashup - Welcome
IoT Mashup - Welcome
 
iotmaship - Webinos iot and m2m - allott
iotmaship - Webinos iot and m2m - allottiotmaship - Webinos iot and m2m - allott
iotmaship - Webinos iot and m2m - allott
 
webinos Open Day Introduction
webinos Open Day Introductionwebinos Open Day Introduction
webinos Open Day Introduction
 
[Hello world]git internal
[Hello world]git internal[Hello world]git internal
[Hello world]git internal
 
Getting Git
Getting GitGetting Git
Getting Git
 

Similar to webinos Architecture Overview

Issues in the Web Application Landscape and webinos Architecture
Issues in the Web Application Landscape and webinos Architecture Issues in the Web Application Landscape and webinos Architecture
Issues in the Web Application Landscape and webinos Architecture webinos project
 
ISSE 2012 Context-enhanced Authorization
ISSE 2012 Context-enhanced AuthorizationISSE 2012 Context-enhanced Authorization
ISSE 2012 Context-enhanced AuthorizationMartijn Oostdijk
 
GTB DLP - Content Aware Security Suite
GTB DLP - Content Aware Security SuiteGTB DLP - Content Aware Security Suite
GTB DLP - Content Aware Security SuiteVCW Security Ltd
 
I Pv6 Cyber Criminal Opportunities 05
I Pv6 Cyber Criminal Opportunities 05I Pv6 Cyber Criminal Opportunities 05
I Pv6 Cyber Criminal Opportunities 05Barry Greene
 
Gtb Product Technical Present
Gtb Product Technical PresentGtb Product Technical Present
Gtb Product Technical Presentgtbsalesindia
 
Standards' Perspective - MPEG DASH overview and related efforts
Standards' Perspective - MPEG DASH overview and related effortsStandards' Perspective - MPEG DASH overview and related efforts
Standards' Perspective - MPEG DASH overview and related effortsIMTC
 
Toorcon Seattle 2011 - Browser Exploit Packs
Toorcon Seattle 2011 - Browser Exploit PacksToorcon Seattle 2011 - Browser Exploit Packs
Toorcon Seattle 2011 - Browser Exploit PacksAditya K Sood
 
PoC Introduction
PoC IntroductionPoC Introduction
PoC Introductionguest3530f
 
Java Abs Packet Sniffer Tool
Java Abs   Packet Sniffer ToolJava Abs   Packet Sniffer Tool
Java Abs Packet Sniffer Toolncct
 
Condroid WSN/DTN Gateway - Verification Rest Report
Condroid WSN/DTN Gateway - Verification Rest ReportCondroid WSN/DTN Gateway - Verification Rest Report
Condroid WSN/DTN Gateway - Verification Rest ReportLaili Aidi
 
SNMP : Simple Network Mediated (Cisco) Pwnage
SNMP : Simple Network Mediated (Cisco) PwnageSNMP : Simple Network Mediated (Cisco) Pwnage
SNMP : Simple Network Mediated (Cisco) PwnageSensePost
 
Ebu mpeg dash-webinar043
Ebu mpeg dash-webinar043Ebu mpeg dash-webinar043
Ebu mpeg dash-webinar043mc_killah
 
Govcert2011 - Context-enhanced Authorization
Govcert2011 - Context-enhanced AuthorizationGovcert2011 - Context-enhanced Authorization
Govcert2011 - Context-enhanced AuthorizationMartijn Oostdijk
 
Hacking Robotics(English Version)
Hacking Robotics(English Version)Hacking Robotics(English Version)
Hacking Robotics(English Version)Kensei Demura
 
IoT with Apache MXNet and Apache NiFi and MiniFi
IoT with Apache MXNet and Apache NiFi and MiniFiIoT with Apache MXNet and Apache NiFi and MiniFi
IoT with Apache MXNet and Apache NiFi and MiniFiDataWorks Summit
 
Apache MXNet for IoT with Apache NiFi
Apache MXNet for IoT with Apache NiFiApache MXNet for IoT with Apache NiFi
Apache MXNet for IoT with Apache NiFiTimothy Spann
 

Similar to webinos Architecture Overview (20)

Issues in the Web Application Landscape and webinos Architecture
Issues in the Web Application Landscape and webinos Architecture Issues in the Web Application Landscape and webinos Architecture
Issues in the Web Application Landscape and webinos Architecture
 
ISSE 2012 Context-enhanced Authorization
ISSE 2012 Context-enhanced AuthorizationISSE 2012 Context-enhanced Authorization
ISSE 2012 Context-enhanced Authorization
 
GTB DLP - Content Aware Security Suite
GTB DLP - Content Aware Security SuiteGTB DLP - Content Aware Security Suite
GTB DLP - Content Aware Security Suite
 
I Pv6 Cyber Criminal Opportunities 05
I Pv6 Cyber Criminal Opportunities 05I Pv6 Cyber Criminal Opportunities 05
I Pv6 Cyber Criminal Opportunities 05
 
Gtb Product Technical Present
Gtb Product Technical PresentGtb Product Technical Present
Gtb Product Technical Present
 
Filesystems, RPC and HDFS
Filesystems, RPC and HDFSFilesystems, RPC and HDFS
Filesystems, RPC and HDFS
 
Standards' Perspective - MPEG DASH overview and related efforts
Standards' Perspective - MPEG DASH overview and related effortsStandards' Perspective - MPEG DASH overview and related efforts
Standards' Perspective - MPEG DASH overview and related efforts
 
Toorcon Seattle 2011 - Browser Exploit Packs
Toorcon Seattle 2011 - Browser Exploit PacksToorcon Seattle 2011 - Browser Exploit Packs
Toorcon Seattle 2011 - Browser Exploit Packs
 
PoC Introduction
PoC IntroductionPoC Introduction
PoC Introduction
 
Zenoss seminar
Zenoss seminarZenoss seminar
Zenoss seminar
 
Nos Windows
Nos WindowsNos Windows
Nos Windows
 
Java Abs Packet Sniffer Tool
Java Abs   Packet Sniffer ToolJava Abs   Packet Sniffer Tool
Java Abs Packet Sniffer Tool
 
Condroid WSN/DTN Gateway - Verification Rest Report
Condroid WSN/DTN Gateway - Verification Rest ReportCondroid WSN/DTN Gateway - Verification Rest Report
Condroid WSN/DTN Gateway - Verification Rest Report
 
SNMP : Simple Network Mediated (Cisco) Pwnage
SNMP : Simple Network Mediated (Cisco) PwnageSNMP : Simple Network Mediated (Cisco) Pwnage
SNMP : Simple Network Mediated (Cisco) Pwnage
 
Ebu mpeg dash-webinar043
Ebu mpeg dash-webinar043Ebu mpeg dash-webinar043
Ebu mpeg dash-webinar043
 
Govcert2011 - Context-enhanced Authorization
Govcert2011 - Context-enhanced AuthorizationGovcert2011 - Context-enhanced Authorization
Govcert2011 - Context-enhanced Authorization
 
Hacking Robotics(English Version)
Hacking Robotics(English Version)Hacking Robotics(English Version)
Hacking Robotics(English Version)
 
Xtopia2010 wp7
Xtopia2010 wp7Xtopia2010 wp7
Xtopia2010 wp7
 
IoT with Apache MXNet and Apache NiFi and MiniFi
IoT with Apache MXNet and Apache NiFi and MiniFiIoT with Apache MXNet and Apache NiFi and MiniFi
IoT with Apache MXNet and Apache NiFi and MiniFi
 
Apache MXNet for IoT with Apache NiFi
Apache MXNet for IoT with Apache NiFiApache MXNet for IoT with Apache NiFi
Apache MXNet for IoT with Apache NiFi
 

Recently uploaded

How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsYoss Cohen
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...itnewsafrica
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...amber724300
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sectoritnewsafrica
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Jeffrey Haguewood
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 

Recently uploaded (20)

How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platforms
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 

webinos Architecture Overview

  • 2. Personal Zone Basic concepts already exist: • In a local network, devices often trust each other implicitly (UPnP/DLNA is quite explicitly based on this) • Discovery can be achieved with multicast • Devices that are registered to the same owner often share the same applications / rights / profiles / settings (Kindle, Android, iPad/iPod/iPhone) Architecture Technical Overview 2
  • 3. Personal Zone defines Personal Zones:  Devices belong to Personal Zones  Discovery is 'local' with a Personal Zones  Discovery requests originating from outside the Personal Zone are mediated  Devices outside the Personal Zones are firewalled  The Personal Zone does not need to match the physical network – mobile phones can be included (which are typically not in the same network as home electronics) – the Personal Zone can include non-IP devices (Bluetooth, ZigBee)  Devices authenticate themselves to the Personal Zone (and vice versa) Architecture Technical Overview 3
  • 4. Webinos Architecture  PZH - Personal Zone Hub  PZP - Personal Zone Proxy – Resides on Server – Resides locally on the – TLS – Transport Layer – Logical Entity: 1 PZH per device Security user – Present on every webinos  Secure/Certified – Each PZH server can host device connection between multiple PZH’s webinos components Peter: PZH John: PZH (Personal Zone Hub)  TLS (Personal Zone Hub) Security Policy Security Policy Server / PZH Server / PZH (Logical Entity) (Logical Entity)  TLS  TLS Peter’s Personal Zone John’s Personal Zone Peter: PZP Peter: PZP Peter: PZP Peter: PZP Peter: PZP John: PZP (Personal Zone Proxy) (Personal Zone Proxy) Security Policy Security Policy Devices Devices 4
  • 5. Personal Zone Hub Central to a Personal Zone is the Personal Zone Hub (PZH) The main task of the PZH are:  User authentication service  Session creation for messages and synchronization  Single-sign on point for web services  Host for webinos web services  Master repository for context data  Central repository of policy rules  Policy enforcement point for remote communication Architecture Technical Overview 5
  • 6. Personal Zone Proxy Every device is associated with a Personal Zone Proxy (PZP)  Routes all 'Internet' messages to PZH  Routes 'local' messages to other PZPs  Can perform PZP to PZP communication for optimisation reasons  The PZP acts as a stand-in when devices are temporarily not connected to the Internet  Performs functions of PZH when PZH is not accessible  PZP is stores various information (context information, event messages) until next sync with PZH is possible  PZP is responsible for discovery of local bearers (Bluetooth, ZigBee, NFC) Architecture Technical Overview 6
  • 7. Device Integration JSON Binding Messaging Device 1 JSON-RPC Device 2 Packages JSON Binding Architecture Technical Overview 7
  • 8. webinos Device/PZP Architecture PZH TLS Browser/ Widget Web Runtime PZP Session Manager Context Manager TLS Authenticatio HTTPS Policy Manager n Certificate Manager Key Storage WebSocket User Data Device Sync Manager Messaging Manager RPC Error recovery Routing Messaging queue webinos API RPC Handler/Manager Discovery Manager APIs APIs APIs APIs APIs Native Discovery Mechanisms Native Device OS 8 Drivers