CN109842548B - Method and system for carrying multiple data streams on QQ network telephone - Google Patents

Method and system for carrying multiple data streams on QQ network telephone Download PDF

Info

Publication number
CN109842548B
CN109842548B CN201910192913.0A CN201910192913A CN109842548B CN 109842548 B CN109842548 B CN 109842548B CN 201910192913 A CN201910192913 A CN 201910192913A CN 109842548 B CN109842548 B CN 109842548B
Authority
CN
China
Prior art keywords
data
bits
data packet
type
stream
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910192913.0A
Other languages
Chinese (zh)
Other versions
CN109842548A (en
Inventor
崔竞松
孙楷晨
郭崎
郭迟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan University WHU
Original Assignee
Wuhan University WHU
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan University WHU filed Critical Wuhan University WHU
Priority to CN201910192913.0A priority Critical patent/CN109842548B/en
Publication of CN109842548A publication Critical patent/CN109842548A/en
Application granted granted Critical
Publication of CN109842548B publication Critical patent/CN109842548B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention provides a method and a system for carrying multiple data streams on a QQ network telephone, which are characterized in that key attributes are extracted through identifying and analyzing UDP data packet contents in QQ network voice streams, a feature template is constructed based on the key attributes, a constructed data packet which can be verified through QQ is generated according to the feature template, the contents in the constructed data packet comprise information of extended services, and thus the multiple data streams are carried in the QQ voice streams. The invention can fully utilize the network capability of the QQ, and has the advantages of simplicity, practicability, strong reliability, small influence on the normal communication quality, convenience for expanding the service types and the like.

Description

Method and system for carrying multiple data streams on QQ network telephone
Technical Field
The invention belongs to the field of computer networks, and particularly relates to a method and a system for carrying multiple data streams on a network telephone multimedia stream.
Background
With the continuous development of computer network technology and the popularization of the internet, the internet phone gradually replaces the original function of making a call by a mobile phone by virtue of the characteristics of stability, low price, convenience and the like. With the east wind of mobile social media, QQ network speech has enjoyed great success in the network multimedia market. With the rise of the mobile instant messaging, the problem of limitation of the network multimedia providing service types is also present in the front of people.
The QQ audio engine is very mature in data transmission processing in voice call after years of experiments and polishing, and has strong network capability. The research on the QQ network voice communication is mainly focused on a protocol analysis layer at present, which brings great obstacles to carrying multiple data streams in multimedia data streams, limits the expansion of QQ voice service types and wastes QQ network capacity resources.
Disclosure of Invention
To enable the expansion of the traffic class by means of the network capabilities of the QQ, the present invention provides a method and system for piggybacking multiple data streams in QQ voice telephony.
The technical scheme of the invention provides a method for carrying multiple data streams on a QQ network telephone, which comprises the steps of extracting key attributes through identifying and analyzing UDP data packet contents in QQ network voice streams, constructing a characteristic template based on the key attributes, generating a constructed data packet which can be verified through QQ according to the characteristic template, wherein the contents in the constructed data packet comprise information of extended services, and thus, the multiple data streams are carried in the QQ voice streams.
The transmitting side transmits a QQ voice stream carrying multiple data streams, and the receiving side recognizes a configuration packet in the multiple data streams to obtain extended service information.
Moreover, in order to successfully mount multiple data streams, it is agreed to distinguish normal data streams from mounted multiple data streams by watermarks at the transmitting end and the receiving end.
Moreover, the building of the feature template based on the key attributes and the generation of the construction data packet capable of being verified by QQ according to the feature template comprise the steps of classifying the content of the UDP data packet into the following types according to the features, correspondingly filling the construction data packet capable of being verified by QQ according to the type when the construction data packet is generated,
type one, data bits that are invariant in all packets in the QQ voice data stream;
type two, data bits that are not changed in the QQ voice data stream but are changed after the data stream is changed, i.e. data bits are changed between data streams, and the data bits are not related to each other between different data streams;
type three, data bits that do not change in the QQ voice data stream but change after the data stream changes, i.e. data bits change between data streams and are associated with each other between different data streams;
type four, which will change in each packet in the QQ voice data stream, but only the associated data bits in one packet;
type five, there are data bits that will change in each data packet in the QQ voice data stream, but there are associations between data packets;
type six, there are data bits that change in each data packet in the QQ voice data stream without any association between the data.
Furthermore, for long packets beginning with 0x5b, the data bits comprising type one, type two, type four, type five and type six are measured, and the corresponding padding by type is implemented as follows,
for the data bits of type one, only the values of the corresponding positions are required to be recorded and filled into the constructed data packet, wherein the constructed data packet comprises the 1 st, 4-5 th, 18-20 th, 22 th, 29 th and 32 th bits of the data packet content and the last two bits of the data packet;
for the data bits of type two, after the QQ voice data stream is acquired each time, recording the values of 11-14 bits of the data packet in the normal data stream, and then filling the values into 11-14 bits of the constructed data packet;
for the data bits of type four, calculating the length of the content part of the construction data packet, and filling the length into 2-3 bits of the construction data packet;
for the data bits of type five, when filling the sequence number, generating two sequence numbers which are respectively 0x00000000 and 0x0000, respectively filling the two sequence numbers with 6-9 bits and 23-24 bits of the constructed data packet each time, and respectively filling the next constructed data packet after adding one; when the time number is filled, acquiring the time number of 14-16 bits of a data packet in the normal data stream, and then adding one to the time number every 256/60 seconds to fill the 14-16 bits of the data packet;
for the data bits with the type six, when the network type is filled, the network environments of both communication parties are determined, and corresponding filling is carried out; the 17 th, 25-28 th, 30-31 th and 33 rd bits of the packet are padded with random numbers.
Then, the information representing different extended services is filled into the non-characteristic bits of which the last two bits are removed after the 33 th bit.
And, fill the covert information into the non-characteristic bit, realize the file transmission of the safe covert through the multiple data stream.
The invention also proposes to protect a system for carrying multiple data streams on a QQ network telephone, for implementing the above method.
The invention specifically obtains the characteristic template of the data packet content by researching the UDP (User Datagram Protocol) data packet content in the QQ voice data stream, and provides a method for carrying multiple data streams in the QQ voice telephone. Because the invention firstly proposes to construct the data packet by determining the UDP data packet content characteristic template so as to carry multiple data streams, the invention has the following advantages:
1) the method is suitable for all situations using QQ voice as a channel, can realize the carrying of multiple data streams as long as QQ voice data streams exist, and is a method with strong universality.
2) The characteristic template induces all key elements of the QQ voice communication flow, and the constructed data packet can achieve the effect of normal transmission through the detection of the QQ voice server.
3) Multiple data streams are carried in a normal voice call stream, new communication connection is not generated when the multiple data streams are established, a normal voice data packet is not tampered, the influence on the voice communication quality is small, and the method is simple, practical and high in reliability.
4) By means of the strong network capability of QQ, the service types can be conveniently and flexibly expanded by carrying multiple data streams.
Drawings
FIG. 1 is a diagram of a long packet structure where qq begins with 0x5b, according to an embodiment of the present invention;
fig. 2 is a flow chart of multiple data stream loading and receiving according to an embodiment of the present invention.
Detailed Description
The technical scheme of the invention is explained in detail in the following by combining the drawings and the embodiment.
The embodiment provides a method for carrying multiple data streams on a QQ network telephone, which extracts key attributes by identifying and analyzing UDP data packet contents in a QQ network voice stream, constructs a feature template based on the attributes to generate a constructed data packet which can be verified by QQ, and thus carries multiple data streams in the QQ voice stream. The content in the configuration data packet includes information of the extended service.
Traditional research is mainly focused on communication protocol headers and protocol rules, and the method specifically analyzes the content of UDP data packets, so that multiple data streams can be carried on a QQ network telephone, and the network capability of the QQ is fully utilized. The method has the advantages of simplicity, practicability, strong reliability, small influence on the normal communication quality, convenience in expanding the service types and the like.
The implementation of the embodiment can be considered to comprise the following stages:
(1) and (3) a QQ voice data packet content analysis stage: and extracting key features of the QQ voice data packet to obtain a feature template.
Based on the method for identifying the data packet content, key attributes of the QQ voice stream, such as an identification bit, a session value, a packet length value, a callback bit, a sequence number, a time number, a network type number and the like, are extracted, and based on the attributes, a feature template for constructing a data packet in multiple data streams is constructed.
(2) Carrying multiple data streams: and filling corresponding data bits in the constructed data packet according to the characteristic template, adding the watermark to the constructed data packet, and loading the constructed data packet in a normal data stream to obtain multiple data streams.
And after a QQ voice data packet characteristic template is obtained, filling characteristic bits according to the rule of the characteristic template, filling non-characteristic bits by using the extended service information to obtain a data packet which accords with a QQ voice communication protocol, adding a watermark to the constructed data packet, and carrying the data packet in a normal voice data stream.
(3) The receiver identifies, receives and constructs the data packet stage: and identifying the constructed data packet in the multiple data streams to obtain the extended service information.
And the receiver identifies the watermark for constructing the data packet through a watermark checking algorithm. Namely, the data packet is subjected to check value calculation through a watermark checking algorithm, and the extended service information is obtained after the constructed data packet in the multiple data streams is identified.
For ease of reference, the following provides a detailed design description of the embodiments:
one, obtain QQ voice data stream
In order to obtain the QQ voice data packet content characteristic template, the invention needs to find the data stream of the QQ voice communication packet in each data stream of communication as a research object. Since the source ip, the destination ip, the source port and the destination port of a network communication flow are often fixed, in the present invention, a set including a specific source ip, a specific destination ip, a specific source port and a specific destination port is called a flow identifier, i.e. the flow identifier is { srcIp, desIp, srcPort, desPort }. Wherein, srcIp is a specific source ip, desIp is a destination ip, srcPort is a source port, and desPort is a destination port.
Therefore, only the data packet with the same flow identification and larger flow is intercepted as a research object.
Similarly, in the stages of loading multiple data streams by the sender and identifying and receiving multiple data streams by the receiver, the existence of the QQ voice data stream is also obtained by the method, so that multiple data streams are loaded and identified and received in the normal communication stream.
Secondly, obtaining a QQ voice data packet content characteristic template
1. Classification of packet content
After the QQ voice data stream is obtained, the data packet content of the data stream needs to be identified, the two data streams are taken as an example for comparison and analysis, the content of the data packet can be divided into different types according to characteristics, and for the different types, the data packet can be filled according to corresponding rules to obtain a structural data packet for carrying multiple data streams. The data packet contents can be specifically classified into the following types:
type one, data bits that are unchanged in all packets in the QQ voice data stream.
Type two, data bits that do not change in the QQ voice data stream but change after the data stream changes, i.e., data bits change from data stream to data stream, and the data bits are not related to each other between different data streams.
Type three, data bits that do not change in the QQ voice data stream but change after the data stream changes, i.e., data bits change from one data stream to another, and the data bits are related to each other between different data streams.
Type four, changes occur within each packet in the QQ voice data stream, but only the associated data bits within one packet.
Type five, there are data bits that change within each packet in the QQ voice data stream, but there are associations between packets.
Type six, there are data bits that change in each data packet in the QQ voice data stream without any association between the data.
Six rules are summarized according to different rule characteristics of contents in the data packet, and corresponding filling rules are provided according to different types when the characteristic bits are actually filled.
2. Data packet characteristic template
Referring to fig. 1, the example results in a long packet feature template beginning with 0x5 b:
(1) determining type one data bits
The identification bit is a data bit of type one, located in the first byte, which identifies that this is a QQ voice data stream, and the identification bit of the data packet is 0x5 b.
The 4 th to 5 th bits, 18 th to 20 th bits, 22 th bit, 29 th bit, 32 th bit and the last two bits of the data packet are also data bits of type one, and never change in the QQ voice stream data packet. The 4 th to 5 th bits are 0x0101, the 18 th to 20 th bits are 0x50033e, the 22 th bit is 0x25, the 29 th bit is 0x00, the 32 th bit is 0x00, and the last two bits of the data packet are 0x 0000.
(2) Determining data bits of type two
The session value is a data bit of type two, the session is a part of which the value is unchanged in the same QQ voice communication process, but the value is changed after the QQ voice communication connection is reestablished, a session is identified, the session value is located at 11-14 bits of a data packet, and the content of the data bit of each communication session is not fixed.
(3) Determining data bits of type three
There are no type three data bits in the packet.
(4) Determining data bits of type four
The length value is a type four bit, which represents the length of the packet contents, i.e., the length of payload in udp packet. The length value is located at bits 2-3 of the packet.
(5) Data bits of type five
The sequence number is a type five data bit, and the sequence number represents the sequence between data packets, and the values between adjacent data packets are usually sequential, that is, the sequence number bits of a series of data packets obtained under the condition of network stability should be roughly sequential. The sequence number is located in bits 6-9 and 23-24 of the packet.
The time number is a data bit of type five, and the time number is related to the current time and is located in 14-16 bits of the data packet. Typically, every minute, one is added to the 15 th position.
(6) Determining data bits of type six
The network type number is a data bit of type six, the network type number is related to the network environment of the two communication parties and is located at the 21 st bit of the data packet, and the bit is 0x01 when the two communication parties use wifi as network access in an experiment; when one of the parties uses 4G for network access, the bit is 0x 03.
The 17 th bit, 25-28 th bit, 30-31 th bit and 33 th bit of the data packet are data bits of type six, and the content is random.
The data bits of the data packet 33 bits later, except the last two bits, are also data bits of type six. The portion of the characteristic bits in the data packet is typically in front of the data packet and is fixed in length. The remainder are referred to as the non-feature bits. The data bits of the data packet 33 bits later except the last two bits are all non-feature bits, and can be filled correspondingly according to different expansion functions.
Carrying and receiving multiple data streams
After the template of the QQ data packet is measured, the invention loads multiple data streams on the QQ network telephone according to the characteristic template as one application of the template. In order to successfully piggyback multiple data streams, the receiving mode needs to be agreed at the transmitting end and the receiving end to distinguish the normal data streams from the multiple data streams piggybacked by the present invention. In particular, the data streams may be distinguished by watermarks.
Referring to fig. 2, in the embodiment, when the sender detects a QQ language data stream, the characteristic bits of the data packet are constructed according to the characteristic template padding, including padding the characteristic bits according to a long data packet characteristic template beginning with 0x5b, that is, padding 33 bits of the data packet and the previous and last bits. The specific filling mode is as follows:
for the data bit of type one, since the data bit of this type never changes in the QQ voice, only the value of the corresponding position needs to be recorded and filled in the configuration packet. Namely, the first bit is 0x5b, the 4 th to 5 th bits are 0x0101, the 18 th to 20 th bits are 0x50033e, the 22 th bit is 0x25, the 29 th bit is 0x00, the 32 th bit is 0x00, and the last two bits of the data packet are 0x 0000.
For the data bits of type two, after each acquisition of the QQ voice data stream, the session value of 11-14 bits of the data packet in the normal voice data stream is recorded and then filled into 11-14 bits of the constructed data packet.
For the data bit of type four, the length of the content part of the construction data packet is calculated and filled in 2-3 bits of the construction data packet.
For the data bits of type five, when filling the sequence number, two sequence numbers, 0x00000000 and 0x0000 respectively, are required to be generated, each time the two sequence numbers are respectively filled with 6-9 bits and 23-24 bits of the construction data packet, and the next construction data packet is respectively filled after adding one. When the time number is filled, the time number of 14-16 bits of the data packet in the normal voice stream needs to be acquired, and then every 256/60 seconds, the time number is added by one to be filled into 14-16 bits of the constructed data packet.
For the data bit of type six, when the type of the network is filled, the network environments of two communication parties need to be determined, and when the two communication parties use WIFI as network access, a 21 st bit of a data packet is constructed and is filled with 0x 01; when a communication party uses 4G as network access, the 21 st bit of the data packet is filled with 0x 03. The 17 th, 25-28 th, 30-31 th and 33 rd bits of the packet are padded with random numbers.
Then, the information representing different extended services is filled into 33 bits of non-characteristic bits, and the last two bits are removed. And finally, adding a watermark to the data packet, and carrying the watermark in a normal QQ voice data stream to smoothly reach a receiving party.
And after the receiver detects the QQ voice data stream, identifying a data packet of the normal stream and a construction data packet of the multi-data stream through a watermark checking algorithm. And extracting the non-characteristic bit part in the constructed data packet of the multiple data streams to obtain corresponding extended service information without processing the data packet of the normal stream. For example, the covert information is filled into non-characteristic bits, and the file transmission of the security covert is realized through multiple data streams. Preferably, the watermarking algorithm may employ a CRC (Cyclic Redundancy Check) method.
In specific implementation, the sending and receiving processes can adopt software technology to realize automatic operation flow. A system for piggybacking multiple data streams on a QQ network phone may also be provided in a modular fashion, for example, the system comprising a transmit side module and a receive side module. The sending end module is used for extracting key attributes through identifying and analyzing UDP data packet contents in the QQ network voice stream, constructing a characteristic template based on the key attributes, generating a constructed data packet which can be verified through QQ according to the characteristic template, wherein the contents in the constructed data packet comprise information of extended services, so that multiple data streams are carried in the QQ voice stream, and the QQ voice stream carrying the multiple data streams is sent. The receiving module is used for identifying the constructed data packet in the multi-data stream to obtain the extended service information.
The specific embodiments described herein are merely illustrative of the spirit of the invention. Various modifications or additions may be made to the described embodiments or alternatives may be employed by those skilled in the art without departing from the spirit or ambit of the invention as defined in the appended claims.

Claims (7)

1. A method for piggybacking multiple data streams on a QQ network phone, comprising: extracting key attributes through identifying and analyzing UDP data packet contents in the QQ network voice stream, constructing a feature template based on the key attributes, generating a constructed data packet which can be verified through QQ according to the feature template, wherein the contents in the constructed data packet comprise information of extended services, and thus carrying multiple data streams in the QQ voice stream;
the method comprises the steps of constructing a feature template based on key attributes, generating a construction data packet capable of being verified by QQ according to the feature template, dividing the content of a UDP data packet into the following types according to features, correspondingly filling the construction data packet capable of being verified by QQ according to the types when generating the construction data packet capable of being verified by QQ,
type one, data bits that are invariant in all packets in the QQ voice data stream;
type two, data bits that are not changed in the QQ voice data stream but are changed after the data stream is changed, i.e. data bits are changed between data streams, and the data bits are not related to each other between different data streams;
type three, data bits that do not change in the QQ voice data stream but change after the data stream changes, i.e. data bits change between data streams and are associated with each other between different data streams;
type four, which will change in each packet in the QQ voice data stream, but only the associated data bits in one packet;
type five, there are data bits that will change in each data packet in the QQ voice data stream, but there are associations between data packets;
type six, which is changed in each data packet in the QQ voice data stream, and there is no data bit of any relation between data;
for long packets starting with 0x5b, the data bits comprising type one, type two, type four, type five and type six are measured, the implementation of the corresponding padding by type is as follows,
for the data bits of type one, only the values of the corresponding positions are required to be recorded and filled into the constructed data packet, wherein the constructed data packet comprises the 1 st, 4-5 th, 18-20 th, 22 th, 29 th and 32 th bits of the data packet content and the last two bits of the data packet;
for the data bits of type two, after the QQ voice data stream is acquired each time, recording the values of 11-14 bits of the data packet in the normal data stream, and then filling the values into 11-14 bits of the constructed data packet;
for the data bits of type four, calculating the length of the content part of the construction data packet, and filling the length into 2-3 bits of the construction data packet;
for the data bits of type five, when filling the sequence number, generating two sequence numbers which are respectively 0x00000000 and 0x0000, respectively filling the two sequence numbers with 6-9 bits and 23-24 bits of the constructed data packet each time, and respectively filling the next constructed data packet after adding one; when the time number is filled, acquiring the time number of 14-16 bits of a data packet in the normal data stream, and then adding one to the time number every 256/60 seconds to fill the 14-16 bits of the data packet;
for the data bits with the type six, when the network type is filled, the network environments of both communication parties are determined, and corresponding filling is carried out; the 17 th bit, 25-28 th bit, 30-31 th bit and 33 th bit of the data packet are filled with random numbers;
then, the information representing different extended services is filled into the non-characteristic bits of which the last two bits are removed after the 33 th bit.
2. The method of piggybacking multiple data streams on a QQ network phone as claimed in claim 1 wherein: the transmitting end transmits the QQ voice stream carrying multiple data streams, and the receiving end identifies the construction data packet in the multiple data streams to obtain the expanded service information.
3. The method of piggybacking multiple data streams on a QQ network phone as claimed in claim 2 wherein: in order to successfully carry multiple data streams, the normal data streams and the carried multiple data streams are distinguished by watermarks at a transmitting end and a receiving end.
4. A method of piggybacking multiple data streams on a QQ network phone as claimed in claim 1 or 2 or 3 wherein: and filling the hidden information into non-characteristic bits, and realizing safe and hidden file transmission through multiple data streams.
5. A method of piggybacking multiple data streams on a QQ network phone as claimed in claim 1 or 2 or 3 wherein: a stream of QQ voice data is obtained based on the stream identification.
6. The method of claim 4 for piggybacking multiple data streams on a QQ network phone, wherein: a stream of QQ voice data is obtained based on the stream identification.
7. A system for piggybacking multiple data streams on a QQ network phone, comprising: for carrying out the method of any one of claims 1 to 6.
CN201910192913.0A 2019-03-14 2019-03-14 Method and system for carrying multiple data streams on QQ network telephone Active CN109842548B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910192913.0A CN109842548B (en) 2019-03-14 2019-03-14 Method and system for carrying multiple data streams on QQ network telephone

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910192913.0A CN109842548B (en) 2019-03-14 2019-03-14 Method and system for carrying multiple data streams on QQ network telephone

Publications (2)

Publication Number Publication Date
CN109842548A CN109842548A (en) 2019-06-04
CN109842548B true CN109842548B (en) 2021-05-18

Family

ID=66885711

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910192913.0A Active CN109842548B (en) 2019-03-14 2019-03-14 Method and system for carrying multiple data streams on QQ network telephone

Country Status (1)

Country Link
CN (1) CN109842548B (en)

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100464523C (en) * 2005-09-22 2009-02-25 广东省电信有限公司研究院 Monitor system and its monitor method for internet network telephone
CN102111347A (en) * 2011-02-28 2011-06-29 东南大学 Multi-protocol instant message-based processing method and system in unified communication system
US9191351B2 (en) * 2012-06-15 2015-11-17 Tata Communications (America) Inc. Real-time fraudulent traffic security for telecommunication systems
CN102904822A (en) * 2012-10-22 2013-01-30 西安交通大学 Hierarchical recognition method of VoIP (Voice Over Internet Protocol) network flow
EP3078204A4 (en) * 2013-12-03 2017-07-05 LG Electronics Inc. Apparatus for transmitting broadcast signals, apparatus for receiving broadcast signals, method for transmitting broadcast signals and method for receiving broadcast signals

Also Published As

Publication number Publication date
CN109842548A (en) 2019-06-04

Similar Documents

Publication Publication Date Title
US6804257B1 (en) System and method for framing and protecting variable-lenght packet streams
US7110398B2 (en) Packet tag for support of remote network function/packet classification
US5235644A (en) Probabilistic cryptographic processing method
US20060104278A1 (en) Apparatus and method for compressing headers in a broadband wireless communication system
JP2014064279A (en) Generation and delivery of multimedia content-adaptation notification
CN103647869B (en) A kind of matching method of terminal, terminal and system
US20090210707A1 (en) Out-of Band Authentication Method and System for Communication Over a Data Network
US20090268617A1 (en) Systems and methods for content type classification
US20140317406A1 (en) Communication between network nodes that are not directly connected
CN108462707B (en) Mobile application identification method based on deep learning sequence analysis
Bedi et al. Network steganography using the overflow field of timestamp option in an IPv4 packet
US7889760B2 (en) Systems and methods for sending binary, file contents, and other information, across SIP info and text communication channels
US8559463B2 (en) Systems and methods for providing efficient bandwidth utilization in packet switched networks
Abualhaj et al. Effective Voice Frame Pruning Method to Increase VoIP Call Capacity.
FR3042081A1 (en) "METHOD FOR CONTROLLING A PACKET DATA COMMUNICATION SYSTEM AND COMMUNICATION SYSTEM IMPLEMENTING THE METHOD"
CN109842548B (en) Method and system for carrying multiple data streams on QQ network telephone
CN103023630A (en) Method for hiding information of speech stream on basis of speech coding by pulse code modulation
CN113114648A (en) Method and device for realizing encrypted communication
CN108712324B (en) Method and device for processing mail
CN107404506A (en) A kind of compression of data transfer, decompression method and system
CN116389051A (en) Lightweight data hidden transmission method based on block chain
CN112637703B (en) Real-time intercom system and method for WEB terminal
Ruban et al. The method of hidden terminal transmission of network attack signatures
CN116095197A (en) Data transmission method and related device
CN114615082A (en) System and method for simulating TCP duplex safety communication by using forward and reverse network gates

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant