CN116366436B - Method for providing various telecom value-added services based on wide area networking - Google Patents

Method for providing various telecom value-added services based on wide area networking Download PDF

Info

Publication number
CN116366436B
CN116366436B CN202310436720.1A CN202310436720A CN116366436B CN 116366436 B CN116366436 B CN 116366436B CN 202310436720 A CN202310436720 A CN 202310436720A CN 116366436 B CN116366436 B CN 116366436B
Authority
CN
China
Prior art keywords
service
vpn
client
data
request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310436720.1A
Other languages
Chinese (zh)
Other versions
CN116366436A (en
Inventor
夏年斌
戴丽霞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Hongzhu Tai Information Technology Co ltd
Original Assignee
Nanjing Hongzhu Tai Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Hongzhu Tai Information Technology Co ltd filed Critical Nanjing Hongzhu Tai Information Technology Co ltd
Priority to CN202310436720.1A priority Critical patent/CN116366436B/en
Publication of CN116366436A publication Critical patent/CN116366436A/en
Application granted granted Critical
Publication of CN116366436B publication Critical patent/CN116366436B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4641Virtual LANs, VLANs, e.g. virtual private networks [VPN]

Abstract

The invention discloses a method for providing various telecom value-added services based on wide area networking, which comprises the following steps: s1, providing a VPN service provider required by a customer by a telecommunication provider; s2, the VPN service provider provides a customized VPN client for the client; s3, receiving a service request of a VPN client in the VPN server, and processing the service request of the client based on a dynamic priority service request queue management model; s4, processing business data according to the requested service content; s5, storing the service data processing result in a database, and converting the internal message after the service data processing result into a visual data file through a network model; and S6, sending the visualized data file to the VPN client. The VPN service provided by the telecommunication provider in the present invention is typically a one-stop service, which can provide all-round services and support for customers from planning, design to deployment, maintenance and upgrades.

Description

Method for providing various telecom value-added services based on wide area networking
Technical Field
The invention relates to the field of telecommunication value-added services, in particular to a method for providing various telecommunication value-added services based on wide area networking.
Background
The telecom value-added service refers to a service that an operator provides additional information services to users in addition to basic communication services by using various advanced communication technologies on the basis of a public telecom network so as to increase the economic benefit or the functional value of the original network, thereby obtaining operation income. It is a special and integrated service mode, and is also a diversified and comprehensive binding service. The value-added telecommunication service can provide a plurality of service combinations such as voice, image, short message, internet access, data transmission and the like, and brings brand new convenience experience to users.
Telecommunication services can be divided into two categories, voice (voice) services and non-voice (non-voice) services; the telecommunication service may be classified into a voice service, a data (data) service, a text (text) service, an image (video) service, a multimedia (multimedia) service, etc., according to information media; telecommunication services can be classified into fixed (fixed) services and mobile (mobile) services according to the active state of the user; telecommunication services can be divided into narrowband (narrow band) services and broadband (broadband) services according to the required bandwidth division; the telecommunication services can be divided into bearer (bearer) services, terminal (teleservices) services, and supplementary (supplementary) services according to functions performed by the network; according to the communication purpose, the telecommunication service can be divided into services such as person-person communication, person-computer acquisition information processing and the like; telecommunication services can be classified into basic (basic) services and value-added (value-added) services according to whether they are added or not.
Although wireless data value-added services including mobile positioning services have been well developed in recent years, the lack of service content is still an important reason for restricting the rapid growth of the wireless data value-added services; in addition, some telecom value-added service users have higher charge and need to pay more expensive fees, thus causing certain economic pressure to the users; with the continuous increase of telecom value-added services, the network security risk is also continuously increased, and the problems of threat of hacking attack, user information leakage and the like are gradually exposed; the user experience of some telecom value-added services needs to be further improved, for example, the problem of blocking caused by network delay and the like of part of online games affects the user experience.
For the problems in the related art, no effective solution has been proposed at present.
Disclosure of Invention
Aiming at the problems in the related art, the invention provides a method for providing various telecom value-added services based on wide area networking so as to overcome the technical problems in the prior art.
For this purpose, the invention adopts the following specific technical scheme:
a method for providing various telecommunication value-added services based on wide area networking, the method comprising the steps of:
s1, a VPN service provider required by a customer is provided by a telecommunication provider, and a service plan is formulated according to the service requirement of the customer;
s2, providing a customized VPN client for the client by the VPN service provider, configuring the client after installing the VPN client, and connecting a VPN server by using the VPN client;
s3, receiving a service request of a VPN client in the VPN server, and processing the client service request based on a dynamic priority service request queue management model to enable the client service request to be an internal message of a value-added service processing system;
s4, analyzing the internal message, and processing business data according to the requested service content;
s5, storing the service data processing result in a database, and converting the internal message after the service data processing result into a visual data file through a network model;
and S6, sending the visual data file to the VPN client, and setting a security control strategy.
Further, the VPN service provider provided by the telecommunication provider with customer requirements and making a service plan according to customer service requirements comprises the following steps:
s11, collecting information of a client, acquiring the requirement and service condition of the client, and screening a proper VPN service provider according to the requirement and service condition of the client;
s12, evaluating the screened VPN service provider according to the service requirement of the client;
s13, according to the requirements provided by the clients and the evaluation results of the VPN service provider, a detailed VPN service plan is formulated;
and S14, completing the deployment and configuration of VPN services according to the VPN service plan.
Further, the receiving the service request of the VPN client in the VPN server, and processing the service request of the client based on the dynamic priority service request queue management model, so that the service request becomes an internal message of the value-added service processing system includes the following steps:
s31, the VPN client initiates a connection request to the VPN server;
s32, the VPN server receives a connection request of the VPN client and verifies the identity and authority information of the client;
s33, the VPN client initiates a service request to the VPN server through VPN connection;
s34, the VPN server receives service requests of the VPN client and creates a service request queue for each request;
the service request queue comprises the priority, waiting time and request state of the service request;
s35, setting the priority of each service request, and caching in a service request cache queue;
s36, sequentially extracting service requests from the service request cache queues through the RDT thread, determining whether the node provides service for the node, storing the service requests into the local service request queues if the service can be provided, executing the steps S37 to S38, and storing the service requests into the non-local service request queues if the service cannot be provided, and executing the step S39 to enable the service requests to be internal messages of the value-added service processing system;
s37, determining whether the service request acquired from a request queue for providing the service locally is a super-priority service request or not through the BROT;
s38, if yes, establishing a service request object and inserting the service request object into a to-be-serviced request cache, and not participating in heap ordering;
if not, setting key information of the service request through the BROT thread according to the queuing requirement, establishing a service request object and inserting the service request object into a request object buffer queue;
s39, sequentially extracting service requests from a request queue for non-local service provision through the DTT thread, and determining the forwarding direction of the service requests according to the service registration information of the node.
Further, the formula for setting the priority of the service request is:
P=P static +N beyond +(T current -T entrance )
wherein P is static Is the static priority of the service request, N beyond T is the number of nodes spanned after the service request is generated current Is the current time in the priority calculation, T entrance The time of day is calculated for the service request priority.
Further, the analyzing the internal message, and performing service data processing according to the requested service content includes the following steps:
s41, classifying the internal messages according to the content of the service request to obtain internal messages of different categories;
s42, extracting key information of each category in the internal message, cleaning and converting the extracted key information, and storing the data in a value-added service processing system.
Further, the step of storing the service data processing result in a database and converting the internal message after the service data processing result into a visual data file through a network model includes the following steps:
s51, constructing a visual data mining model, and forming a data set from the internal information after the service data processing;
s52, inputting the data of the data set into a visual data mining model for analysis;
s53, performing visual presentation on a data mining result by using a network visual tool in a visual data mining model;
s54, exporting a visual data file and storing the visual data file in a file with a specific format.
Further, the constructing the visual data mining model includes the following steps:
determining the service data content of the service request and determining the category and the characteristic of the service data;
acquiring service data, importing the service data into a network analysis tool, cleaning the service data, and removing noise;
constructing a network model based on the imported data;
converting the constructed network model into a visual graph by using a network visual tool;
based on ARIMA model, analyzing the network model to obtain the interrelation and rules between the service data.
Further, the analysis of the network model based on the ARIMA model to obtain the interrelation and rules between the service data comprises the following steps:
the business data are arranged into time sequence data according to the time sequence, and unit root inspection is carried out on the original time sequence based on the ADF;
determining the order of an ARIMA model by observing an autocorrelation coefficient ACF;
fitting the time series data based on the ARIMA model, checking the fitting effect, and predicting the service data in a future period based on the ARIMA model.
Further, the visual presentation of the data mining result using the network visualization tool in the visual data mining model includes the following steps:
s521, converting the service data into a format suitable for network visualization tool reading, and setting segment attributes between the data nodes and the data nodes;
s522, arranging the line segment attributes between the data nodes according to a set rule, and setting the visual effect of the line segment between the data nodes according to actual conditions;
s523, adjusting the visual effect through analysis and interaction.
Further, the sending the visualized data file to the VPN client and setting the security control policy include the following steps:
s61, sending the visualized data file to different VPN clients;
s62, realizing the VPN server and the first VPN client by using an identity authentication method;
s63, realizing the VPN server and the first VPN client according to the identity authentication method;
s64, anti-quantum computing communication between the first VPN client and the second VPN client is realized by using a communication method;
the quantum computation resistant communication between the first VPN client and the second VPN client is realized by using a communication method, which comprises the following steps:
s641, the VPN server sends a first request message with a message authentication code for a communication request with the second VPN client to a certificate authority.
S642, the certificate authority receives the message to verify the message authentication code, decrypts the message authentication code to obtain a digital signature, and simultaneously sends a second request message with the message authentication code to the second VPN client;
s643, the second VPN client receives the message and carries out decryption verification, the generation element of the session key is obtained after verification is passed, and meanwhile, a third request message with a message authentication code is sent to the first VPN client;
s644, the first VPN client receives the message and carries out decryption verification, after verification, the authentication of the second VPN client is confirmed to be successful, and meanwhile, a fourth request message with a message authentication code is sent to the second VPN client;
s645, the second VPN client receives the message, judges whether the current time is close to the current time in the fourth request message, if not, the message is invalid, if so, a session key between the first VPN client and the second VPN client is generated, meanwhile, the session key is used for verifying the message authentication code, after verification is successful, the first VPN client is confirmed to acquire the session key, and the session key is used as the session key for communication with the first VPN client;
s646, the first VPN client and the second VPN client perform secure communications using a session key between the first VPN client and the second VPN client.
The beneficial effects of the invention are as follows:
1. the telecommunication provider of the invention has strong network infrastructure and operation experience, and can provide stable and reliable VPN service; telecommunication providers often have global network coverage, which can meet the VPN service requirements of customers in different areas; VPN services of a telecom provider usually adopt advanced encryption technology, firewall and other security measures, so that the security of customer data can be effectively protected; the telecom provider can make a personalized VPN service plan according to the customer demand and can flexibly adjust according to the actual situation of the customer; the VPN service provided by the telecommunication provider can avoid the high cost of constructing a special communication line by self-investment of an organization or an enterprise, and can utilize public network resources to reduce the communication cost; the VPN service provided by a telecommunications provider is typically a one-stop service that provides customers with all-round services and support from planning, design to deployment, maintenance and upgrades.
2. The invention stores the business data in the database, can ensure the reliability of the data, ensures the integrity, consistency and accuracy of the data, can rapidly and efficiently process a large amount of data by using the database management system, can improve the efficiency of data retrieval in the aspects of searching, filtering, sorting and the like, converts the business data processing result into a visual data file by a network model, can keep the stability and the sustainability of the data in the continuously updated data, can flexibly analyze and process the data, can greatly shorten the time of data processing and analysis by utilizing the advantages of the database and the network model, reduces the consumption of manpower resources, and improves the value and the utilization efficiency of the data.
3. The invention adopts quantum-resistant computing communication, the traditional encryption algorithm is easy to crack when facing a strong quantum computer attack, the security of data can be better protected by using the quantum-resistant encryption algorithm, the security of data communication can be realized by using the VPN client, not only quantum-resistant computing communication can be carried out, but also risks of data interception, tampering and the like can be avoided, the quantum-resistant computing communication can be carried out by using the VPN client, the data can be transmitted more quickly, and higher data transmission speed and stability can be provided, thereby improving the communication efficiency, the VPN client can be customized and developed according to the requirements of clients, the personalized requirements of different users can be met, flexible adjustment can be carried out according to the actual conditions of the users, and the cost of organizations or enterprises in the communication aspect can be reduced by using the VPN client because the VPN client can utilize public network resources such as Internet and the like without additional investment to construct a special communication line.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings that are needed in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a flowchart of a method for providing various telecommunication value-added services based on a wide area network according to an embodiment of the present invention.
Detailed Description
For the purpose of further illustrating the various embodiments, the present invention provides the accompanying drawings, which are a part of the disclosure of the present invention, and which are mainly used to illustrate the embodiments and, together with the description, serve to explain the principles of the embodiments, and with reference to these descriptions, one skilled in the art will recognize other possible implementations and advantages of the present invention, wherein elements are not drawn to scale, and like reference numerals are generally used to designate like elements.
According to an embodiment of the invention, a method for providing various telecom value-added services based on wide area networking is provided.
The invention will be further described with reference to the accompanying drawings and detailed description, as shown in fig. 1, a method for providing various telecom value-added services based on wide area networking according to an embodiment of the invention, the method comprises the following steps:
s1, a VPN service provider required by a customer is provided by a telecommunication provider, and a service plan is formulated according to the service requirement of the customer;
in one embodiment, the VPN service provider provided by the telecommunication provider with customer requirements and making a service plan according to customer service requirements comprises the steps of:
s11, collecting information of a client, acquiring the requirement and service condition of the client, and screening a proper VPN service provider according to the requirement and service condition of the client;
s12, evaluating the screened VPN service provider according to the service requirement of the client;
s13, according to the requirements provided by the clients and the evaluation results of the VPN service provider, a detailed VPN service plan is formulated;
and S14, completing the deployment and configuration of VPN services according to the VPN service plan.
Specifically, the content for making the customer service plan may include the following aspects:
setting a target: the goals and requirements of customer service are defined, such as providing fast response times, ensuring product quality, etc.
And (3) designing a service flow: determining a service flow including accepting a path of a customer service request, a customer service handler, a customer problem solving flow, a service assessment, and the like.
And (3) resource configuration: resources are reasonably configured according to various resources such as manpower, material resources, finance and the like required in the service plan.
Scheduling: the entire service plan is broken down into a series of specific tasks and time nodes and schedules and work plans are arranged reasonably.
Performance assessment: and setting reasonable performance indexes and assessment methods according to the customer service plan, evaluating and feeding back the provided customer service, timely finding and correcting problems, and continuously optimizing the customer service quality.
And S2, the VPN service provider provides a customized VPN client for the client, the client configures after installing the VPN client, and the VPN server is connected by using the VPN client.
Specifically, if the VPN service provider provides a customized VPN client to the customer, the customer may install and configure with reference to the following steps: downloading and installing a VPN client from a VPN provider's official network, opening the VPN client, inputting a user name and a password provided by the provider for login, selecting an option of connecting to a VPN server, such as ' Connect ' or ' Start VPN ', filling in relevant setting information (such as an IP address, a server name, a protocol type and the like) according to requirements provided by the VPN provider, saving the setting, clicking a ' Connect ' or ' Start VPN ' button, connecting to the VPN server, and displaying the connected state and the relevant information of the VPN provider on the VPN client interface if the connection is successful; when VPN usage is not required, a Disconnect or Stop VPN button may be clicked on the VPN client to Disconnect.
S3, receiving a service request of a VPN client in the VPN server, and processing the client service request based on a dynamic priority service request queue management model to enable the client service request to be an internal message of a value-added service processing system;
in one embodiment, the receiving the service request of the VPN client in the VPN server and processing the service request of the client based on the dynamic priority service request queue management model to make the service request into an internal message of the value added service processing system includes the following steps:
s31, the VPN client initiates a connection request to the VPN server;
s32, the VPN server receives a connection request of the VPN client and verifies the identity and authority information of the client;
s33, the VPN client initiates a service request to the VPN server through VPN connection;
s34, the VPN server receives service requests of the VPN client and creates a service request queue for each request;
the service request queue comprises the priority, waiting time and request state of the service request;
s35, setting the priority of each service request, and caching in a service request cache queue;
s36, sequentially extracting service requests from a service request cache queue through an RDT (reliable data transmission) thread, determining whether the node provides service for the node, storing the service requests into a local service request queue if the node can provide the service, executing steps S37 to S38, and storing the service requests into a non-local service request queue if the node cannot provide the service, and executing step S39 to enable the node to be an internal message of a value-added service processing system;
s37, determining whether the service request acquired from a request queue for providing the service locally is a super-priority service request or not through the BROT;
s38, if yes, establishing a service request object and inserting the service request object into a to-be-serviced request cache, and not participating in heap ordering;
if not, setting key information of the service request through the BROT thread according to the queuing requirement, establishing a service request object and inserting the service request object into a request object buffer queue;
s39, sequentially extracting service requests from a request queue for non-local service provision through the DTT thread, and determining the forwarding direction of the service requests according to the service registration information of the node.
In one embodiment, the formula for setting the priority of the service request is:
P=P static +N beyond +(T current -T entrance )
wherein P is static Is the static priority of service requests, P dymaic Is the static priority of the service request, N beyond T is the number of nodes spanned after the service request is generated current Is the current time in the priority calculation, T entrance The time of day is calculated for the service request priority.
Specifically, p=p static +P dymaic
P dymaic =N beyond +(T current -T entrance )
If there is no N beyond The time of day (i.e., user submission time, N) may be generated with a service request beyond ) Time T for calculating priority of cut-off service request current (T current -T entrance ) The time elapsed for a service request represents its dynamic priority. During this time, however, the service request may span several requesting data switching nodes, and thus, the service request is transmitted using (T current -T entrance ) Representing its dynamic priority depends on the consistency of the system clocks among the nodes, thereby increasing the node coupling. Will N beyond As part of the dynamic priority is to eliminate this degree of coupling.
The highest-grade super-priority is preset for emergency incidents and incidents seriously threatening production operation safety. The service request is not participated in sorting any more as long as the service request has the identifier of super priority, and directly enters the cache of the request to be serviced, so that the service node provides service for the service node as soon as possible.
RDT is a short for reliable data transfer (ReliableDataTransfer), a protocol used in computer networks to ensure the reliability of data transfer. The protocol may ensure that data is not lost, repeated, out of order, or corrupted during transmission. RDT protocols are commonly used in high fault tolerance and low latency communication environments such as wireless sensor networks, mobile communication networks, and the like.
And the DTT thread branches the forwarding thread, and forwards the request which can not be provided with service by the node according to the service registration information of the node.
And the DTT thread branches the forwarding thread, and forwards the request which can not be provided with service by the node according to the service registration information of the node.
And the BROT thread establishes a service request object thread, constructs a request for the node to provide service for the BROT thread as a service request object, and schedules the BROT thread and provides service for the BROT thread according to the priority of the BROT thread.
S4, analyzing the internal message, and processing business data according to the requested service content;
in one embodiment, the analyzing the internal message and performing service data processing according to the requested service content includes the following steps:
s41, classifying the internal messages according to the content of the service request to obtain internal messages of different categories;
s42, extracting key information of each category in the internal message, cleaning and converting the extracted key information, and storing the data in a value-added service processing system.
Specifically, the value-added service processing system refers to a computer system capable of effectively processing the value-added service. The value-added service processing system can help enterprises or organizations to manage and process various value-added services more efficiently, such as telephone recharging, traffic recharging, cash collection, etc. The following are the main functions of the value added service processing system:
data input: the data entered by the user is converted into a useful form and recorded, encoded and edited during the input process. The input of data is typically done by conventional manual methods or by automated methods of source data.
And (3) business processing: in a value added service processing system, service processing is a very important link. The method mainly comprises the operations of processing, calculating, analyzing, summarizing and the like of service data. Among these, data processing is a key step in ensuring system accuracy and stability.
File and database processing: in value added service processing systems, the primary task of file and database processing is to store, manage and maintain various data. Such data may include user information, transaction records, settlement information, and the like.
File and report generation: the value added service processing system can automatically generate various files and reports, such as bills, settlement lists, transaction details and the like, according to the requirements of users. These files and reports can help the user to better understand the business operation.
Query processing: in value added service processing systems, query processing is a very important function. The user may obtain the desired information through query processing, such as balance queries, transaction queries, running water queries, etc.
S5, storing the service data processing result in a database, and converting the internal message after the service data processing result into a visual data file through a network model;
in one embodiment, the storing the service data processing result in the database, and converting the internal message after the service data processing result into the visual data file through the network model includes the following steps:
s51, constructing a visual data mining model, and forming a data set from the internal information after the service data processing;
s52, inputting the data of the data set into a visual data mining model for analysis;
s53, performing visual presentation on a data mining result by using a network visual tool in a visual data mining model;
s54, exporting a visual data file and storing the visual data file in a file with a specific format.
In one embodiment, the building of the visual data mining model includes the steps of:
determining the service data content of the service request and determining the category and the characteristic of the service data;
acquiring service data, importing the service data into a network analysis tool, cleaning the service data, and removing noise;
constructing a network model based on the imported data;
converting the constructed network model into a visual graph by using a network visual tool;
based on ARIMA model, the network model is analyzed to determine the interrelation and rules between the business data.
In one embodiment, the analysis of the network model based on the ARIMA model to determine the interrelationship and law between the service data includes the steps of:
the business data are arranged into time sequence data according to the time sequence, and unit root inspection is carried out on the original time sequence based on the ADF;
determining the order of an ARIMA model by observing an autocorrelation coefficient ACF;
fitting the time series data based on the ARIMA model, checking the fitting effect, and predicting the service data in a future period based on the ARIMA model.
In one embodiment, the visual presentation of the results of the data mining using the network visualization tool in the visual data mining model includes the steps of:
s521, converting the service data into a format suitable for network visualization tool reading, and setting segment attributes between the data nodes and the data nodes;
s522, arranging the line segment attributes between the data nodes according to a set rule, and setting the visual effect of the line segment between the data nodes according to actual conditions;
s523, adjusting the visual effect through analysis and interaction.
Specifically, an ARIMA (autoregressive integral moving average) model is a time series prediction method that models and predicts based on historical data of the time series itself.
The ARIMA model consists of three parts: autoregressive (AR), differential (I), and Moving Average (MA): autoregressive (AR): the part represents the effect of the value of the past moment of the time series on the value of the current moment. I.e. when the value of the past moment has an effect on the value of the present moment, we call it to have an autoregressive property, denoted AR (p), where p is the order of the autoregressive term. Difference (I): this section represents the degree to which the time series is differentiated so that the time series becomes smooth. The stationary time series can be modeled and predicted more easily. Typically using first or second order differential. If we do not need to do any differencing, the model is called ARIMA (p, 0, q). Moving Average (MA): this part represents the effect of the error in the past moment of the time series on the current moment value. I.e. when the error of the past moment has an effect on the value of the present moment, we call it of a moving average nature, denoted MA (q), where q is the order of the moving average term.
ACF: the autocorrelation function (autocorrelation function) is a function describing the correlation between observations of the same time series at different points in time. It is a direct measure of the time series that can be used to detect if the time series has an auto-correlation or an order of a correlation model.
ADF: the unit root test (Augmented Dickey-Fuller test), also known as the "Augmented Diety-Fuller test", is a common method for checking whether a time series has a unit root (i.e., stationarity). ADF verification may help us determine whether time series need to be differentially processed to plateau or may be used to select the appropriate time series model.
S6, sending the visual data file to the VPN client, and setting a security control strategy;
in one embodiment, the sending the visualized data file to the VPN client and setting the security control policy includes the steps of:
s61, sending the visualized data file to different VPN clients;
s62, realizing the VPN server and the first VPN client by using an identity authentication method;
s63, realizing the VPN server and the first VPN client according to the identity authentication method;
s64, anti-quantum computing communication between the first VPN client and the second VPN client is realized by using a communication method;
the quantum computation resistant communication between the first VPN client and the second VPN client is realized by using a communication method, which comprises the following steps:
s641, the VPN server sends a first request message with a message authentication code for a communication request with the second VPN client to a certificate authority.
S642, the certificate authority receives the message to verify the message authentication code, decrypts the message authentication code to obtain a digital signature, and simultaneously sends a second request message with the message authentication code to the second VPN client;
s643, the second VPN client receives the message and carries out decryption verification, the generation element of the session key is obtained after verification is passed, and meanwhile, a third request message with a message authentication code is sent to the first VPN client;
s644, the first VPN client receives the message and carries out decryption verification, after verification, the authentication of the second VPN client is confirmed to be successful, and meanwhile, a fourth request message with a message authentication code is sent to the second VPN client;
s645, the second VPN client receives the message, judges whether the current time is close to the current time in the fourth request message, if not, the message is invalid, if so, a session key between the first VPN client and the second VPN client is generated, meanwhile, the session key is used for verifying the message authentication code, after verification is successful, the first VPN client is confirmed to acquire the session key, and the session key is used as the session key for communication with the first VPN client;
s646, the first VPN client and the second VPN client perform secure communications using a session key between the first VPN client and the second VPN client.
In particular, the traditional encryption algorithm is easy to crack when facing a powerful quantum computer attack, and the security of data can be better protected by using the quantum cryptography resistant algorithm. The VPN client can realize the safety of data communication, not only can perform quantum computation communication, but also can avoid risks such as data interception, tampering and the like. The anti-quantum computing communication is carried out through the VPN client, data can be transmitted faster, and higher data transmission speed and stability can be provided, so that communication efficiency is improved. The VPN client can be customized and developed according to the requirements of clients, meets the personalized requirements of different users, and can be flexibly adjusted according to the actual conditions of the users. The use of VPN clients may reduce the costs of an organization or enterprise in terms of communications because VPN clients may utilize public network resources such as the Internet without additional investment in constructing dedicated communication lines.
In summary, by means of the above technical solution of the present invention, the telecom provider in the present invention generally has strong network infrastructure and operation experience, and can provide stable and reliable VPN service; telecommunication providers often have global network coverage, which can meet the VPN service requirements of customers in different areas; VPN services of a telecom provider usually adopt advanced encryption technology, firewall and other security measures, so that the security of customer data can be effectively protected; the telecom provider can make a personalized VPN service plan according to the customer demand and can flexibly adjust according to the actual situation of the customer; the VPN service provided by the telecommunication provider can avoid the high cost of constructing a special communication line by self-investment of an organization or an enterprise, and can utilize public network resources to reduce the communication cost; VPN services offered by a telecommunications provider are typically one-stop services that provide all-round services and support for customers from planning, design to deployment, maintenance, and upgrades; the invention stores the business data in the database, can ensure the reliability of the data, ensures the integrity, consistency and accuracy of the data, can rapidly and efficiently process a large amount of data by using the database management system, can improve the efficiency of data retrieval in the aspects of searching, filtering, sorting and the like, converts the business data processing result into a visual data file by a network model, can keep the stability and the sustainability of the data in the continuously updated data, can flexibly analyze and process the data, can greatly shorten the time of data processing and analysis by utilizing the advantages of the database and the network model, reduces the consumption of manpower resources and improves the value and the utilization efficiency of the data; the invention adopts quantum-resistant computing communication, the traditional encryption algorithm is easy to crack when facing to the attack of a powerful quantum computer, and the security of data can be better protected by using the quantum-resistant encryption algorithm. The VPN client can realize the safety of data communication, not only can perform quantum computation communication, but also can avoid risks such as data interception, tampering and the like. The anti-quantum computing communication is carried out through the VPN client, data can be transmitted faster, and higher data transmission speed and stability can be provided, so that communication efficiency is improved. The VPN client can be customized and developed according to the requirements of clients, meets the personalized requirements of different users, and can be flexibly adjusted according to the actual conditions of the users. The use of VPN clients may reduce the costs of an organization or enterprise in terms of communications because VPN clients may utilize public network resources such as the Internet without additional investment in constructing dedicated communication lines.
The foregoing description of the preferred embodiments of the invention is not intended to be limiting, but rather is intended to cover all modifications, equivalents, alternatives, and improvements that fall within the spirit and scope of the invention.

Claims (7)

1. A method for providing various telecommunication value-added services based on wide area networking, the method comprising the steps of:
s1, a VPN service provider required by a customer is provided by a telecommunication provider, and a service plan is formulated according to the service requirement of the customer;
s2, providing a customized VPN client for the client by the VPN service provider, configuring the client after installing the VPN client, and connecting a VPN server by using the VPN client;
s3, receiving a service request of a VPN client in the VPN server, and processing the client service request based on a dynamic priority service request queue management model to enable the client service request to be an internal message of a value-added service processing system; the receiving the service request of the VPN client in the VPN server, and processing the client service request based on the dynamic priority service request queue management model to make the client service request become an internal message of the value-added service processing system comprises the following steps:
s31, the VPN client initiates a connection request to the VPN server;
s32, the VPN server receives a connection request of the VPN client and verifies the identity and authority information of the client;
s33, the VPN client initiates a service request to the VPN server through VPN connection;
s34, the VPN server receives service requests of the VPN client and creates a service request queue for each request;
s35, setting the priority of each service request, and caching in a service request cache queue; the formula for setting the priority of the service request is as follows:
P=P static +P dymaic
P dymaic =N beyond +(T current -T entrance )
wherein P is static Is the static priority of service requests, P dymaic Is the static priority of the service request, N beyond T is the number of nodes spanned after the service request is generated current Is the current time in the priority calculation, T entrance Calculating time for service request priority;
s36, sequentially extracting service requests from the service request cache queues through the RDT thread, determining whether the node provides service for the node, storing the service requests into the local service request queues if the service can be provided, executing the steps S37 to S38, and storing the service requests into the non-local service request queues if the service cannot be provided, and executing the step S39 to enable the service requests to be internal messages of the value-added service processing system;
s37, determining whether the service request acquired from a request queue for providing the service locally is a super-priority service request or not through the BROT;
s38, if yes, establishing a service request object and inserting the service request object into a to-be-serviced request cache, and not participating in heap ordering;
if not, setting key information of the service request through the BROT thread according to the queuing requirement, establishing a service request object and inserting the service request object into a request object buffer queue;
s39, sequentially extracting service requests from a request queue for non-local service provision through a DTT thread, and determining a forwarding direction of the service requests according to service registration information of the node;
s4, analyzing the internal message, and processing business data according to the requested service content;
s5, storing the service data processing result in a database, and converting the internal message after the service data processing result into a visual data file through a network model;
s6, sending the visual data file to the VPN client, and setting a security control strategy; the step of sending the visual data file to the VPN client and setting the security control strategy comprises the following steps:
s61, sending the visualized data file to different VPN clients;
s62, realizing the VPN server and the first VPN client by using an identity authentication method;
s63, realizing the VPN server and the first VPN client according to the identity authentication method;
s64, anti-quantum computing communication between the first VPN client and the second VPN client is realized by using a communication method;
the quantum computation resistant communication between the first VPN client and the second VPN client is realized by using a communication method, which comprises the following steps:
s641, the VPN server sends a first request message with a message authentication code for a communication request with a second VPN client to a certificate authority;
s642, the certificate authority receives the message to verify the message authentication code, decrypts the message authentication code to obtain a digital signature, and simultaneously sends a second request message with the message authentication code to the second VPN client;
s643, the second VPN client receives the message and carries out decryption verification, the generation element of the session key is obtained after verification is passed, and meanwhile, a third request message with a message authentication code is sent to the first VPN client;
s644, the first VPN client receives the message and carries out decryption verification, after verification, the authentication of the second VPN client is confirmed to be successful, and meanwhile, a fourth request message with a message authentication code is sent to the second VPN client;
s645, the second VPN client receives the message, judges whether the current time is close to the current time in the fourth request message, if not, the message is invalid, if so, a session key between the first VPN client and the second VPN client is generated, meanwhile, the session key is used for verifying the message authentication code, after verification is successful, the first VPN client is confirmed to acquire the session key, and the session key is used as the session key for communication with the first VPN client;
s646, the first VPN client and the second VPN client perform secure communications using a session key between the first VPN client and the second VPN client.
2. The method for providing various telecommunication value-added services based on wide area network as set forth in claim 1, wherein the VPN service provider provided by the telecommunication provider with customer requirements and making a service plan according to customer service requirements comprises the steps of:
s11, collecting information of a client, acquiring the requirement and service condition of the client, and screening a proper VPN service provider according to the requirement and service condition of the client;
s12, evaluating the screened VPN service provider according to the service requirement of the client;
s13, according to the requirements provided by the clients and the evaluation results of the VPN service provider, a detailed VPN service plan is formulated;
and S14, completing the deployment and configuration of VPN services according to the VPN service plan.
3. The method for providing various telecommunication value-added services based on wide area network as set forth in claim 1, wherein the analyzing the internal message and performing service data processing according to the requested service contents comprises the steps of:
s41, classifying the internal messages according to the content of the service request to obtain internal messages of different categories;
s42, extracting key information of each category in the internal message, cleaning and converting the extracted key information, and storing the data in a value-added service processing system.
4. The method for providing various telecom value added services based on wide area network as claimed in claim 1, wherein the steps of storing the service data processing result in a database, and converting the internal message after the service data processing result into a visual data file through a network model, comprises the steps of:
s51, constructing a visual data mining model, and forming a data set from the internal information after the service data processing;
s52, inputting the data of the data set into a visual data mining model for analysis;
s53, performing visual presentation on a data mining result by using a network visual tool in a visual data mining model;
s54, exporting a visual data file and storing the visual data file in a file with a specific format.
5. The method for providing various telecommunication value-added services based on wide area networking according to claim 4, wherein the constructing the visual data mining model comprises the steps of:
determining the service data content of the service request and determining the category and the characteristic of the service data;
acquiring service data, importing the service data into a network analysis tool, cleaning the service data, and removing noise;
constructing a network model based on the imported data;
converting the constructed network model into a visual graph by using a network visual tool;
based on ARIMA model, analyzing the network model to obtain the interrelation and rules between the service data.
6. The method for providing various telecom value added services based on wide area networking according to claim 5, wherein the analyzing the network model based on the ARIMA model to obtain the interrelation and rules between the service data comprises the steps of:
the business data are arranged into time sequence data according to the time sequence, and unit root inspection is carried out on the original time sequence based on the ADF;
determining the order of an ARIMA model by observing an autocorrelation coefficient ACF;
fitting the time series data based on the ARIMA model, checking the fitting effect, and predicting the service data in a future period based on the ARIMA model.
7. The method for providing various telecommunication value-added services based on wide area networking according to claim 4, wherein the step of visually presenting the results of data mining using network visualization tools in a visual data mining model comprises the steps of:
s521, converting the service data into a format suitable for network visualization tool reading, and setting segment attributes between the data nodes and the data nodes;
s522, arranging the line segment attributes between the data nodes according to a set rule, and setting the visual effect of the line segment between the data nodes according to actual conditions;
s523, adjusting the visual effect through analysis and interaction.
CN202310436720.1A 2023-04-21 2023-04-21 Method for providing various telecom value-added services based on wide area networking Active CN116366436B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310436720.1A CN116366436B (en) 2023-04-21 2023-04-21 Method for providing various telecom value-added services based on wide area networking

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310436720.1A CN116366436B (en) 2023-04-21 2023-04-21 Method for providing various telecom value-added services based on wide area networking

Publications (2)

Publication Number Publication Date
CN116366436A CN116366436A (en) 2023-06-30
CN116366436B true CN116366436B (en) 2024-03-05

Family

ID=86918897

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310436720.1A Active CN116366436B (en) 2023-04-21 2023-04-21 Method for providing various telecom value-added services based on wide area networking

Country Status (1)

Country Link
CN (1) CN116366436B (en)

Citations (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5884037A (en) * 1996-10-21 1999-03-16 International Business Machines Corporation System for allocation of network resources using an autoregressive integrated moving average method
CN101060561A (en) * 2006-04-18 2007-10-24 胡乐乐 A method and system for providing the telecommunication value-added service
CN101409939A (en) * 2008-12-03 2009-04-15 中国电信股份有限公司 End-to-end system for implementing enterprise application data real time propelling movement and method thereof
CN101420453A (en) * 2008-12-10 2009-04-29 中国电信股份有限公司 Customer terminal webpage representation implementing method used for enterprise information push application
US7539677B1 (en) * 2000-10-09 2009-05-26 Battelle Memorial Institute Sequential pattern data mining and visualization
US7734496B1 (en) * 2004-03-04 2010-06-08 At&T Intellectual Property Ii, L.P. Service provider and client survey method
CN105051720A (en) * 2013-01-30 2015-11-11 微软技术许可有限责任公司 Virtual library providing content accessibility irrespective of content format and type
CN105243121A (en) * 2015-09-29 2016-01-13 中国运载火箭技术研究院 Data mining based text data network construction system
CN110990478A (en) * 2019-11-28 2020-04-10 上海商汤智能科技有限公司 Data processing method and device, electronic equipment and storage medium
CN111061556A (en) * 2019-12-26 2020-04-24 深圳前海环融联易信息科技服务有限公司 Optimization method and device for executing priority task, computer equipment and medium
CN111539032A (en) * 2020-06-17 2020-08-14 上海安密信科技有限公司 Electronic signature application system resistant to quantum computing disruption and implementation method thereof
CN112087428A (en) * 2020-08-06 2020-12-15 如般量子科技有限公司 Anti-quantum computing identity authentication system and method based on digital certificate
CN112561266A (en) * 2020-12-04 2021-03-26 长沙市到家悠享网络科技有限公司 Service request processing method, device, equipment and storage medium
CN113259339A (en) * 2021-05-08 2021-08-13 珠海六点智能科技有限公司 UDP-based data transmission method and system and electronic equipment
WO2021204176A1 (en) * 2020-04-09 2021-10-14 京东方科技集团股份有限公司 Service data prediction method and apparatus, electronic device, and computer readable storage medium
CN114448636A (en) * 2020-10-16 2022-05-06 如般量子科技有限公司 Quantum-resistant computing digital currency system based on digital certificate and anonymous communication method
CN114745225A (en) * 2022-03-18 2022-07-12 重庆梦之想科技有限责任公司 Cheating prevention method for online examination
CN115617527A (en) * 2022-11-08 2023-01-17 咪咕文化科技有限公司 Management method, configuration method, management device and configuration device of thread pool

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8832274B2 (en) * 2012-03-09 2014-09-09 Business Objects Software Limited Apportioned queue for resource allocation
US11818101B2 (en) * 2021-10-11 2023-11-14 Cisco Technology, Inc. Context-based path selection for VPN clients to facilitate remote access to network-based applications

Patent Citations (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5884037A (en) * 1996-10-21 1999-03-16 International Business Machines Corporation System for allocation of network resources using an autoregressive integrated moving average method
US7539677B1 (en) * 2000-10-09 2009-05-26 Battelle Memorial Institute Sequential pattern data mining and visualization
US7734496B1 (en) * 2004-03-04 2010-06-08 At&T Intellectual Property Ii, L.P. Service provider and client survey method
CN101060561A (en) * 2006-04-18 2007-10-24 胡乐乐 A method and system for providing the telecommunication value-added service
CN101409939A (en) * 2008-12-03 2009-04-15 中国电信股份有限公司 End-to-end system for implementing enterprise application data real time propelling movement and method thereof
CN101420453A (en) * 2008-12-10 2009-04-29 中国电信股份有限公司 Customer terminal webpage representation implementing method used for enterprise information push application
CN105051720A (en) * 2013-01-30 2015-11-11 微软技术许可有限责任公司 Virtual library providing content accessibility irrespective of content format and type
CN105243121A (en) * 2015-09-29 2016-01-13 中国运载火箭技术研究院 Data mining based text data network construction system
CN110990478A (en) * 2019-11-28 2020-04-10 上海商汤智能科技有限公司 Data processing method and device, electronic equipment and storage medium
CN111061556A (en) * 2019-12-26 2020-04-24 深圳前海环融联易信息科技服务有限公司 Optimization method and device for executing priority task, computer equipment and medium
WO2021204176A1 (en) * 2020-04-09 2021-10-14 京东方科技集团股份有限公司 Service data prediction method and apparatus, electronic device, and computer readable storage medium
CN111539032A (en) * 2020-06-17 2020-08-14 上海安密信科技有限公司 Electronic signature application system resistant to quantum computing disruption and implementation method thereof
CN112087428A (en) * 2020-08-06 2020-12-15 如般量子科技有限公司 Anti-quantum computing identity authentication system and method based on digital certificate
CN114448636A (en) * 2020-10-16 2022-05-06 如般量子科技有限公司 Quantum-resistant computing digital currency system based on digital certificate and anonymous communication method
CN112561266A (en) * 2020-12-04 2021-03-26 长沙市到家悠享网络科技有限公司 Service request processing method, device, equipment and storage medium
CN113259339A (en) * 2021-05-08 2021-08-13 珠海六点智能科技有限公司 UDP-based data transmission method and system and electronic equipment
CN114745225A (en) * 2022-03-18 2022-07-12 重庆梦之想科技有限责任公司 Cheating prevention method for online examination
CN115617527A (en) * 2022-11-08 2023-01-17 咪咕文化科技有限公司 Management method, configuration method, management device and configuration device of thread pool

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
动态优先级服务请求队列管理模型研究;杨宏宇,刘宏志;计算机工程;全文 *

Also Published As

Publication number Publication date
CN116366436A (en) 2023-06-30

Similar Documents

Publication Publication Date Title
US11563860B2 (en) Toll-free telecommunications and data management platform
US10742821B2 (en) Management of toll-free number misuse and fraud detection
US11563861B2 (en) Toll-free numbers metadata tagging, analysis and reporting
US7801985B1 (en) Data transfer for network interaction fraudulence detection
US6515968B1 (en) Integrated interface for real time web based viewing of telecommunications network call traffic
US6449588B1 (en) Customer-driven QOS in hybrid communication system
US6707812B1 (en) System, method and article of manufacture for element management in a hybrid communication system
US6426948B1 (en) Video conferencing fault management in a hybrid network
US20030167180A1 (en) System and methods for determining contract compliance
CA3147287C (en) Toll-free telecommunications and data management platform
CA2304543A1 (en) Integrated customer interface for web based communications network management
US9729563B2 (en) Data transfer for network interaction fraudulence detection
US20220360663A1 (en) Telecommunications call validation platform
WO2019086522A1 (en) A COMPUTER IMPLEMENTED METHOD, A SYSTEM AND A COMPUTER PROGRAM FOR OPTIMIZING THE OPERATION OF A CLOUD HOSTED SOFTWARE AS A SERVICE (SaaS) SYSTEM
CN116366436B (en) Method for providing various telecom value-added services based on wide area networking
WO2023288076A2 (en) Telecommunications call validation platform
CA3114831A1 (en) Telecommunications call validation platform
US11968528B2 (en) Telecommunications call validation platform
CN116962202A (en) Diversified telecom value-added service system and method thereof
MXPA00002978A (en) Integrated customer interface for web based communications network management

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant