CN101267393B - Method and system for reducing called waiting time in instant communication system - Google Patents

Method and system for reducing called waiting time in instant communication system Download PDF

Info

Publication number
CN101267393B
CN101267393B CN2008100981079A CN200810098107A CN101267393B CN 101267393 B CN101267393 B CN 101267393B CN 2008100981079 A CN2008100981079 A CN 2008100981079A CN 200810098107 A CN200810098107 A CN 200810098107A CN 101267393 B CN101267393 B CN 101267393B
Authority
CN
China
Prior art keywords
called party
party client
port
address
client end
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN2008100981079A
Other languages
Chinese (zh)
Other versions
CN101267393A (en
Inventor
王志华
胡鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN2008100981079A priority Critical patent/CN101267393B/en
Publication of CN101267393A publication Critical patent/CN101267393A/en
Application granted granted Critical
Publication of CN101267393B publication Critical patent/CN101267393B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

Disclosed is a method and system for reducing callee wait time in the instant messaging system. The method includes sending an unmonitored user datagram protocol packet before the called client side accepts the call of the calling client side to establish a connection between the called client side and the calling client side. The invention succeeds in reducing the callee wait time and effectively protecting on-line state privacy of the called client side.

Description

Reduce the method and system of called stand-by period in the instantaneous communication system
Technical field
The present invention relates to instant messaging (IM, Instant Message) technology, relate in particular to the method and system that reduces the called stand-by period in the IM system.
Background technology
In the IM system, point-to-point (P2P, Peer to Peer) technology may be defined as by directly exchanging between system carries out share technique to computer resource and service.The P2P network is a kind of distributed network, the participant of network shares a part of hardware resource (comprising disposal ability, storage capacity, network concatenation ability and printer etc.) that they are had, these hardware resources of sharing need provide service and content by network, make this node can directly be visited and need not the process intermediate entities by other reciprocity node (Peer).Resource in the P2P network is dispersed on each member's node, rather than concentrates on the independent server, and the participant in the network is resource (service and content) supplier (Server), is again that resource (service and content) obtains taker (Client).
In the IM system, the called stand-by period refers to that called out between calls customer end and the called party client end by the calls customer end from the called party client termination begins to transmit effective content during this period of time, the called party client end wait for during this period of time in communicating pair can not communicate by letter.There is the called stand-by period, mainly be because have a large amount of network address translater (NAT in the network, Network Address Translation) and fire compartment wall (FireWall), make the connection of setting up between calls customer end and the called party client end need a period of time, this causes direct interconnection failure in the P2P network, so-called direct interconnection is called for short direct-connected, refer to that calls customer end and called party client end interconnect immediately, in this case, if after the called party client termination is called out, just begin to set up of the connection of calls customer end to the called party client end, must consume the regular hour, therefore often adopt the connection of before the called party client termination is called out, setting up between calls customer end and the called party client end.Setting up the calls customer end comprises to the connection of called party client end: direct-connected and other node transfer technology of use connects, and uses udp hole punching to connect.
Below NAT and fire compartment wall are described.There are a large amount of NAT and fire compartment wall in the current Internet environment, NAT has solved the problem of IPV4 address shortage, fire compartment wall has guaranteed the fail safe of network, NAT is equivalent for P2P is connected with fire compartment wall, and the existence of NAT and fire compartment wall is provided with obstacle to direct interconnection between the main frame in the P2P network.Fire compartment wall is a kind of isolated controlling technology, between the network of certain mechanism and unsafe network (as Internet), barrier is set, prevention also can use fire compartment wall to stop patent information illegally to be exported from the network of enterprise to the unauthorized access of information resources.NAT allows a whole mechanism to appear on the Internet with a public Internet agreement (IP, Internet Protocol) address.NAT is a kind of technology that inner private network IP address translation is become legitimate network IP address.According to UDP simple traversal (the Simple Traversal of UDP overNATs) Simple Traversal of UDP Through Network Address Translators (RFC3489) of NAT, NAT roughly is divided into following four classes:
1) fully conical (Full Cone) NAT
After the machine A of this NAT inside connected outer net machine B, NAT can open a port.Afterwards, send to this User Datagram Protoco (UDP) of opening port (UDP, UserDatagram Protocol) packet, can arrive A, no matter whether this UDP message bag is sent by B from any outer net.
For example:
A:192.168.8.100, NAT:202.100.100.100, B:292.88.88.88, if send the UDP message bag by following path, A (192.168.8.100:5000)->NAT (202.100.100.100:8000)->B (292.88.88.88:2000), the UDP message bag of so after this any NAT of sending to (202.100.100.100:8000) can arrive A (192.168.8.100:5000)
2) conical (Restricted Cone) NAT of restriction
After the machine A of this NAT inside connected the machine B of outer net, NAT opened a port.Afterwards, machine B can communicate by letter with A with any port, and the outer net machine of other except that machine B is then not all right.
For example:
A:192.168.8.100, NAT:202.100.100.100, B:292.88.88.88, if send the UDP message bag by following path, A (192.168.8.100:5000)->NAT (202.100.100.100:8000)->B (292.88.88.88:2000), so after this any data that send to NAT (202.100.100.100:8000) from B can arrive A (192.168.8.100:5000).
3) port limit taper shape (Port Restricted Cone) NAT
After the machine A of this NAT inside connected the machine B of outer net, NAT opened a port.B can communicate by letter with A with original port then, and the outer net machine of other except that machine B and other port of machine B are then not all right.
For example:
A:192.168.8.100, NAT:202.100.100.100, B:292.88.88.88, if send the UDP message bag by following path, A (192.168.8.100:5000)->NAT (202.100.100.100:8000)->B (292.88.88.88:2000), so after this B (202.88.88.88:2000) data that send to NAT (202.100.100.100:8000) can arrive A (192.168.8.100:5000).
More than three kinds of NAT be commonly referred to as taper shape (Cone) NAT.
4) symmetric figure (Symmetric) NAT
For this NAT, the port that original NAT opens when connecting different external objects can change.And for Cone NAT, the port that original NAT opens when connecting different external objects then can not change, therefore generally adopt conical NAT to carry out UDP to burrow and set up connection between calls customer end and the called party client end, do not burrow and set up connection between calls customer end and the called party client end and do not adopt symmetric figure NAT to carry out UDP.
The connection of setting up between calls customer end and the called party client end comprises three kinds of modes, describes respectively below:
1) direct-connected
Have a situation at least for calls customer end and called party client end, can use direct-connected with public network IP.
2) transfer
All do not have public network IP and do not satisfy the burrow situation of condition of UDP for calls customer end and called party client end, use server to carry out the super node that transfer or use have a public network IP and carry out transfer.
3) UDP burrows
All do not have the NAT of public network IP and calls customer end and called party client end or fire compartment wall type to satisfy the burrow situation of condition of UDP for calls customer end and called party client end, can use UDP to burrow direct communication.
For conical NAT, when adopting UDP to burrow to set up the connection between calls customer end and the called party client end, need a public network server serve as " sponsor ".Here, suppose that the calls customer end is A, the outer net of A is expressed as NA, and A is the internal machine of NA, and the called party client end is B, and the outer net of B is expressed as NB, and B is the internal machine of NB, and public network server is called the server that burrows, and is assumed to be C; NA, NB can be NAT, also can be fire compartment walls, are that example describes below with NAT, and Fig. 1 shows corresponding system configuration.
In the process that connects between A and B, A, B communicate by letter with C respectively earlier, open nat port separately, and C has just been known public network IP and the port of A, B like this; When A needs and B when connecting, to B transmission UDP message bag, NA is the interior net address of A and port translation outer net address and the port of NA, sends to B through NA, and B just can send data to A then.Afterwards, if B has accepted the calling of A, just can communicate between A and the B.
System configuration below in conjunction with Fig. 1, the method that prior art is reduced the called stand-by period is illustrated, and this method is accepted at B to set up the connection between A and the B before the calling of A, the method flow that connects between described A of foundation and the B may further comprise the steps as shown in Figure 2:
Step 201, A sends the UDP message bag by NA to C, and C obtains address and the port of the outer net NA of A.
Step 202, B sends the UDP message bag by NB to C, and C obtains address and the port of the outer net NB of B.
Step 203, A by NA to C send to need and B connects request.
Step 204 after the request that needs that C reception A sends and B connect, sends the request of connecting by NB to B, and this request of connecting comprises address and the port of the outer net NA of A.
Step 205, B sends the UDP message bag by NB and NA to A.
Because do not set up the legitimate conversation of A->NB on the NA, NA can abandon the UDP message bag that is sent by NB, but in this process, just set up the legitimate conversation of B->NA on the NB, just B has accomplished fluently the hole about A, and A just can send data to B by the legitimate conversation of the last B->NA that sets up of NB afterwards.
Step 206, B sends to C and prepares to receive data packet message, and C prepares to receive response package to the A transmission after receiving described preparation reception data packet message, carries address and the port of the outer net NB of B in this response.
After A receives and prepare to receive response package, just can send packet and be not dropped to B.Because when A sent packet to B, what NB saw was address and the port of the outer net NA of A, and by step 205, B has allowed NA become the legitimate correspondence object of NB, like this, NB will receive the data of A transmission and be transmitted to B.Need to prove, when B sends packet, just set up the legitimate conversation of A->NB on the A, just can communicate between A and the B at A.
If B is listened to the UDP message bag that NA sends by NB in the step 205, just it is online to know B by inference, this causes the privacy of B to be leaked.For example, though the instant messaging program on the A is not received the UDP message bag from B, but the UDP message bag of B has still arrived the network adapter of A, and the user of A can see packet from B by using certain network packet catcher on A, and it is online just can judging B in view of the above.Do not have under the situation of call accepted at B like this, the presence information of B is found by the user of A, the privacy of having leaked B.As seen, before the called party client termination is called out, just connect,, also cause the leakage of called party client end online information though can shorten the stand-by period of called party client end.The online information of called party client end before call accepted is a kind of privacy, and this called subscriber's privacy should be protected up to called beginning call accepted.
In above-mentioned three kinds of connected modes, for direct-connected, because of the very short problem that can not consider to exist the called stand-by period of elapsed time; For transfer, because the calls customer end is not directly communicated by letter with the called party client end, the privacy of called party client end is easy to be protected, and carries out there is the called stand-by period in transfer with solution problem before can adopting calling.For using the burrow situation of connected mode of UDP, in order to reduce the called stand-by period, can before the called party client termination is called out, just begin to connect, judge the online problem of called party client end yet in the process that connects, exist by means such as monitored data bags.
Summary of the invention
The invention provides the method that reduces the called stand-by period in a kind of IM system, this method can be protected the called party client end presence privacy of called party client end before communicating with the calls customer end.
The invention provides the system that reduces the called stand-by period in a kind of IM system, this system can protect the called party client end presence privacy of called party client end before communicating with the calls customer end.
Reduce the method for called stand-by period in a kind of IM system, this method is subjected to before the calls customer end calls out in the called party client termination,
Wrap between calls customer end and the called party client end and connect by sending the User Datagram Protoco (UDP) UDP message do not listened to.
Reduce the system of called stand-by period in a kind of IM system, this system comprises calls customer end, called party client end and the server that burrows, this system also comprises UDP message bag sending module, be used for before the calls customer termination is received the calling of called party client end, send the UDP message bag that is not listened to, between calls customer end and called party client end, connect.
From such scheme as can be seen, the present invention is subjected to before the calls customer end calls out in the called party client termination, wraps between calls customer end and the called party client end and connects by sending the UDP message that is not listened to.Like this; prevented that the called party client end from sending to the UDP message bag in the process of the address of caller outer net and port, the leakage of called party client end presence, thereby; the stand-by period that reduces the called party client end, protected called party client end presence privacy.
Description of drawings
Fig. 1 is the system configuration schematic diagram that reduces the called stand-by period in the prior art IM system;
The method flow diagram of Fig. 2 for connecting between prior art calls customer end and the called party client end;
The method flow legend one of Fig. 3 for connecting between calls customer end of the present invention and the called party client end;
The method flow legend two of Fig. 4 for connecting between calls customer end of the present invention and the called party client end;
Fig. 5 is for reducing the system configuration schematic diagram of called stand-by period in the IM of the present invention system.
Embodiment
For making the purpose, technical solutions and advantages of the present invention clearer, below in conjunction with embodiment and accompanying drawing, the present invention is described in more detail.
The present invention is before the called party client termination is subjected to the calling of calls customer end, wrap between calls customer end and the called party client end and connect by sending the UDP message do not listened to, the described UDP message that is not listened to by transmission wraps between calls customer end and the called party client end and connects, adopt called party client end structure to comprise specific life span (TTL, Time To Live) UDP message bag, address by called outer net and port send the described UDP message bag that comprises specific T TL to the address of caller outer net and port and realize, the value of described specific T TL makes this UDP message bag arrive the address of called outer net and port and do not arrive the address and the port of caller outer net; Perhaps adopt the calls customer end to send the realization of UDP message bag to the address and the port of called outer net.Like this; the leakage of called party client end presence when having avoided called party client end in the prior art that the UDP message bag is sent to the address of caller outer net and port; thereby, the stand-by period that reduces the called party client end, protected the privacy of called party client end presence.
Below with reference to the system configuration of Fig. 1, being example with Fig. 3 and Fig. 4 is subjected to before the calls customer end calls out in the called party client termination the present invention, and the method that connects between calls customer end and the called party client end is illustrated.The outer net of A, B can be NAT, also can be fire compartment wall, is that example describes here equally with NAT.
Referring to Fig. 3, be the method flow legend one that connects between calls customer end of the present invention and the called party client end, this method may further comprise the steps:
Step 301, A sends the UDP message bag by NA to C, and C obtains address and the port of the outer net NA of A.
Step 302, B sends the UDP message bag by NB to C, and C obtains address and the port of the outer net NB of B.
Step 303, A by NA to C send to need and B connects request.
Step 304 after the request that needs that C reception A sends and B connect, sends the request of connecting by NB to B, and this request of connecting comprises address and the port of the outer net NA of A.
Step 305, the B structure comprises the UDP message bag of specific T TL, sends the described UDP message bag that comprises specific T TL by address from NB to NA and port.
TTL is a value that is arranged in the UDP message bag, and the value of TTL has been determined the time range of this UDP message bag transmission, surpasses this time scope and just abandons this UDP message bag.Default value when the initial value of TTL is system default is 8 territory in the packet header, is the maximum time scope of this UDP message bag transmission.In the process of transmission UDP message bag, every through a router, just subtract one to major general TTL territory, when counting 0 the time, router abandons this UDP message bag, TTL represent UDP message wrap in be dropped before the router number of multipotency process, like this, the value of TTL has just been determined the time range of this UDP message bag transmission.
Default value when the value of the described specific T TL of this step is lower than system default makes this UDP message bag arrive the address of called outer net and port and does not arrive the address and the port of caller outer net.If the UDP message bag that transmit leg sends does not leave the Intranet of transmit leg, will receive the TTL stale messages of returning, if the UDP message bag that sends has left the Intranet of transmit leg, then transmit leg can not received the TTL stale messages of returning.Like this, the value of feature TTL can realize by the following method: transmit leg is that the continuous value that increases of 1 beginning sends the UDP message bag to the other side from TTL, after sending the UDP message bag, do not receive the TTL stale messages, then the ttl value that this moment, UDP message comprised makes this UDP message bag leave the transmit leg Intranet, just the TTL that this moment, UDP message comprised can be defined as specific T TL.Determine that with B in the system configuration of Fig. 1 the value of specific T TL is that example describes, this moment, transmit leg was B, B is that the continuous value that increases of 1 beginning is sent the UDP message bag to A from TTL, after sending the UDP message bag, there is not the TTL stale messages to return, then the ttl value that this moment, UDP message comprised makes this UDP message bag leave NB, just the TTL that this moment, UDP message comprised can be defined as specific T TL.
B can arrive NB to the address of NA and the UDP message bag of port transmission, just sets up the legitimate conversation of B->NA on NB, and just B has accomplished fluently the hole about A, and A just can send data to B by the legitimate conversation of the last B->NA that sets up of NB afterwards; And; because B can not arrive NA to the address of NA and the UDP message bag of port transmission; the UDP message bag that B is sent can not be listened to; for example; because the network adapter of the A that the UDP message bag of B does not arrive, the user of A can not see packet from B by use network packet catcher on A, also just can not know the online information of B; thereby, protected the privacy of B presence.
Step 306, B sends to C and prepares to receive data packet message, and C prepares to receive response package to the A transmission after receiving described preparation reception data packet message, carries address and the port of the outer net NB of B in this response.
So far, A has been known address and the port of the outer net NB of B, and B has also been known address and the port of the outer net NA of A, and B on NB for NA has created a legal session, after this A just can send packet and is not dropped to B.Because when B sent packet to A, what NB saw was address and the port of the outer net NA of A, and by step 305, B has allowed NA become the legitimate correspondence object of NB, like this, NB will receive the data of A transmission and be transmitted to B.Need to prove, when B sends packet, just set up the legitimate conversation of A->NB on the A, just can communicate between A and the B at A.
In the flow process of Fig. 3,, still can adopt the data content of analyzing in the packet to judge whether B is online though the user of A can't monitor the packet from B.For example, receive outer net address and the port that carries B in the response package if the user of A analyzes the preparation that is sent by C in the step 306, it is online just can to judge B.In order further to protect the privacy of called party client end presence; the any data that connection can be set up between A in the process, B, the C three all will be carried out encrypted transmission; like this; even listened to the existence of packet but can't see the concrete data content of packet, thus the presence privacy of protection called party client end.
In the flow process of Fig. 3, though the user of A can't monitor the packet from B, but A can also judge whether B is online according to whether having from the packet of C, for example, for the online situation of B, C will send to A and prepare to receive response package in the step 306, send this response if know C to A, just can learn that B is online.At this situation, in order further to protect the privacy of called party client end presence, the present invention adopts no matter whether B is online, and after the request that the C transmission needs and B connects, C is to the identical response message of A feedback format at A.Particularly, when the called party client end was online, described C was that C receives response package to the outer net address that carries the called party client end of A transmission and the preparation of port in the step 306 to the response message of A feedback; When B was not online, after the step 303, C was to the not online response of A feedback called party client end, and the not online response of described called party client end is identical with the form that described preparation receives response package.Described form is identical to comprise that length etc. is identical.Like this, no matter whether B is online, and C returns response to A, and can not whether send data by C and know whether B is online to A, thereby, protected the privacy of B presence.
Referring to Fig. 4, be the method flow legend two that connects between calls customer end of the present invention and the called party client end, this method adopts to be burrowed by A sets up connection between A and the B, may further comprise the steps:
Step 401, A sends the UDP message bag by NA to C, and C obtains address and the port of the outer net NA of A.
Step 402, B sends the UDP message bag by NB to C, and C obtains address and the port of the outer net NB of B.
Step 403, C is by NA, and address and the port of the outer net NB of B sent to A.
Step 404, A sends the UDP message bag by NA and NB to B.
Because do not set up the legitimate conversation of A->NB on the NB, NB can abandon the UDP message bag that is sent by NA, but in this process, just set up the legitimate conversation of A->NB on the NA, just A has accomplished fluently the hole about B, and B just can send data to A by the legitimate conversation of the last A->NB that sets up of NA afterwards.
Step 405, A by NA to C send to need and B connects request.
Step 406, C is by NB, and address and the port of the outer net NA of A sent to B.
So far finish by the UDP process of setting up the connection between A and the B that burrows, can send effective content by NB and NA to A immediately after B call accepted request, owing to created the session of A->NB in the step 404, this moment, A just can receive effective content that B sends.And, when A sends effective content, can on NB, create the legitimate conversation of B->NA at B, after this B just can receive effective content that A sends by the described B->NA that creates.
Referring to Fig. 5, for reducing the system configuration schematic diagram of called stand-by period in the instantaneous communication system of the present invention, this system comprises calls customer end, called party client end and the server that burrows, this system also comprises UDP message bag sending module, be used for before the calls customer termination is received the calling of called party client end, send the UDP message bag that is not listened to, between calls customer end and called party client end, connect.
Alternatively, described called party client termination is received the address and the port of the caller outer net of the server transmission that burrows;
Described UDP message bag sending module is arranged at the called party client end, described UDP message bag sending module sends described UDP message bag by the address and the port of called outer net to the address and the port of caller outer net, described UDP message bag comprises specific TTL, and the value of specific T TL makes this UDP message bag arrive the address of called outer net and port and do not arrive the address and the port of caller outer net.
Alternatively; for further protecting to called party client end presence privacy; calls customer end, called party client end and the information that burrows between the server three are carried out encrypted transmission; particularly; by the encrypting module one that the server that burrows comprises, encrypting module three realizations that encrypting module two that the called party client end comprises and calls customer end comprise.
Alternatively, the described server that burrows comprises the responsive feedback module, is used for when the called party client end is online, and the preparation that receives called party client end feedback receives data packet message, send preparation to the calls customer end and receive response package, the outer net address and the port of called party client end carried in this response; When the called party client end was not online, to the not online response of calls customer end feedback called party client end, the not online response of described called party client end was identical with the form that described preparation receives response package.
Alternatively, described calls customer termination is received the address and the port of the called outer net of the server transmission that burrows;
Described UDP message bag sending module is arranged at the calls customer end, and described UDP message bag sending module sends to described UDP message bag the address and the port of called outer net.
The present invention program is subjected to before the calls customer end calls out in the called party client termination, wraps between calls customer end and the called party client end and connects by sending the UDP message that is not listened to.In setting up the process that is connected between calls customer end and the called party client end, adopt called party client end structure to comprise the UDP message bag of specific T TL, address by called outer net and port send the described UDP message bag that comprises specific T TL to the address and the port of caller outer net, and the value of specific T TL makes this UDP message bag arrive the address of called outer net and port and do not arrive the address and the port of caller outer net; Perhaps, adopt the calls customer end to send the UDP message bag to the address and the port of called outer net.Like this; the leakage of called party client end presence when having avoided called party client end in the prior art that the UDP message bag is sent to the address of caller outer net and port; thereby, the stand-by period that reduces the called party client end, protected the privacy of called party client end presence.
Above-described specific embodiment; purpose of the present invention, technical scheme and beneficial effect are further described; institute is understood that; the above only is specific embodiments of the invention; and be not intended to limit the scope of the invention; within the spirit and principles in the present invention all, any modification of being made, be equal to replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (6)

1. reduce the method for called stand-by period in the instantaneous communication system, it is characterized in that, this method is subjected to before the calls customer end calls out in the called party client termination, wraps between calls customer end and the called party client end and connects by sending the User Datagram Protoco (UDP) UDP message that is not listened to;
The described UDP message that is not listened to by transmission wraps in to connect between calls customer end and the called party client end and comprises:
The called party client termination is received the address and the port of the caller outer net of the server transmission that burrows;
Called party client end structure comprises the UDP message bag of specific life span TTL, address by called outer net and port send the described UDP message bag that comprises specific T TL to the address and the port of caller outer net, and the value of described specific T TL makes this UDP message bag arrive the address of called outer net and port and do not arrive the address and the port of caller outer net.
2. the method for claim 1 is characterized in that, the address and the port of the caller outer net that is sent by the server that burrows that described called party client termination is received are enciphered data;
Described called party client end by called outer net the address and port to the UDP message bag that the address and the port of caller outer net sends, be enciphered data.
3. method as claimed in claim 1 or 2, it is characterized in that, when the called party client end is online, described called party client end structure comprises the UDP message bag of specific T TL, address by called outer net and port are after the address of caller outer net and port send the described UDP message bag that comprises specific T TL, this method comprises: the preparation that the server that burrows receives called party client end feedback receives data packet message, send preparation to the calls customer end and receive response package, the address and the port of called outer net carried in this response;
When the called party client end was not online, this method comprised: the server that burrows is to the not online response of calls customer end feedback called party client end, and the not online response of described called party client end is identical with the form that described preparation receives response package.
4. reduce the system of called stand-by period in the instantaneous communication system, this system comprises calls customer end, called party client end and the server that burrows, it is characterized in that, this system also comprises UDP message bag sending module, be used for before the calls customer termination is received the calling of called party client end, send the UDP message bag that is not listened to, between calls customer end and called party client end, connect;
Described called party client termination is received the address and the port of the caller outer net of the server transmission that burrows;
Described UDP message bag sending module is arranged at the called party client end, described UDP message bag sending module sends described UDP message bag by the address and the port of called outer net to the address and the port of caller outer net, described UDP message bag comprises specific TTL, and the value of described specific T TL makes this UDP message bag arrive the outer net address of called party client end and port and do not arrive the address and the port of caller outer net.
5. the system of called stand-by period of minimizing as claimed in claim 4 is characterized in that, the described server that burrows comprises encrypting module one, is used for the address and the port of the caller outer net that sends to the called party client end are encrypted;
Described called party client end comprises encrypting module two, is used for described UDP message bag is encrypted.
6. as claim 4 or the system of 5 described called stand-by period of minimizing, it is characterized in that, the described server that burrows comprises the responsive feedback module, be used for when the called party client end is online, the preparation that receives called party client end feedback receives data packet message, send preparation to the calls customer end and receive response package, the outer net address and the port of called party client end carried in this response; When the called party client end was not online, to the not online response of calls customer end feedback called party client end, the not online response of described called party client end was identical with the form that described preparation receives response package.
CN2008100981079A 2008-05-13 2008-05-13 Method and system for reducing called waiting time in instant communication system Active CN101267393B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2008100981079A CN101267393B (en) 2008-05-13 2008-05-13 Method and system for reducing called waiting time in instant communication system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2008100981079A CN101267393B (en) 2008-05-13 2008-05-13 Method and system for reducing called waiting time in instant communication system

Publications (2)

Publication Number Publication Date
CN101267393A CN101267393A (en) 2008-09-17
CN101267393B true CN101267393B (en) 2010-09-01

Family

ID=39989535

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2008100981079A Active CN101267393B (en) 2008-05-13 2008-05-13 Method and system for reducing called waiting time in instant communication system

Country Status (1)

Country Link
CN (1) CN101267393B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101980508B (en) * 2010-11-01 2013-05-15 深圳市鼎盛威电子有限公司 Network adaptive operation mode on network monitoring system
CN109218316A (en) * 2018-09-20 2019-01-15 杭州智块网络科技有限公司 A kind of NAT penetrating method, device, equipment and storage medium
CN109831547B (en) * 2019-03-14 2022-02-22 腾讯科技(深圳)有限公司 NAT (network Address translation) penetration method, device, equipment and storage medium
CN112750234B (en) * 2020-12-31 2022-06-28 北京骑胜科技有限公司 Vehicle unlocking method and device, computer equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1558608A (en) * 2004-01-13 2004-12-29 重庆邮电学院 TCP/IP based method and system for realizing safety strategy for industrial control networks
CN1972500A (en) * 2005-11-25 2007-05-30 展讯通信(上海)有限公司 Method for reducing time delay established by calling in mobile communication system
CN101019336A (en) * 2004-08-31 2007-08-15 摩托罗拉公司 Method and apparatus for facilitating PTT session initiation and service interaction using an IP-based protocol

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1558608A (en) * 2004-01-13 2004-12-29 重庆邮电学院 TCP/IP based method and system for realizing safety strategy for industrial control networks
CN101019336A (en) * 2004-08-31 2007-08-15 摩托罗拉公司 Method and apparatus for facilitating PTT session initiation and service interaction using an IP-based protocol
CN1972500A (en) * 2005-11-25 2007-05-30 展讯通信(上海)有限公司 Method for reducing time delay established by calling in mobile communication system

Also Published As

Publication number Publication date
CN101267393A (en) 2008-09-17

Similar Documents

Publication Publication Date Title
JP5209061B2 (en) Control of sending interface of SIP response message
US7472411B2 (en) Method for stateful firewall inspection of ICE messages
US7231420B2 (en) Multi-user applications in multimedia networks
US8239520B2 (en) Network service operational status monitoring
US8670316B2 (en) Method and apparatus to control application messages between client and a server having a private network address
US20050108411A1 (en) Real-time proxies
EP1694034B1 (en) Method to establish a peer-to-peer connection between two user agents located behind symmetric NATs
TW201002018A (en) Method for predicting port number of NAT apparatus based on two STUN server inquiry results
US20070133520A1 (en) Dynamically adapting peer groups
WO2004114631A1 (en) System and method for dynamically creating pinholes in a firewall of a sip-based
US20080008170A1 (en) Communication system, communication method, and program
JP2008544386A (en) System and method for establishing a peer-to-peer connection between a PC and a smartphone using a faulty network
CN1917512B (en) Method for establishing direct connected peer-to-peer channel
US9491302B2 (en) Telephone call processing method and apparatus
CN101267393B (en) Method and system for reducing called waiting time in instant communication system
CN1665238B (en) Networking system for next generation network
US20030046403A1 (en) Method for routing data streams of a communication connection between users of a connectionless packet data network, and a packet data network, a control device and a program module therefore
CN101465852B (en) Method for implementing network inner penetration in network videoconference system
US8326277B2 (en) Call management over reduced bandwidth
EP2184902A2 (en) Implication of a Composite Endpoint in a Multimedia Call
KR100660123B1 (en) Vpn server system and vpn terminal for a nat traversal
WO2021223097A1 (en) Authentication and authorization method for data content in network and computer readable storage medium
CN108810189A (en) A kind of Novel Communication method of equipment under the environment based on NAT
Chou et al. Web service for tele-communication
US20080320132A1 (en) Method for communication with interception of control messages

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant