Latest:

LongTooth™ Introduction

LongTooth™ is a kind of Internet secured direct communication technology which provides bi-directional multi-channel between services by means of service response at the application layer, which establishes multiple non-blocking tunnels in a single TCP/UDP connection, and each tunnel can have a different destination and communicates in form of data stream.

LongTooth™ is a distributed IoT communication technology. In the near future, with the empowerment of technologies such as blockchain, a global decentralized and efficient service interaction network will be formed. Services can be exchanged directly through a bi-directional communication tunnel at the application layer, where either end can be people or object.

The fifth generation LongTooth™ supports a system running environment including Android, iOS, Linux, etc.; the running memory takes up <15K, and it occupies very little resources and can be run on the low-end device/chip; through the way of LTID + service name, it breaks the barrier brought by system and network, so that the service is ubiquitous, and the user does not have to care about the system characteristics and network characteristics of service at all.



Advantages of LongTooth™

Developers define the ways of security
•Access security:LongTooth™ provides a distributed communication tunnel, and does not impose any requirements or restrictions on the application encryption itself, and the application end can perform self-decided encryption according to actual needs.
•Data security:The login account information of device user is stored locally, which is safe and reliable. The LongTooth exchange platform does not actively collect and store user data, which is safe and controllable.
•Network security: When LongTooth™ provides an exchange service, LongTooth™ ID is used to establish a communication tunnel, and the IP addresses of communication parties are shielded, which thereby avoids network security issues caused by exposure of IP addresses.
Rapid Deployment
•Global Service:LongTooth™ service exchange nodes have been distributed all over Mainland China, Taiwan, Japan, Hong Kong, the Middle East, Europe, North America, etc., and the new service exchange node can be online in 2 hours, which basically realizes that LongTooth™ service can be provided in any place where there is a network, and provides a full line of support from product solutions to product production...
•Service-oriented: Through the way of LTID + service name, it breaks the barrier brought by system and network, so that the service is ubiquitous, and the user does not have to care about the system characteristics and network characteristics of service at all. Especially in the industrial environment, the lightweight/efficient service exchange mode of LongTooth can help the enterprise to be freed from the integration dilemma of multi-platform, multi-system and complex interface, and integrates all the links of the enterprise in a service-oriented manner, and the service deployment is more efficient.
GDPR Compliance
LongTooth™ team has begun to design LongTooth™ 5.0 products as required by the GDPR-related regulations since it was just passed by European Union in 2016. LongTooth™ distributed IoT communication technology will eliminate the hidden danger of data leakage from the source. In the process of IoT service interaction, there is no situation that leaks user data, and the service is delivered directly from end to end, and all data is stored locally at the user’s. It can be explained in the following aspects:
•Minimize data collection (zero data collection),LongTooth™ exchange platform does not actively collect and store user data, and is safe and controllable
•The triple security mechanism of access security, data security and network securityprotect IoT enterprises.
LongTooth™ Application Case
Providing IoT customers with low-cost distributed IoT communication solutions that enable low-cost, fast deployment and global coverage to help companies achieve differentiated global services

Smart Lighting

No third-party platform is required to forward remote instructions, and such instruction is directly from user end to device end while data collection can be easily negotiable with the user any time according to actual needs and without third party participation.

Smart Lighting

No third-party platform is required to forward remote instructions, and such instruction is directly from user end to device end while data collection can be easily negotiable with the user any time according to actual needs and without third party participation.

Smart Home Appliance

No third-party platform is required to forward remote instructions, and such instruction is directly from user end to device end while data collection can be easily negotiable with the user any time according to actual needs and without third party participation.

Smart Home Appliance

No third-party platform is required to forward remote instructions, and such instruction is directly from user end to device end while data collection can be easily negotiable with the user any time according to actual needs and without third party participation.

Security System

The distributed IoT communication ensures that the security information is delivered directly end-to-end without passing through the intermediate platform, which is efficient and safe and realizes low-cost and fast deployment.

Security System

The distributed IoT communication ensures that the security information is delivered directly end-to-end without passing through the intermediate platform, which is efficient and safe and realizes low-cost and fast deployment.

Private Cloud

The distributed IoT communication enable the traditional mobile hard disk end-to-end communication capability, and as long as there is a network, it can be used anytime, anywhere to realize a plug-and-play personal private cloud.

Private Cloud

The distributed IoT communication enable the traditional mobile hard disk end-to-end communication capability, and as long as there is a network, it can be used anytime, anywhere to realize a plug-and-play personal private cloud.

Personal Health Care

With LongTooth™ technology, IP address is hidden during communication and LongTooth™ ID is used without any user privacy data association. Therefore the service can be directly delivered to the user end-to-end securely...

Personal Health Care

With LongTooth™ technology, IP address is hidden during communication and LongTooth™ ID is used without any user privacy data association. Therefore the service can be directly delivered to the user end-to-end securely, and the user data can also be delivered end-to-end according to the self-negotiation between two parties, which is safe and confidential.

Creative Product

LongTooth™ enable service delivery directly to the user without a cloud platform, so that each hardware/application can be a cloudlet (small cloud). Without the limitations byintermediate cloud platform, the design and development of hardware/application can become more flexible and imaginative...

Creative Product

LongTooth™ enable service delivery directly to the user without a cloud platform, so that each hardware/application can be a cloudlet (small cloud). Without the limitations byintermediate cloud platform, the design and development of hardware/application can become more flexible and imaginative, which truly reflects the differentiation advantages of the product. The experiment can now become the product, which shortens the product development cycle and reduces the research and development cost.

LongTooth™ Total Industry Solution Demo

LongTooth™ offers a total solution including a product-grade APP, a communication module, a product design circuit diagram, etc.

Copyright © 2019 North 22 Solutions Ltd. All Rights Reserved《People's Republic of China value-added telecommunications business license》Shanghai ICP Ref. No.07009032