CN105577636A - Communication network information transmission method and device thereof - Google Patents

Communication network information transmission method and device thereof Download PDF

Info

Publication number
CN105577636A
CN105577636A CN201510508720.3A CN201510508720A CN105577636A CN 105577636 A CN105577636 A CN 105577636A CN 201510508720 A CN201510508720 A CN 201510508720A CN 105577636 A CN105577636 A CN 105577636A
Authority
CN
China
Prior art keywords
key
length
tcp data
worth
data bag
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510508720.3A
Other languages
Chinese (zh)
Inventor
林涛
林兆旭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHANGHAI UNITED-CLOUD COMPUTER SYSTEMS Co Ltd
Original Assignee
SHANGHAI UNITED-CLOUD COMPUTER SYSTEMS Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHANGHAI UNITED-CLOUD COMPUTER SYSTEMS Co Ltd filed Critical SHANGHAI UNITED-CLOUD COMPUTER SYSTEMS Co Ltd
Priority to CN201510508720.3A priority Critical patent/CN105577636A/en
Publication of CN105577636A publication Critical patent/CN105577636A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/22Parsing or analysis of headers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/16Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention relates to the field of communication, and discloses a communication network information transmission method and a device thereof. The transmission method comprises the following steps that a network intermediate node acquires a TCP data packet in the process of receiving and forwarding the TCP data packet; the option fields of the TCP data packet are detected; and if a key-length-value pair of which the key is equal to a preset value exists in the option fields of the TCP data packet, the key-length-value pair is read. Additional information used for the network intermediate node can be conveniently transmitted under the premise of maintaining a present network protocol structure.

Description

The transmission method of information and device thereof in communication network
Technical field
The present invention relates to the communications field, particularly the transmission method of information and device thereof in communication network.
Background technology
Transmission control protocol (TransferControlProtocol is called for short " TCP ") is a kind of conventional procotol.Tcp data bag, from transmitting terminal, through the transmission (as switch, router etc.) of multiple nodes, is delivered to receiving terminal.Tcp data handbag draws together Header (packet header) and (Body) inclusion.Information in Header is mainly used in route, and the information in Body is the actual content that will transmit.Have a field in Header Option (Option Field), Option field comprises one or more key-length-be worth (Key-Length-Value).The key (Key) of key-length-value centering is an identidication key, and long (Length), for the length of the value (Value) after representing, uses for time read value (Value).Read this key-length-when being worth (Key-Length-Value), (Key is regular length can to read Key,), judge whether Key is predetermined value, if it is Length (Length is regular length) is read, reading Value, such as Length according to the Length read again is 9 bytes, and that just reads 7 bytes as Value after Length.Current Transmission Control Protocol is with the Key value through employing a part, and the Key value of another part retains, can for expansion.
The usage of current Option field adds by transmitting terminal the information needing to issue receiving terminal, and each nodes does not deal with Option field, direct transparent transmission.
In network safety filed, sometimes transmission of information between two nodes is needed, such as, Wireless Fidelity (WirelessFidelity, be called for short " WiFi ") WAP (wireless access point) (AccessPoint, be called for short " AP ") when receiving the tcp data bag of a mobile terminal, the MAC Address of this mobile terminal can be known, and according to current communication protocol, the MAC Address of this mobile terminal when this AP forwards this tcp data bag, can not be retained.In order to the needs of network security or network monitoring, nodes (as certain router or server) below needs the MAC Address knowing the transmitting terminal that each tcp data bag is corresponding, can monitor all packets of specific transmitting terminal and analyze.
Present inventor finds, current communication protocol does not support transmission of information between two nodes, if develop new procotol again can not support by a large amount of current existing network equipment, how under the prerequisite maintaining current procotol structure, transmitting the additional information for nodes, is exactly the technical problem that the application will solve.
Summary of the invention
The object of the present invention is to provide transmission method and the device thereof of information in a kind of communication network, can under the prerequisite maintaining current procotol structure, transmission is for the additional information of nodes easily.
For solving the problems of the technologies described above, embodiments of the present invention disclose the transmission method of information in a kind of communication network, comprise the following steps:
Nodes receives and forwards in the process of tcp data bag, obtains this tcp data bag;
Detect the Option Field of this tcp data bag;
If exist in the Option Field of this tcp data bag key equal predetermined value key-length-it is right to be worth, then read that this key-length-it is right to be worth.
Embodiments of the present invention also disclose the transmitting device of information in a kind of communication network, comprising:
Acquiring unit, receives for intermediate node in a network and forwards in the process of tcp data bag, obtain this tcp data bag;
Detecting unit, detects the Option Field of this tcp data bag;
Judging unit, for judge this tcp data bag Option Field in whether exist key equal predetermined value key-length-it is right to be worth;
Reading unit, during for judging that at judging unit there is key equals the key-length-value pair of predetermined value, reads that this key-length-it is right to be worth.
Compared with prior art, the main distinction and effect thereof are embodiment of the present invention:
Whether the Option Field detecting tcp data bag when forwarding tcp data bag by nodes has that specific key-length-it is right to be worth, just read that this key-length-it is right to be worth if had, can maintain current procotol structure prerequisite under, easily transmission for nodes reception and additional information.
Accompanying drawing explanation
Fig. 1 is the schematic flow sheet of the transmission method of information in a kind of communication network in first embodiment of the invention.
Fig. 2 is the structural representation of the transmitting device of information in a kind of communication network in sixth embodiment of the invention.
Embodiment
In the following description, many ins and outs are proposed in order to make reader understand the application better.But, persons of ordinary skill in the art may appreciate that even without these ins and outs with based on the many variations of following execution mode and amendment, also can realize each claim of the application technical scheme required for protection.
For making the object, technical solutions and advantages of the present invention clearly, below in conjunction with accompanying drawing, embodiments of the present invention are described in further detail.
First embodiment of the invention relates to the transmission method of information in a kind of communication network.Fig. 1 is the schematic flow sheet of the transmission method of information in this communication network.
Particularly, as shown in Figure 1, in this communication network, the transmission method of information comprises the following steps:
In a step 101, nodes receives and forwards in the process of tcp data bag, obtains this tcp data bag.
Wherein, in each execution mode of the present invention, nodes refers to that, in the whole tcp data packet transmission path from transmitting terminal to receiving terminal, except transmitting terminal and receiving terminal, in whole transmission path, other plays the network node of tcp data Packet forwarding effect in centre.Nodes can be router, switch, Hub (hub), trunking etc.
After this enter step 102, detect the Option Field of this tcp data bag.
After this enter step 103, judge whether to exist in the Option Field of tcp data bag key equal predetermined value key-length-it is right to be worth.If judged result is yes, then enter step 104; Otherwise, process ends.
In addition, be appreciated that in each execution mode of the present invention, predetermined value is the numeral preset, and has the key-length at the key place of this predetermined value-be worth to being exactly that needs are by the key-length of nodes process-it is right to be worth.Predetermined value can be one, also can be multiple, determines according to the needs of practical application.
At step 104, read that this key-length-it is right to be worth.
After this enter step 105, according to read key-length-it is right to be worth, this tcp data bag is processed.
In addition, be appreciated that the mode processed tcp data bag has a lot, such as, can to having particular key-length-be worth right tcp data bag to preserve.Or obtain information (Header and Body drawn together by tcp data handbag, and Option is in Header) in the Body of this tcp data bag further to having the right tcp data bag of particular key-length-be worth, carry out preserving or further analyzing, etc.Usually can process according to the value in key-length-value, also can process according to the key in key-length-value, such as, if detect that certain key just preserves value in this tcp data bag and Body (body).A little process can directly be undertaken by nodes, also by nodes, tcp data bag can be saved in server, be processed by server.
In some instances, may not step 105 be needed, namely not need, according to read key-length-it is right to be worth, to process this tcp data bag.Such as, in reading this key-length-be worth rear, only may preserve and be worth.
After this process ends.
In a preference, before above-mentioned steps 101 repeating tcp data bag, this method is further comprising the steps of:
If have key to equal predetermined value in the Option Field of this tcp data bag, then first key in the Option Field of this tcp data bag is equaled the key-length of predetermined value-be worth deletion, then send delete this key-length-be worth to after tcp data bag.
In addition, be appreciated that in some specific application scenarios, nodes read a key-length-be worth rear, can delete that this key-length-it is right to be worth before forwarding, also can not delete, directly forward the tcp data bag received.When not deleting, multiple nodes that can realize in a whole transmission path all obtain same key-length-be worth right effect.And before forwarding tcp data bag, by specific key-length-be worth first deleting from tcp data bag, nodes below and final receiving terminal can be prevented in transmitting procedure to obtain these information, there is secret effect.
Certainly, in more situation, carry out storing and analyzing after tcp data wraps in and is replicated in intermediary network device, for the packet be replicated generally do not need to delete key in Option Field equal predetermined value key-length-it is right to be worth.
Whether the present invention detects tcp data bag by nodes Option Field when forwarding tcp data bag has that specific key-length-it is right to be worth, just read that this key-length-it is right to be worth if had, can maintain current procotol structure prerequisite under, easily transmission for nodes reception and additional information.
Second embodiment of the invention relates to the transmission method of information in a kind of communication network.This execution mode is, on the first execution mode, there is improvement on basis, is with the difference of the first execution mode:
Before above-mentioned steps 101, to add at this tcp data bag at first nodes that key-length-it is right to be worth before being arranged in this nodes in the transmission path of this tcp data bag, wherein this key-length-be worth right key is predetermined value, the right value of this key-length-be worth needs to be attached to the information that this tcp data wraps, and the right length of this key-length-be worth is whole key-length-be worth right overall length.Such as, in the transmission path of tcp data bag, have four nodes---node 1 to node 4, node 1 adds before forwarding tcp data bag that key-length-it is right to be worth, node 3 read this tcp data bag key-length-it is right to be worth.
Particularly, below for a specific example:
After Wifi router (i.e. nodes) receives the tcp data bag of transmitting terminal, in Option, add that key-length-it is right to be worth, this key-length-be worth right key is the data preset, as 234, this key-length-be worth the media interviews control (MediaAccessControl that right value is transmitting terminal, be called for short " MAC ") address, packet is transferred to an intermediary network device (such as a network switch or router) by this Wifi router directly or indirectly, this intermediary network device is entered to copy to the packet received in the transmitting procedure of data (such as has the network switch of image copying function to have a mirror port, wherein just can export by the copy of the packet of normal transmission), Option field in copy tcp data bag after copying is read and analyzed.The mode analyzed can have multiple, such as:
The example 1 of analysis mode: whether the content (in Body) first analyzing tcp data bag has the keyword preset, if had, read the Mac address in the Option field of tcp data bag, the content of this tcp data bag is saved in database together with the MAC Address of the transmitting terminal of reading.
The example 2 of analysis mode: read the Mac address in the Option field of tcp data bag, if this MAC Address is in the blacklist preset, then read the content of tcp data bag further, the content of this tcp data bag is saved in database together with the MAC Address of the transmitting terminal of reading.
MAC Address is may not be in Option field, but other terminal iidentification, as cell-phone number etc.
In addition, be appreciated that, in the above example, after Wifi router (i.e. nodes) receives the tcp data bag of transmitting terminal, the value of the key-length-value centering added in Option is the media interviews control (MediaAccessControl of this Wifi router, be called for short " MAC ") address, after any one node access DPI system on network, just can analyze concrete packet from any platform Wifi router device, particularly, if the key arranging Option is 201, the length of Option is 10 bytes, value is c2:1e:45:11:ff:01.Wherein, DPI (detection of depth data bag) technology technology is a kind of flow detection based on application layer and control technology, when IP packet, TCP or UDP message flow through the bandwidth management system based on DPI technology, this system is recombinated to the application layer message in OSI seven layer protocol by the content of deep reading IP payload package, thus obtain the content of whole application program, then according to the management strategy of system definition, shaping operation is carried out to flow.
The relevant technical details mentioned in first execution mode is still effective in the present embodiment, in order to reduce repetition, repeats no more here.Correspondingly, the relevant technical details mentioned in present embodiment also can be applicable in the first execution mode.
Third embodiment of the invention relates to the transmission method of information in a kind of communication network.This execution mode has improvement on the basis of the first execution mode, is with the difference of the first execution mode:
Transmission method in this execution mode is further comprising the steps of before the step 101 of the first execution mode:
Transmitting terminal is before transmission tcp data bag, in this tcp data bag, add that key-length-it is right to be worth, wherein this key-length-be worth right key is predetermined value, and the right value of this key-length-be worth needs to be attached to the information that this tcp data wraps, and the right length of this key-length-be worth is whole key-length-be worth right overall length.
Lift a transmitting terminal below and add Option information, the example read by network intermediate equipment.A kind of encrypted transmission method, transmitting terminal is in the Option field of the multiple tcp data bags sent respectively to multiple destination address, newly-increased one key-length-it is right to be worth, this key-length-be worth right value needs a part for the information of encrypted transmission (such as to have the enciphered message of 30 bytes to send, be placed in 3 tcp data bags respectively, each tcp data bag puts 10 bytes, three different destination addresses issued respectively by these three tcp data bags), the nodes that will pass through at the outgoing tcp data bag of this transmitting terminal is (as the gateway of local area network (LAN), the P etc. of metropolitan area network) when forwarding the tcp data bag from this transmitting terminal, read the enciphered message in Option field.
The nodes that the outgoing tcp data bag of this transmitting terminal will pass through can be a network equipment (namely all tcp data bags of the outgoing of this transmitting terminal inherently pass through this nodes).Also can be the set (i.e. all tcp data bags of the outgoing of this transmitting terminal inherently in multiple specified network intermediate node) of multiple network equipment, now the enciphered message in the Option field that multiple network equipment reads can be gathered and be decrypted.
The relevant technical details mentioned in first execution mode is still effective in the present embodiment, in order to reduce repetition, repeats no more here.Correspondingly, the relevant technical details mentioned in present embodiment also can be applicable in the first execution mode.
Four embodiment of the invention relates to the transmission method of information in a kind of communication network.
4th execution mode is the execution mode that the second execution mode basis is improved, and compared with the second execution mode, difference is:
Above-mentioned " first nodes add in this tcp data bag key-length-be worth to " step in, the right value of this key-length-be worth is at this geographical location information at first nodes.
Such as, the Wifi hotspot device (i.e. nodes) that bus is installed, is accessed terminal by Wifi on the one hand, on the other hand by the network of mobile communications network (as 3G network, 4G network etc.) access mobile operator.When this Wifi hotspot device forwards tcp data bag, the geographic location information at this current place of Wifi hotspot device can be added in the Option of tcp data bag, so that the use in the future to certain mobile terminal tracing analysis.Geographic location information can be global positioning system (GlobalPositionSystem is called for short " GPS ") information, also can be the positional information that the wireless signal strength of the multiple radio signal source by receiving calculates.Such as, front network equipment can be passed through, option field in tcp data bag implants the geographical location information at this network equipment place, the object lesson implanted is: the type arranging option is the length of 202, option is 10 bytes, and front 4 bytes that value is are the longitude of Mars coordinate system, rear 4 bytes are the latitude of Mars coordinate system, all precision are after decimal point 6, and then logarithm value is multiplied by 1000000, rounds.
The relevant technical details mentioned in second execution mode is still effective in the present embodiment, in order to reduce repetition, repeats no more here.Correspondingly, the relevant technical details mentioned in present embodiment also can be applicable in the second execution mode.
Fifth embodiment of the invention relates to the transmission method of information in a kind of communication network.
5th execution mode is the first or the 3rd execution mode that execution mode basis is improved, and compared with the first execution mode, difference is: in above-mentioned steps 104, key-length-be worth the biometric information that right value is transmitting terminal user.
Such as, by third-party mode, as the portrait recognition technology of camera, object recognition technique, complete the relevant information identification to upper netizen, then notify front network equipment, in the option field of TCP, implant relevant information, as: the type arranging option is 203, the length of option is 3 bytes, value is: 0, represents women, and 1 represents the male sex.
First or the 3rd relevant technical details mentioned in execution mode is still effective in the present embodiment, in order to reduce repetition, repeats no more here.Correspondingly, the relevant technical details mentioned in present embodiment also can be applicable to first or the 3rd in execution mode.
Each method execution mode of the present invention all can realize in modes such as software, hardware, firmwares.No matter the present invention realizes with software, hardware or firmware mode, instruction code can be stored in the addressable memory of computer of any type (such as permanent or revisable, volatibility or non-volatile, solid-state or non-solid, fixing or removable medium etc.).Equally, memory can be such as programmable logic array (ProgrammableArrayLogic, be called for short " PAL "), random access memory (RandomAccessMemory, be called for short " RAM "), programmable read only memory (ProgrammableReadOnlyMemory, be called for short " PROM "), read-only memory (Read-OnlyMemory, be called for short " ROM "), Electrically Erasable Read Only Memory (ElectricallyErasableProgrammableROM, be called for short " EEPROM "), disk, CD, digital versatile disc (DigitalVersatileDisc, be called for short " DVD ") etc.
Sixth embodiment of the invention relates to the transmitting device of information in a kind of communication network.Fig. 2 is the structural representation of the transmitting device of information in this communication network.
Particularly, as shown in Figure 2, in this communication network, the transmitting device of information comprises:
Acquiring unit, receives for intermediate node in a network and forwards in the process of tcp data bag, obtain this tcp data bag.
Detecting unit, detects the Option Field of this tcp data bag.
Judging unit, for judge this tcp data bag Option Field in whether exist key equal predetermined value key-length-it is right to be worth.
Reading unit, during for judging that at judging unit there is key equals the key-length-value pair of predetermined value, reads that this key-length-it is right to be worth.
Processing unit, for read according to reading unit key-length-it is right to be worth, this tcp data bag is processed.
Transmitting element, during for judging that at judging unit there is key equals the key-length-value pair of predetermined value, first equals by key in the Option Field of this tcp data bag to the key-length of predetermined value-be worth deletion, then send delete this key-length-be worth to after tcp data bag.
Any one execution mode in the first to five execution mode is the method execution mode corresponding with present embodiment, and present embodiment can be worked in coordination with any one execution mode in the first to five execution mode and be implemented.The relevant technical details that any one execution mode in the first to five execution mode is mentioned is still effective in the present embodiment, in order to reduce repetition, repeats no more here.Correspondingly, the relevant technical details mentioned in present embodiment also can be applicable to any one execution mode in the first to five execution mode.
It should be noted that, the each unit mentioned in the present invention's each equipment execution mode is all logical block, physically, a logical block can be a physical location, also can be a part for a physical location, can also realize with the combination of multiple physical location, the Physical realization of these logical blocks itself is not most important, and the combination of the function that these logical blocks realize is only the key solving technical problem proposed by the invention.In addition, in order to outstanding innovative part of the present invention, the unit not too close with solving technical problem relation proposed by the invention is not introduced by the above-mentioned each equipment execution mode of the present invention, and this does not show that the said equipment execution mode does not exist other unit.
It should be noted that, in the claim and specification of this patent, the such as relational terms of first and second grades and so on is only used for an entity or operation to separate with another entity or operating space, and not necessarily requires or imply the relation that there is any this reality between these entities or operation or sequentially.And, term " comprises ", " comprising " or its any other variant are intended to contain comprising of nonexcludability, thus make to comprise the process of a series of key element, method, article or equipment and not only comprise those key elements, but also comprise other key elements clearly do not listed, or also comprise by the intrinsic key element of this process, method, article or equipment.When not more restrictions, the key element " being comprised " limited by statement, and be not precluded within process, method, article or the equipment comprising described key element and also there is other identical element.
Although by referring to some of the preferred embodiment of the invention, to invention has been diagram and describing, but those of ordinary skill in the art should be understood that and can do various change to it in the form and details, and without departing from the spirit and scope of the present invention.

Claims (10)

1. the transmission method of information in communication network, is characterized in that, comprise the following steps:
Nodes receives and forwards in the process of tcp data bag, obtains this tcp data bag;
Detect the Option Field of this tcp data bag;
If exist in the Option Field of this tcp data bag key equal predetermined value key-length-it is right to be worth, then read that this key-length-it is right to be worth.
2. the transmission method of information in communication network according to claim 1, is characterized in that, further comprising the steps of:
Before described nodes receives tcp data bag, to add at this tcp data bag at first nodes that key-length-it is right to be worth before being arranged in this nodes in the transmission path of this tcp data bag, wherein this key-length-be worth right key is predetermined value, the right value of this key-length-be worth needs to be attached to the information that this tcp data wraps, this key-length-be worth the overall length that right length is key-length-value.
3. the transmission method of information in communication network according to claim 1, is characterized in that, further comprising the steps of:
Transmitting terminal is before the described tcp data bag of transmission, in this tcp data bag, add that key-length-it is right to be worth, wherein this key-length-be worth right key is predetermined value, and the right value of this key-length-be worth needs to be attached to the information that this tcp data wraps, this key-length-be worth the overall length that right length is key-length-value.
4. the transmission method of information in communication network according to any one of claim 1 to 3, is characterized in that, after this key-length of described reading-be worth right step, further comprising the steps of:
According to read key-length-it is right to be worth, this tcp data bag is processed.
5. the transmission method of information in communication network according to any one of claim 1 to 3, is characterized in that, before the step of described forwarding tcp data bag, further comprising the steps of:
If have key to equal predetermined value in the Option Field of this tcp data bag, then first key in the Option Field of this tcp data bag is equaled the key-length of predetermined value-be worth deletion, then send delete this key-length-be worth to after tcp data bag.
6. the transmission method of information in communication network according to claim 2, it is characterized in that, described " first nodes add in this tcp data bag key-length-be worth to " step in, the right value of this key-length-be worth is at this geographical location information at first nodes.
7. in the step that the transmission method of information in communication network according to claim 1, is characterized in that, described " read this key-length-be worth to ", this key-length-be worth the biometric information that right value is transmitting terminal user.
8. the transmitting device of information in communication network, is characterized in that, comprising:
Acquiring unit, receives for intermediate node in a network and forwards in the process of tcp data bag, obtain this tcp data bag;
Detecting unit, detects the Option Field of this tcp data bag;
Judging unit, for judge this tcp data bag Option Field in whether exist key equal predetermined value key-length-it is right to be worth;
Reading unit, during for judging that at judging unit there is key equals the key-length-value pair of predetermined value, reads that this key-length-it is right to be worth.
9. the transmitting device of information in communication network according to claim 8, is characterized in that, also comprise with lower unit:
Processing unit, for read according to described reading unit key-length-it is right to be worth, this tcp data bag is processed.
10. in the communication network according to any one of according to Claim 8 to 9, the transmitting device of information, is characterized in that, also comprises with lower unit:
Transmitting element, during for judging that at described judging unit there is key equals the key-length-value pair of predetermined value, first equals by key in the Option Field of this tcp data bag to the key-length of predetermined value-be worth deletion, then send delete this key-length-be worth to after tcp data bag.
CN201510508720.3A 2015-08-18 2015-08-18 Communication network information transmission method and device thereof Pending CN105577636A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510508720.3A CN105577636A (en) 2015-08-18 2015-08-18 Communication network information transmission method and device thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510508720.3A CN105577636A (en) 2015-08-18 2015-08-18 Communication network information transmission method and device thereof

Publications (1)

Publication Number Publication Date
CN105577636A true CN105577636A (en) 2016-05-11

Family

ID=55887298

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510508720.3A Pending CN105577636A (en) 2015-08-18 2015-08-18 Communication network information transmission method and device thereof

Country Status (1)

Country Link
CN (1) CN105577636A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107704367A (en) * 2017-10-10 2018-02-16 郑州云海信息技术有限公司 A kind of resource period information displaying method and device
CN108600374A (en) * 2018-04-27 2018-09-28 柏建民 More area cross-region remote centralized exchange network frameworks

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102130891A (en) * 2010-01-18 2011-07-20 中兴通讯股份有限公司 Method and system for coordinating keys based on transmission control protocol (TCP)
CN102340732A (en) * 2010-07-22 2012-02-01 黄金富 Credit database system and corresponded method thereof for identity authentication by utilizing mobile phone network
CN102714657A (en) * 2009-11-25 2012-10-03 思杰系统有限公司 Systems and methods for client IP address insertion via TCP options
US8364949B1 (en) * 2005-11-01 2013-01-29 Juniper Networks, Inc. Authentication for TCP-based routing and management protocols
CN103297552A (en) * 2012-03-02 2013-09-11 百度在线网络技术(北京)有限公司 Method and device for transmitting IPv4 address and port of client-side to back-end server

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8364949B1 (en) * 2005-11-01 2013-01-29 Juniper Networks, Inc. Authentication for TCP-based routing and management protocols
CN102714657A (en) * 2009-11-25 2012-10-03 思杰系统有限公司 Systems and methods for client IP address insertion via TCP options
CN102130891A (en) * 2010-01-18 2011-07-20 中兴通讯股份有限公司 Method and system for coordinating keys based on transmission control protocol (TCP)
CN102340732A (en) * 2010-07-22 2012-02-01 黄金富 Credit database system and corresponded method thereof for identity authentication by utilizing mobile phone network
CN103297552A (en) * 2012-03-02 2013-09-11 百度在线网络技术(北京)有限公司 Method and device for transmitting IPv4 address and port of client-side to back-end server

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107704367A (en) * 2017-10-10 2018-02-16 郑州云海信息技术有限公司 A kind of resource period information displaying method and device
CN108600374A (en) * 2018-04-27 2018-09-28 柏建民 More area cross-region remote centralized exchange network frameworks

Similar Documents

Publication Publication Date Title
KR102263336B1 (en) Security Implementation Methods, Devices and Systems
CN109921988B (en) Link control node, link control method and communication system
CN1819540B (en) Wireless network having multiple security interfaces
WO2019153428A1 (en) Wireless communication method, network device and terminal device
CN108011837B (en) Message processing method and device
US11356416B2 (en) Service flow control method and apparatus
CN109246769B (en) PDU session establishment method and device
EP2067319B1 (en) Loop-detection in moving networks
US20110222436A1 (en) Topology detemination in a communications network
US20180279394A1 (en) D2D Mode B Discovery Security Method, Terminal and System, and Storage Medium
EP3258718A1 (en) Gprs system key enhancement method, sgsn device, ue, hlr/hss and gprs system
CN110557785B (en) Data distribution method and device based on MEC
US10945117B1 (en) Method and apparatus for detecting diameter protocol IDR message spoofing attack in mobile communication network
CN107801187A (en) Encipher-decipher method, apparatus and system
CN108141758A (en) Connectionless data transmission
US20160212010A1 (en) Node device, network system, and connection method for node devices
US20190014472A1 (en) Secure Communication Method and Core Network Node
WO2016077090A1 (en) Techniques for encrypting fields of a frame header for wi-fi privacy
CN105577636A (en) Communication network information transmission method and device thereof
CN102571581B (en) The method of heavy-route, system and base station controller, equipment of the core network in MOCN network
KR101541348B1 (en) METHOD AND APPARATUS FOR MANAGING SESSION BASED GPRS Tunneling Protocol NETWORK
US7623666B2 (en) Automatic setting of security in communication network system
US11039338B2 (en) Methods, systems, and computer readable media for control plane traffic filtering in a control and user plane separation (CUPS) environment
CN111277552B (en) Method, device and storage medium for identifying direct signaling security threat
KR101499022B1 (en) Apparatus and method for detecting abnormal MMS message in 4G mobile network

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20160511

WD01 Invention patent application deemed withdrawn after publication