CN109510810A - A kind of virtual resource access method and device based on P2P - Google Patents

A kind of virtual resource access method and device based on P2P Download PDF

Info

Publication number
CN109510810A
CN109510810A CN201811100161.2A CN201811100161A CN109510810A CN 109510810 A CN109510810 A CN 109510810A CN 201811100161 A CN201811100161 A CN 201811100161A CN 109510810 A CN109510810 A CN 109510810A
Authority
CN
China
Prior art keywords
virtual resource
user terminal
access method
connection
point
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811100161.2A
Other languages
Chinese (zh)
Inventor
邓敏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Yiyun Information Technology Ltd By Share Ltd
OneCloud Inc
Original Assignee
Guangzhou Yiyun Information Technology Ltd By Share Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Yiyun Information Technology Ltd By Share Ltd filed Critical Guangzhou Yiyun Information Technology Ltd By Share Ltd
Priority to CN201811100161.2A priority Critical patent/CN109510810A/en
Publication of CN109510810A publication Critical patent/CN109510810A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0272Virtual private networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0281Proxies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks

Abstract

The virtual resource access method based on P2P that the invention discloses a kind of, comprising the following steps: receiving step: the P2P connection request that user terminal is sent is received;Connection Step: judging whether the user terminal has connection qualification, if it is, calling P2PAgent program to realize the P2P access of user terminal and virtual machine;The P2PAgent program using WEBRTC technology, perhaps realize that P2P is passed through and then establish stable point-to-point connection using OPENVPN or monitor the RDP request of client directly using the flow retransmission technique of Relay to realize point-to-point connection by birthday attack algorithm.The present invention also provides a kind of, and the virtual resource based on P2P accesses system.Virtual resource access method based on P2P of the invention by the way that tri- kinds of WEBRTC+OpenVPN, birthday attack algorithm+OpenVPN and Relay schemes are encapsulated as stand-alone program P2PAgent, using or call directly to complete P2P browsing process.

Description

A kind of virtual resource access method and device based on P2P
Technical field
The present invention relates to a kind of Internet technical field more particularly to a kind of virtual resource access method based on P2P and Device.
Background technique
Currently, IAAS technology of sharing is mainly that will provide when the resource on the cloud of wisdom basis is in idle Source shares to other people, improves resource utilization technology of sharing.But since the resource inside all-in-one machine is all in NAT routing device Under, when there is internal resource to need externally to provide network access service, at least need to there is an effective public network IP to be bundled in On NAT routing device, but since the resource of wisdom basis cloud all-in-one machine is dispersed, Network status is varied and can not determine, Therefore the method for conveniently and efficiently accessing more integrated machine equipment resources can not be provided.So proposing a kind of in complicated network Its success crossing internet can be made externally to provide access under situation becomes those skilled in the art's technical problem to be solved.
Summary of the invention
For overcome the deficiencies in the prior art, one of the objects of the present invention is to provide a kind of virtual resources based on P2P Access method can solve the technical issues of crossing internet externally provides access under complicated Network status.
The second object of the present invention is to provide a kind of virtual resource access system based on P2P, can solve in complexity Network status under crossing internet the technical issues of access is externally provided.
The third object of the present invention is to provide a kind of computer readable storage medium, can solve in the network-like of complexity Crossing internet externally provides the technical issues of access under condition.
An object of the present invention adopts the following technical scheme that realization:
A kind of virtual resource access method based on P2P, comprising the following steps:
Receiving step: the P2P connection request that user terminal is sent is received;
Connection Step: judging whether the user terminal has connection qualification, if it is, calling P2PAgent program with reality The P2P of existing user terminal and virtual machine is accessed;The P2PAgent program is realized using WEBRTC technology or birthday attack algorithm P2P is passed through, and is then established stable point-to-point connection using OPENVPN or is directly supervised using the flow retransmission technique of Relay The RDP of client is listened to request to realize point-to-point connection.
It further, before the step of receiving further include registration step, the registration step mainly comprises the steps that
The activation P2P solicited message that receiver management terminal is sent;
According to the application ID of activation P2P solicited message registration P2P, and registration heartbeat is sent to SignalServer;
The application ID of P2P is returned to management end.
Further, the SignalServer is for assisting discovery node and forwarding P2P interactive information to wear to complete P2P More process.
Further, the application ID of the P2P generates the first two dimensional code by encryption and is shown;Management end is by the one or two Dimension code is converted to the second two dimensional code to be shared with user terminal.
Further, second two dimensional code is management end by carrying out the two dimensional code of derivative generation to the first two dimensional code, Second two dimensional code includes use time and the login user of user terminal.
Further, the user terminal is provided with P2P module, and the P2P module connects for realizing with the P2P of virtual machine It connects.
The second object of the present invention adopts the following technical scheme that realization:
A kind of virtual resource access system based on P2P, including management end, user terminal and virtual machine;The management end is used In activation P2P, nullify P2P, obtain P2P application ID with share the application ID of P2P to user terminal;The virtual machine is for passing through P2PAgent program is called to realize the P2P access of user terminal and virtual machine, the P2PAgent program uses WEBRTC technology Perhaps birthday attack algorithm realizes that P2P is passed through and then establishes stable point-to-point connection using OPENVPN or use Relay Flow retransmission technique directly monitor client RDP request to realize point-to-point connection.
Further, further include SignalServer, the SignalServer for assist the system discovery node and P2P interactive information is forwarded to pass through process to complete P2P.
The third object of the present invention adopts the following technical scheme that realization:
A kind of computer readable storage medium, is stored thereon with computer program, and the computer program is held by processor The virtual resource access method based on P2P as described in any one in one of the object of the invention is realized when row.
Compared with prior art, the beneficial effects of the present invention are:
Virtual resource access method based on P2P of the invention by by WEBRTC+OpenVPN, birthday attack algorithm+ Tri- kinds of schemes of OpenVPN and Relay are encapsulated as stand-alone program P2PAgent, using or call directly with complete P2P access stream Journey.
Detailed description of the invention
Fig. 1 is the flow chart of the virtual resource access method based on P2P of embodiment one;
Fig. 2 is the timing diagram using P2P connected reference virtual machine of embodiment one;
Fig. 3 is that the virtual resource based on P2P of embodiment two accesses the architecture diagram of system;
Fig. 4 is the user terminal of embodiment two and the functional schematic of management end;
Fig. 5 is that the management end two dimensional code of embodiment two shares schematic diagram.
Specific embodiment
In the following, being described further in conjunction with attached drawing and specific embodiment to the present invention, it should be noted that not Under the premise of conflicting, new implementation can be formed between various embodiments described below or between each technical characteristic in any combination Example.
Embodiment one:
Explanation of technical terms involved by the present embodiment:
PowerONE- wisdom basis cloud;
Pispower-Pispower is distributed PaaS cloud computing technology;
PowerONE VRS-VRS (Virtual Resource Share) virtual resource Sharing Management platform;
P2P-point to point network access;
VPN-Virtual Private Network mechanics of communication;
WEBRTC-open source P2P integrated framework;
NAT-Network Address Translation, network address translation;
STUN- (UDP of Simple Traversal of UDP over NATs, NAT are passed through) is a kind of network protocol;
SignalServer-assistance p2p carries out the server of authentication information distribution;
TURN-Traversal Using Relay NAT, that is, pass through Relay mode passing through NAT.
Currently, in the point-to-point acrossing schemes of P2P, comparative maturity and it is universal be achieved in that through UDP acrossing schemes, One is left under oneself NAT device after intranet host sends data to outer net using the Session working mechanism of NAT device Record, so that the data for receiving outer net forward a packet to the host of Intranet.Classify according to the Session working mechanism of NAT device, it is main It is divided into full cone, limitation taper, Port Restricted Cone and four kinds of symmetric pyramid.For in both ends (Peer) combination of two, always 16 kinds of combinations are shared, wherein symmetric form vs symmetric form, port limitation vs symmetric form can not set up P2P connection.Cause This, applicant proposes that following scheme solves:
1, most P2P connection is realized using the WEBRTC technology based on Simple Traversal of UDP Through Network Address Translators;
2, port restricted type vs symmetric form P2P connection type is solved using birthday attack algorithm;
3, using TURN method, when that can not carry out P2P and pass through, accessed in a manner of Relay (flow forwarding).Under It states in specific embodiment and specifically aforesaid way is illustrated.
As depicted in figs. 1 and 2, a kind of virtual resource access method based on P2P, including following step are present embodiments provided It is rapid:
S1: the P2P connection request that user terminal is sent is received;When user need to access designated virtual machine can there are two types of side Formula is attached, and one is P2P connection request is directly transmitted, there are also one is by scanning corresponding two-dimensional barcode information then To carry out P2P connection request;Both modes are all to need further to be authenticated, to detect whether active user has connection Qualification.
S2: judging whether the user terminal has connection qualification, if it is, calling P2PAgent program to realize user End and the P2P of virtual machine are accessed;The P2PAgent program realizes that P2P is worn using WEBRTC technology or birthday attack algorithm More, it then establishes stable point-to-point connection using OpenVPN or directly monitors client using the flow retransmission technique of Relay The RDP at end is requested to realize point-to-point connection.Core emphasis in the present embodiment is the P2PAgent program of encapsulation, due to symmetrical Type vs symmetric form, port limitation vs symmetric form can not set up P2P connection, so by P2PAgent program to realize P2P is passed through.
The P2PAgent program includes three kinds of connection schemes: WEBRTC+OpenVPN, birthday attack algorithm+OpenVpn With tri- kinds of schemes of Relay, these three connection schemes are specifically addressed below.
WEBRTC+OpenVPN scheme is attempted P2P using Stun agreement by WEBRTC frame and is passed through, when passing through success Afterwards, IP and port that both ends P2P goes out public network are obtained, then establishes point-to-point VPN tunnel using the port for going out public network using both ends Road.
Birthday attack algorithm carries out port conjecture based on following scene, fixed source port at the restricted type of port so that Network interface is constant out, and symmetric form switches N number of source port and externally gives out a contract for a project so that out outer net port have it is N number of, as long as therefore from conjecture to its Middle a port can successfully realize that P2P is passed through.According to the model of birthday attack algorithm, guess in total 65535 ports to Few how many a ports can make the probability for guessing one be greater than 99%.When obtain both ends establish P2P go out public network IP and end After mouthful, establishes vpn tunneling and realize RDP access.
RELAY scheme, RELAY are a kind of schemes of flow forwarding based on WEBRTC, and the RDP for directly monitoring client is asked It asks, is encrypted to binary data, virtual generator terminal is forwarded to by RELAY scheme, then binary data is reduced into the number of RDP According to stream, the RDP service processes of virtual machine are sent to, when taking the response of RDP, by the same mode by the data response of RDP To at client.
Due to needing to verify identity in entire treatment process, if Fig. 2 is the timing using P2P connected reference virtual machine Figure, so know that before step S1 further include registration step: the registration step mainly comprises the steps that
The activation P2P solicited message that receiver management terminal is sent;
According to the application ID of activation P2P solicited message registration P2P, and registration heartbeat is sent to SignalServer;
The application ID of P2P is returned to management end.Management end or user terminal are accessed by registering to SignalServer Into the system.The SignalServer is for assisting discovery node and forwarding P2P interactive information to pass through stream to complete P2P Journey.
The application ID of the P2P generates the first two dimensional code by encryption and is shown;Management end converts the first two dimensional code User terminal is shared with for second two dimensional code.Second two dimensional code is management end by carrying out derivative generation to the first two dimensional code Two dimensional code, second two dimensional code include user terminal use time and login user.Due to the application ID of P2P belong to it is quick Information is felt, therefore IAAS management platform encrypts generation two dimensional code by specified mode and is shown, then by corresponding product It takes and records sweep, use time and the login user etc. shared by derivative two dimensional code and control the user.It is logical It crosses mode derived from secondary encryption and enables to management end and the boundary of user terminal more apparent, and management end can be more Effective control user terminal uses time and rule.In the present embodiment, management end is generally referred to as the management in the system The role of person, can Iaas management platform realize various management functions, user terminal refers to general user, generally needs When accessing corresponding resources of virtual machine, needs to think that management end is requested, corresponding resources of virtual machine is distributed by management end Two-dimensional barcode information is given to user terminal, then carries out P2P access.
The user terminal is provided with P2P module, and the P2P module connect for realizing with the P2P of virtual machine.P2P's The end Client function (that is to say the user terminal illustrated in the present embodiment) is integrated into software inhouse as basic module, in conjunction with it His product pushes application ID to user terminal by way of barcode scanning, and the P2P connection of P2P module and virtual machine is used by user terminal, Then access virtual machine RDP by the channel of P2P, realize the use of virtual resource.
The present invention utilizes P2P technology, can break through since complex network environment is so as to cause without the calculating money divided mutually Source connects, and provides the network access mode of low latency, low cost, high expansion.And utilize port conjecture and TURN Technology improves the chance of success of P2P, expands application range.
Embodiment two:
As shown in figure 3, present embodiments providing a kind of virtual resource access system based on P2P, including management end, user End and virtual machine;The management end be used to activating P2P, nullify P2P, obtain the application ID of P2P with shares the application ID of P2P to use Family end;The virtual machine is used to realize the P2P access of user terminal and virtual machine by calling P2PAgent program, described P2PAgent program realizes that P2P is passed through using WEBRTC technology or birthday attack algorithm, is then established and is stablized using OPENVPN Point-to-point connection or using Relay flow retransmission technique directly monitor client RDP request to realize point-to-point company It connects.
And it as can be seen from FIG. 3, can be seen that virtual resource is shared on virtual resource sharing frame composition figure and be divided into three parts:
The p2p function of virtual machine is managed from Iaas management system.
By IAAS system administration P2P application ID.
User carries out p2p connection using application ID and specified virtual machine from PC, and accesses.Wherein IASS management system namely the management end as described in this embodiment referred to.
It further include SignalServer other than above system structure, the SignalServer is for assisting the system It was found that node and forwarding P2P interactive information pass through process to complete P2P.
In the case that all-in-one machine does not bind public network IP, the resources of virtual machine of extraction is can not externally to provide access, is made The usage scenario for obtaining virtual resource is restricted, and the present embodiment system help client (that is to say institute's user terminal in the present embodiment) It directly establishes and connection is accessed to the P2P of virtual resource, break through network limitation.Back end by SignalServer register come It is linked into the system, all back end in all-in-one machine manage platform by IAAS and are managed.Each back end from The unique application ID obtained at IAAS, and registered using application ID to SignalServer.Connectionist manages from IAAS in system The two dimensional code that the application ID is obtained at platform, is shared with other users, and other users is allowed to obtain the permission for accessing the back end. It is illustrated in figure 5 specific two dimensional code and shares schematic diagram.
As shown in figure 4, left figure is that IAAS administrator is managed the P2P function of cloud host on Use Case Map, work as user (user terminal) is directly accessed using P2P function after taking two dimensional code from IAAS administrator.
In order to be managed to shared virtual resource, it includes that PowerVIew and VRS are externally provided that IAAS, which manages platform, The functions such as calculating, storage.Therefore, the correlation function of P2P include activation, cancellation and application ID acquisition with share, as flat The basic module of platform is realized, manages the life cycle of P2P by the user of IAAS platform.Adjust the firewall of all-in-one machine, wound It builds the virtual machine of P2P access and is shared.
When carrying out shared process design, elder generation and all-in-one machine user is needed to sign the agreement of resource-sharing;And according to association View, IAAS administrator is upgraded to indicated release for platform is managed, and adjusts firewall configuration;It is then introduced into and installs software Virtual machine template starts P2P function after being created that virtual machine according to template, application ID is shared with machine user of service, finally User of service carries out P2P access virtual machine by corresponding software product.
Embodiment three:
Embodiment three discloses a kind of computer readable storage medium, and the storage medium is for storing program, and the journey When sequence is executed by processor, the virtual resource access method based on P2P of embodiment one is realized.
Certainly, a kind of storage medium comprising computer executable instructions, computer provided by the embodiment of the present invention The method operation that executable instruction is not limited to the described above, can also be performed in method provided by any embodiment of the invention Relevant operation.
By the description above with respect to embodiment, it is apparent to those skilled in the art that, the present invention It can be realized by software and required common hardware, naturally it is also possible to which by hardware realization, but in many cases, the former is more Good embodiment.Based on this understanding, technical solution of the present invention substantially in other words contributes to the prior art Part can be embodied in the form of software products, which can store in computer readable storage medium In, floppy disk, read-only memory (Read-Only Memory, ROM), random access memory (Random such as computer Access Memory, RAM), flash memory (FLASH), hard disk or CD etc., including some instructions use so that an electronic equipment (can be personal computer, server or the network equipment etc.) executes method described in each embodiment of the present invention.
It is worth noting that, in the above-mentioned embodiment based on content update notice device, included each unit and mould Block is only divided according to the functional logic, but is not limited to the above division, and is as long as corresponding functions can be realized It can;In addition, the specific name of each functional unit is also only for convenience of distinguishing each other, the protection model being not intended to restrict the invention It encloses.
The above embodiment is only the preferred embodiment of the present invention, and the scope of protection of the present invention is not limited thereto, The variation and replacement for any unsubstantiality that those skilled in the art is done on the basis of the present invention belong to institute of the present invention Claimed range.

Claims (9)

1. a kind of virtual resource access method based on P2P, which comprises the following steps:
Receiving step: the P2P connection request that user terminal is sent is received;
Connection Step: judging whether the user terminal has connection qualification, if it is, calling P2PAgent program to realize use The P2P of family end and virtual machine access;The P2PAgent program realizes that P2P is worn using WEBRTC technology or birthday attack algorithm More, it then establishes stable point-to-point connection using OpenVPN or directly monitors client using the flow retransmission technique of Relay The RDP at end is requested to realize point-to-point connection.
2. the virtual resource access method based on P2P as described in claim 1, which is characterized in that before the step of receiving also Including registration step, the registration step is mainly comprised the steps that
The activation P2P solicited message that receiver management terminal is sent;
According to the application ID of activation P2P solicited message registration P2P, and registration heartbeat is sent to SignalServer;
The application ID of P2P is returned to management end.
3. the virtual resource access method based on P2P as claimed in claim 2, which is characterized in that the SignalServer For assisting discovery node and forwarding P2P interactive information to pass through process to complete P2P.
4. the virtual resource access method based on P2P as claimed in claim 2 or claim 3, which is characterized in that the application of the P2P ID generates the first two dimensional code by encryption and is shown;First two dimensional code is converted to the second two dimensional code to be shared with use by management end Family end.
5. the virtual resource access method based on P2P as claimed in claim 4, which is characterized in that second two dimensional code is Management end is by carrying out the two dimensional code of derivative generation to the first two dimensional code, when second two dimensional code includes the use of user terminal Between and login user.
6. the virtual resource access method based on P2P as claimed in claim 4, which is characterized in that the user terminal is provided with P2P module, the P2P module connect for realizing with the P2P of virtual machine.
7. a kind of virtual resource based on P2P accesses system, which is characterized in that including management end, user terminal and virtual machine;It is described Management end be used for activate P2P, nullify P2P, obtain P2P application ID with share the application ID of P2P to user terminal;The virtual machine For realizing the P2P access of user terminal and virtual machine by calling P2PAgent program, the P2PAgent program is used WEBRTC technology perhaps birthday attack algorithm realize P2P pass through then using OPENVPN establish stable point-to-point connection or It is requested using the RDP that the flow retransmission technique of Relay directly monitors client to realize point-to-point connection.
8. the virtual resource based on P2P accesses system as claimed in claim 7, which is characterized in that further include SignalServer, the SignalServer are for assisting the system discovery node and forwarding P2P interactive information to complete P2P Pass through process.
9. a kind of computer readable storage medium, is stored thereon with computer program, it is characterised in that: the computer program quilt The virtual resource access method based on P2P as claimed in any one of claims 1 to 6 is realized when processor executes.
CN201811100161.2A 2018-09-20 2018-09-20 A kind of virtual resource access method and device based on P2P Pending CN109510810A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811100161.2A CN109510810A (en) 2018-09-20 2018-09-20 A kind of virtual resource access method and device based on P2P

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811100161.2A CN109510810A (en) 2018-09-20 2018-09-20 A kind of virtual resource access method and device based on P2P

Publications (1)

Publication Number Publication Date
CN109510810A true CN109510810A (en) 2019-03-22

Family

ID=65746087

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811100161.2A Pending CN109510810A (en) 2018-09-20 2018-09-20 A kind of virtual resource access method and device based on P2P

Country Status (1)

Country Link
CN (1) CN109510810A (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2011100742A2 (en) * 2010-02-15 2011-08-18 Damaka,Inc System and method for signaling and data tunneling in a peer-to-peer environment
CN102664901A (en) * 2012-05-15 2012-09-12 苏州工业园区云视信息技术有限公司 Method for adaptive traversal through network address translator (NAT) in session initiation protocol (SIP) call
CN104408777A (en) * 2014-11-27 2015-03-11 凯拔(中国)科技有限公司 Internet attendance management system and method based on P2P communication realized by NAT traversal
CN104717311A (en) * 2013-12-12 2015-06-17 中国移动通信集团公司 NAT traversal method, network node and system
CN105141711A (en) * 2015-08-24 2015-12-09 北京息通网络技术有限公司 Symmetrical NAT traversal method and system based on big data analysis
CN106210092A (en) * 2016-07-19 2016-12-07 天彩电子(深圳)有限公司 A kind of P2P traversing method merging UPNP and STUN and system thereof
CN106612340A (en) * 2015-10-22 2017-05-03 财团法人工业技术研究院 Method for penetrating network position converter and communication device
CN107343027A (en) * 2017-06-13 2017-11-10 福建省天晴互动娱乐有限公司 APP sharing methods

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2011100742A2 (en) * 2010-02-15 2011-08-18 Damaka,Inc System and method for signaling and data tunneling in a peer-to-peer environment
CN102664901A (en) * 2012-05-15 2012-09-12 苏州工业园区云视信息技术有限公司 Method for adaptive traversal through network address translator (NAT) in session initiation protocol (SIP) call
CN104717311A (en) * 2013-12-12 2015-06-17 中国移动通信集团公司 NAT traversal method, network node and system
CN104408777A (en) * 2014-11-27 2015-03-11 凯拔(中国)科技有限公司 Internet attendance management system and method based on P2P communication realized by NAT traversal
CN105141711A (en) * 2015-08-24 2015-12-09 北京息通网络技术有限公司 Symmetrical NAT traversal method and system based on big data analysis
CN106612340A (en) * 2015-10-22 2017-05-03 财团法人工业技术研究院 Method for penetrating network position converter and communication device
CN106210092A (en) * 2016-07-19 2016-12-07 天彩电子(深圳)有限公司 A kind of P2P traversing method merging UPNP and STUN and system thereof
CN107343027A (en) * 2017-06-13 2017-11-10 福建省天晴互动娱乐有限公司 APP sharing methods

Similar Documents

Publication Publication Date Title
CN110351191B (en) Network configuration method, system, device and storage medium
CN110191007B (en) Node management method, system and computer readable storage medium
CN112511611B (en) Communication method, device and system of node cluster and electronic equipment
CN104580192B (en) The treating method and apparatus of the network access request of application program
EP3275162B1 (en) Systems and techniques for web communication
US11856065B2 (en) Data transmission for service integration between a virtual private cloud and an intranet
CN109831548B (en) Virtual content delivery network vCDN node establishment method and server
CN106790420B (en) A kind of more session channel method for building up and system
CN108780410A (en) The network virtualization of container in computing system
CN111428225A (en) Data interaction method and device, computer equipment and storage medium
CN112583618B (en) Method, device and computing equipment for providing network service for business
WO2020253631A1 (en) Configuration method, device, and system for ip address
CN103973785B (en) A kind of log read system and method based on P2P
CN113472817A (en) Gateway access method and device for large-scale IPSec and electronic equipment
Makowski et al. Evaluation of virtualization and traffic filtering methods for container networks
Chen et al. PacketCloud: A cloudlet-based open platform for in-network services
CN108734023A (en) A kind of access of Encrypted Database System and integrated system and method
JP2020505856A (en) Service endpoint interconnection with virtual private gateway
CN107249038A (en) Business datum retransmission method and system
CN114338682A (en) Flow identity mark transmission method and device, electronic equipment and storage medium
CN114500527A (en) Out-of-band management system and method for edge device
CN105610945A (en) Search traffic access localization processing method and device
CN115242882B (en) Method and device for accessing k8s container environment based on transport layer route
CN109510810A (en) A kind of virtual resource access method and device based on P2P
CN110557462A (en) distributed access system based on public agent

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190322