TW200816753A - DiVitas protocol proxy and methods therefor - Google Patents

DiVitas protocol proxy and methods therefor Download PDF

Info

Publication number
TW200816753A
TW200816753A TW096121022A TW96121022A TW200816753A TW 200816753 A TW200816753 A TW 200816753A TW 096121022 A TW096121022 A TW 096121022A TW 96121022 A TW96121022 A TW 96121022A TW 200816753 A TW200816753 A TW 200816753A
Authority
TW
Taiwan
Prior art keywords
user
server
application
dpp
packet
Prior art date
Application number
TW096121022A
Other languages
Chinese (zh)
Inventor
Ajay Mittal
Original Assignee
Divitas Networks Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US11/537,990 external-priority patent/US7688820B2/en
Priority claimed from US11/755,710 external-priority patent/US20080317241A1/en
Priority claimed from US11/755,702 external-priority patent/US20080140767A1/en
Priority claimed from US11/755,704 external-priority patent/US7480500B1/en
Priority claimed from US11/755,727 external-priority patent/US20090016333A1/en
Application filed by Divitas Networks Inc filed Critical Divitas Networks Inc
Publication of TW200816753A publication Critical patent/TW200816753A/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M9/00Arrangements for interconnection not involving centralised switching
    • H04M9/08Two-way loud-speaking telephone systems with means for conditioning the signal, e.g. for suppressing echoes for one or both directions of traffic
    • H04M9/082Two-way loud-speaking telephone systems with means for conditioning the signal, e.g. for suppressing echoes for one or both directions of traffic using echo cancellers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F15/00Digital computers in general; Data processing equipment in general
    • G06F15/16Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
    • G06F15/163Interprocessor communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/02Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks

Abstract

A mobility architectural arrangement for managing telecommunication mobility for a handset is provided. The arrangement includes a DiVitas protocol proxy (DPP), which is configured to manage connectivity between a mobility client of the handset and a mobility server within an enterprise. The DPP includes a client DPP being configured to manage the connectivity for the mobility client of the handset. The client DPP receives a plurality of client connectivity requests from a plurality of application clients. The server DPP is configured to manage the connectivity for the mobility server. The server DPP receives a plurality of server connectivity requests from a plurality of application servers. The client DPP and the server DPP are configured to interact with one another to establish a secure channel.

Description

200816753 九、發明說明 【發明所屬之技術領域】 本發明是關於戴維他(DIVITAS)協定代理及 【先前技術】 習知行動通訊平台包括蜂巢式通訊,例如,全 通訊系統(GSM )。其他支援有限行動性的習知平 依據IEEE 802.1 1標準的WiFi。蜂巢式和WiFi二 皆知且是已建立的無線通訊平台。 新一代平台被設計成使行動使用者能夠在蜂 W i F i網路之間移動,並且包括非授權行動存取( 標準,該標準提供交換控制器給載體’讓使用者能 蜂巢式和WiFi標準之間,反之亦然。然而,UMA 有包括載體通常控制電話並且決定是否和何時在網 交換使用者等不利點。 需要先進的行動通訊平台提供企業水平的通訊 控制使用者和網路,使得企業(取代載體)能夠依 驅策標準而非載體驅策標準選擇網路及/或電話。 另外,在行動/無線通訊中’通常具有下列 (a )回音;(b )影響服務品質(Q〇S )的封包延 包延遲變化(封包跳動)、和封包損失;(c )協 體或軟體平台相依性;及(d )企業資源存取的安 將這些問題說明如下: 其方法 球行動 台包括 者眾所 巢式和 UMA ) 夠超越 標準具 路之間 ,並且 據企業 問題= 遲、封 定的硬 全性。 -5- 200816753 (a)回音 在諸如習知P S TN、會議電話、蜂巢式行動電話、及 網路電話等語音通訊中,已廣泛使用回音消除(EC )技術 提高終端用戶的服務品質(QoS )。通常有兩種回音消除 器。其中一種回音消除器通常稱作線路或網路回音消除器 (LEC ) 。LEC通常被用於去除由於2線及/或4線轉換發 生的網路上之混合成分的反射所導致之電回音。另一種回 音消除器通常被稱作聲學回音消除器(AEC ) 。AEC通常 被用於去除由於從揚聲器到免持聽筒揚聲電話上的麥克 風、行動電話、或會議電話之聲學聲音反饋所產生的聲學 回音。與LEC比較,由於下面一些因素導致實施AEC較 困難:因爲音速比光速(或電子速度)慢很多,所以回音 尾部較長,因此回音消除器必須具有更大的處理功率和記 憶體;因爲電話或說話者的移動和環境的變化,所以聲學 回音特性的動態變化較大,因此回音消除器必須更快速追 蹤和趕上回音特性的變化;及由於來自具有不同距離及/ 或取向的不同物體之多重反射所導致的多重回音路徑。 目前的聲學回音消除技術通常具有限制。雖然聲學回 音消除技術迄今已經被發明和使用至少40年,然而消除 聲學回音的基本方法並沒有明顯改變。通常,典型 AEC 利用適應型濾波器模型化一或多個回音路徑轉移函數並且 試著產生回音的複製。然後,AEC可從進端輸入信號減掉 此複製以形成大槪最後的無回音遠端信號輸出。 -6 - 200816753 迄今,大部分的聲學回音消除技術發展係利用 類的濾波器,諸如FIR或IIR濾波器、單頻帶或多 波器、或時域或頻域濾波器等。另外,諸如LMS、 APA等不同演算法已用於提高濾波器效率。儘管如 至憑藉所有這些技術改良,在今日,AEC設計和實 一件非常困難的工作。因爲聲學回音的複雜和變 質,所以習知濾波器在處理聲學回音上呈現許多限 中一限制爲不良的兩端通話(近端和遠端說話者 話)性能。習知濾波器的計算結果是在兩端通話期 散取代回音和複製之間的收斂。 (b )影響服務品質(Q〇S )的封包延遲、封包延 (封包跳動)、和封包損失 在網路電話和網路視頻通訊中,語音及/或視 內容需要即時從發送器移轉到接收器,然而,基本 路原本設計用於非即時通訊。因此,提供和維持終 的服務品質(QoS )變成是一件非常困難的工作。 的封包延遲、封包延遲變化(封包跳動)、及封包 被視作影響IP網路的語音及視頻通訊之品質和性 個重要QoS參數。 目前的跳動緩衝技術有限制。又稱作反跳動緩 的跳動緩衝方案通常用於接收器側以補償或消除網 跳動。基本上,方案無法一接收到封包就馬上實施 取而代之的是,方案可以均等間距佇列進來的封包 不同種 頻帶濾 RLS、 此,甚 施仍是 化性本 制。其 都在說 間以發 遲變化 頻媒體 IP網 端用戶 端對端 損失可 能的三 衝方案 路封包 封包。 和實施 200816753 已佇列封包。實際上,在實施發生之前,封包佇列表示插 入延遲。插入的延遲通常稱作實施延遲。 在目前的跳動緩衝設計和實施上至少有兩問題。第一 個問題係相關於需要插入多少實施延遲。在實施延遲數量 上可有多有少。就大延遲而言,封包損失較少。另一方 面,就小延遲而言,互動感覺較佳。可由適應性跳動緩衝 計畫合宜地解決第一個問題。在適應性跳動緩衝計畫中’ 接收器可依據進來封包的RTP標頭之時間戳記和接收器本 地時間估算網路封包跳動。然後,接收器插入剛好足夠補 償網路封包跳動用的最小延遲。 跳動緩衝設計的第二個問題係相關於何時插入實施延 遲。理想上,可在各個說話乍現的一開始插入實施延遲。 因此,雖然可在均等間距實施各個說話乍現,但是只有說 話乍現之間的無聲期間被擴大或壓縮。例如,若發送器利 用無聲抑制技術,則進入到接收器的封包理想上具有說話 乍現之間的間距,使得裝置可實施成依據進來封包的RTP 標頭之時間戳記和順序號碼加以辨識各個說話乍現的一開 始。 然而,事實上,只有在有限情況下可達成在說話乍現 一開始插入延遲。大部分目前的無聲抑制技術具有限制並 且只在諸如單一說話者或低背景雜訊等一些純粹情況下能 夠執行良好。目前的無聲抑制技術在諸如會議中的多個說 話者或諸如行動通訊等高背景雜訊等一些其他情況下就無 法執行良好。因此,爲了保留較好的聲頻品質’許多應用 -8- 200816753 在未利用或致動無聲抑制就執行。結果,進入到接收器中 的封包可以是連續的而無任何中斷。時間戳記和順序號碼 上沒有任何線索可得知是否封包表示無聲或說話乍現。假 設沒有辨識無聲的線索,則目前的跳動緩衝技術執行很 差。不良的性能原因之一即目前的跳動緩衝設計通常只看 進來封包的RTP標頭資訊,而不看RTP酬載上的內容。 (c )協定的硬體或軟體平台相依性 硬體或軟體平台相依性會產生可交互運作性及/或組 態問題。就包含諸如視頻、聲頻、聊天、遊戲、或虛擬實 境等多媒體元素之通訊中的互動使用者對話而言,需要有 諸如例如能夠在伺服器和用戶之間有效傳送資訊並且能夠 獨立於硬體和軟體平台之外運作的對話啓動協定(SIP ) 等通訊協定之輕量協定,在伺服器和用戶之間所使用的控 制平面協定,及伺服器和用戶通訊的基本傳送層或媒體。 有需要足夠快到支援緊急即時控制訊息及對具有最小延遲 的大體積資料移轉而言足夠彈性之協定。然而’諸如 UMA等習知技術協定通常是複雜的且難以建立可交互運 作性。 (d )當從行動裝置存取企業資源時的安全性 越來越多的企業允許它們的員工能夠使用自己的蜂巢 式/行動電話做生意。憑藉可利用諸如 WiFi、Edge、 UMTS、CDMAEVDO等高速網路到行動電話,不同販售商 200816753 已實施VoIP (網路電話)到行動電話。此種實施需要開 放的企業防火牆,使得諸如SIP、RTP等VoIP相關協定能 夠操作。 除了 VoIP之外,也可將其他企業資料中心應用延伸 到行動電話。這些應用程式可包括一或多個 Presence /Instant Messaging (出席/即時訊息)、企業內部網路網 頁資源、CRM、Support database (支援資料庫)等。若用 戶利用行動電話爲一或多個上述應用程式直接存取企業資 源,則企業防火牆需要爲多個協定打開,而開放的企業防 火牆可能產生安全性問題。 【發明內容】 在一實施例中,本發明係相關於用以管理手機的電信 行動性之行動性架構配置。配置包括DiVitas協定代理伺 服器(DPP ),其被組配成管理手機的行動性用戶與企業 內的行動性伺服器之間的連接性。DPP包括用戶DPP,其 被組配成管理手機的行動性用戶之連接性。用戶D P P接收 來自複數應用程式用戶的複數用戶連接性請求。伺服器 D P P被組配成管理行動性伺服器的連接性。伺服器d P P接 收來自複數應用程式伺服器的複數伺服器連接性請求。用 戶DPP和伺服器DPP被組配成彼此互動以建立安全通 道。 上述摘要係只相關於此處所揭示的本發明之許多實施 例的其中之一或多個,並不用於限制本發明的範圍,本發 -10- 200816753 明的範圍將在本文的申請專利範圍中陳述。下文中’連同 下面圖式將在本發明的詳細說明中更加詳細說明本發明的 這些和其他特徵。 【實施方式】 目錄 架構 B.以編碼/解碼器爲基的聲學回音消除 C .透過IP的語音/視頻通訊之以內容爲基的跳動緩衝設計 D·戴維他(Divitas)描述協定(DDP) E·戴維他(Divitas)協定代理(DPP) Η.結論 現在將參考如附圖所圖解說明的一些較佳實施例詳細 說明本發明。在下面說明中,爲了能夠全面性瞭解本發明 陳述許多特定細節。然而,精於本技藝之人士應明白在沒 有一些或全部這些特定細節之下仍可實施本發明。在其他 例子中,爲了不混淆本發明將不詳細說明眾所皆知的處理 步驟及/或結構。參考圖式和下面討論將可更加明白本發 明的特徵和優點。 可參考特定設備和實施例說明本發明。精於本技藝之 人士將明白說明僅用於圖解說明和提供實施本發明的最佳 模式。而不應解釋作限制本發明的範圍。例如,儘管參考 特定通訊協定,但是本發明也考慮到其他協定。例如,儘 管說明WiFi ( IEEE 802.1 1 )當作無線通訊的協定,但是 -11 - 200816753 本發明也可實施其他協定。此處對D i v i t a s和行動性伺服 器所做的參考是相等的。 下面說明各種實施例,包括方法和技術。應注意本發 明也涵蓋製造的物體,其包括儲存完成本發明的實施例之 電腦可讀式指令的電腦可讀式媒體。電腦可讀式媒體包括 例如用以儲存電腦可讀碼之半導體、磁性、光磁、光學、 或其他形式的電腦可讀式媒體。另外,本發明也涵蓋用以 實施本發明的實施例之設備。此種設備包括完成有關本發 明的實施例之操作的電路(專屬及/或可程式化)。此種 設備的例子包括當適當程式化時的萬用型電腦及/或專屬 計算裝置,並且包括用於有關本發明的實施例之各種操作 的電腦/計算裝置與專屬/可程式化電路之組合。 A.架構 圖1爲根據本發明的實施例之系統網路1 〇 〇圖。設置 利用許多可能方式與網路通訊之行動配備(Μ E ) 1 0 2。Μ E 1 〇 2可與包括基地收發站(B T S ) 1 1 2、B T S交換中心 (B S C ) 1 1 4、及行動交換中心(μ S C ) 1 1 6的蜂巢式網路 1 1 〇通訊。耦合 M S C到耦合到公用交換電話網路 (PSTN) 122的媒體閘道器120。其他習知公用和專用電 話1 2 4也被耦合到P S TN。將P B X 1 3 0耦合到P S TN,及例 如透過電話1 3 6爲企業打電話和接電話。將行動性伺服器 150耦合到PBX與其他網路。例如,透過路由器132將行 動性伺服器1 5 0耦合到網際網路協定廣域網路(Wan ) - 12- 200816753 1 3 8。也透過路由器1 40和防火牆1 42將行動性伺服器1 5 〇 耦合到網際網路1 44。雖然本發明也預想到多個存取點, 但是本處只描繪一存取點。存取點1 6 0使具有Μ E 1 〇 2的 使用者能夠在企業中漫遊並且經由行動性伺服器1 5 0和 ΡΒΧ 130與PSTN維持連接。若使用者漫遊超出LAN的邊 界,則如下面將詳細說明一般,使用者將連接到另一網路 (如、蜂巢式網路)。另外又描繪耦合到網際網路存取點 1 80,其用於如本文所說明的特定條件之下的存取。 圖2A-C爲根據本發明的實施例之行動性伺服器。 安全性管理器-當兩或更多時體正通訊時的安全性定 義包含以下方面: 1.通訊實體的相互認證 2 .通訊通道的隱私權 3 .交換訊息的完整性 4.訊息的認證 在Divitas行動性情況中,具有三個明確的通訊實 體:Divitas用戶、Divitas伺服器、及外部VoIP GW。並 且在這些實體之間具有兩清楚的路徑類型:SIP發信路徑 和媒體路徑。 如架構說明書[1]所說明一般’下面機構被用於達成用 戶、伺服器、及外部閘道器之間的發信和資料路徑之上述 安全性方面: 1. 用戶和伺服器之間的SIP TLS對話。 2. 在SIP TLS建立之後使用SIP通知的用戶認證 -13- 200816753 3 .利用伺服器的使用者之認證 4. 伺服器和外部VoIP閘道器之間的SIP TLS對話。 5. 利用外部VoIP閘道器的伺服器認證 6. 安全媒體路徑 7 ·衍生的需求 使用者/裝置管理器/行動性控制器-裝置和行動性管理 器(特此稱作DMM )是在裝置上有進行中的電話同時處 理裝置組態和狀態與行動性方面之模組。下面各段落記錄 DMM之功能和設計規格與DMM支援的公用介面。 1·企業管理人所控制的裝置組態。 2. 裝置的報告狀態 3. 裝置的影像管理 4·爲有進行中的電話之手機維持和實施行動性邏輯-即 處理WiFi到Cell (蜂巢式)和反之亦然的傳訊。 5 ·處理裝置初始化和來自用戶的組態請求。 控制平面/電話控制-電話控制(CC )是負責下面功能 的主要控制平面模組: 1.網路語音電話處理200816753 IX. Description of the Invention [Technical Field] The present invention relates to a DIVITAS protocol agent and a prior art conventional mobile communication platform including cellular communication, for example, a full communication system (GSM). Others that support limited mobility are known as WiFi according to the IEEE 802.1 1 standard. Both cellular and WiFi are known and are established wireless communication platforms. The next-generation platform is designed to enable mobile users to move between bee networks and include unauthorized access (standard, the standard provides switching controllers for carriers) to enable users to be able to hive and WiFi Between standards, and vice versa. However, UMA has disadvantages such as the carrier usually controlling the phone and deciding whether and when to exchange users on the network. Advanced mobile communication platforms are needed to provide enterprise-level communication control users and networks, Enterprises (instead of carriers) can choose the network and/or telephone according to the driving criteria rather than the carrier driving criteria. In addition, in mobile/wireless communication, 'usually have the following (a) echo; (b) affect service quality (Q〇S) Packet delay delay variation (packet jitter), and packet loss; (c) coordination or software platform dependencies; and (d) enterprise resource access security issues are described as follows: Nested and UMA) are beyond the standard path, and according to the enterprise problem = late, sealed hard integrity. -5- 200816753 (a) Echo has widely used echo cancellation (EC) technology to improve end-user service quality (QoS) in voice communications such as the traditional PS TN, conference phones, cellular mobile phones, and Internet telephony. . There are usually two types of echo cancellers. One type of echo canceller is commonly referred to as a line or network echo canceller (LEC). The LEC is typically used to remove electrical echoes caused by reflections from mixed components on the network generated by 2-wire and/or 4-wire conversion. Another type of echo canceller is often referred to as an acoustic echo canceller (AEC). The AEC is typically used to remove acoustic echoes due to acoustical feedback from the microphone to the microphone, mobile phone, or conference phone on the speakerphone speakerphone. Compared with LEC, it is more difficult to implement AEC due to the following factors: Because the speed of sound is much slower than the speed of light (or electron velocity), the echo tail is longer, so the echo canceller must have more processing power and memory; because of the phone or The movement of the speaker and the changes in the environment, so the dynamics of the acoustic echo characteristics vary greatly, so the echo canceller must track and catch up with the changes in the echo characteristics more quickly; and because of the multiple objects from different distances and/or orientations. Multiple echo paths caused by reflections. Current acoustic echo cancellation techniques typically have limitations. Although acoustic echo cancellation techniques have been invented and used for at least 40 years, the basic method of eliminating acoustic echo has not changed significantly. Typically, a typical AEC uses an adaptive filter to model one or more echo path transfer functions and try to produce a copy of the echo. The AEC can then subtract this copy from the incoming input signal to form the final anecho-free far-end signal output. -6 - 200816753 To date, most of the developments in acoustic echo cancellation techniques have used filters such as FIR or IIR filters, single or multi-wave filters, or time or frequency domain filters. In addition, different algorithms such as LMS, APA, etc. have been used to improve filter efficiency. Despite all these technological improvements, AEC has designed and implemented a very difficult job today. Because of the complexity and variability of acoustic echoes, conventional filters present a number of limitations on the processing of acoustic echoes that are limited to poor two-end talk (near-end and far-end talker) performance. The result of the conventional filter calculation is to replace the convergence between echo and copy at the end of the talk. (b) Packet delay, packet delay (packet jitter), and packet loss affecting quality of service (Q〇S). In voice over internet and network video communications, voice and/or video content needs to be immediately transferred from the sender. The receiver, however, was originally designed for non-instant messaging. Therefore, providing and maintaining the ultimate quality of service (QoS) becomes a very difficult task. The packet delay, packet delay variation (packet jitter), and packet are considered to be qualities and important QoS parameters that affect the voice and video communications of the IP network. The current bounce buffering technique has limitations. A bounce buffering scheme, also known as debounce, is typically used on the receiver side to compensate or eliminate net bounce. Basically, the solution cannot be implemented as soon as the packet is received. Instead, the solution can be evenly spaced into the packets. Different types of bands filter RLS, and this is still a formal system. It is said that there is a delay between the frequency media IP network end user end-to-end loss of the three-pass scheme road packet packet. And implementation 200816753 has been packaged. In fact, the packet queue indicates the insertion delay before the implementation takes place. The delay of insertion is often referred to as the implementation delay. There are at least two problems with the current design and implementation of the bounce buffer. The first question is related to how many implementation delays need to be inserted. There can be more or less implementation delays. In the case of large delays, packet loss is less. On the other hand, in terms of small delays, the interaction feels better. The first problem can be solved expediently by an adaptive jitter buffering scheme. In the adaptive jitter buffering scheme, the receiver can estimate the network packet jitter based on the timestamp of the RTP header of the incoming packet and the local time of the receiver. The receiver then inserts a minimum delay just enough to compensate for network packet bounce. The second problem with the bounce buffer design is related to when the insertion delay is inserted. Ideally, an implementation delay can be inserted at the beginning of each speech. Therefore, although it is possible to implement each speech at equal intervals, only the silent period between the speeches is expanded or compressed. For example, if the transmitter utilizes a silent suppression technique, the packet entering the receiver desirably has a spacing between speeches, such that the device can be implemented to recognize each speech based on the timestamp and sequence number of the RTP header of the incoming packet. The beginning of the present. However, in fact, only in limited circumstances can the insertion delay be reached at the beginning of the speech. Most current silent suppression techniques have limitations and can only perform well in pure cases such as a single speaker or low background noise. Current silent suppression techniques are not well performed in a number of other situations, such as multiple speakers in a conference or high background noise such as mobile communications. Therefore, in order to preserve better audio quality, many applications -8-200816753 are performed without utilizing or actuating silent suppression. As a result, the packets entering the receiver can be continuous without any interruption. There are no clues on the timestamp and sequence number to see if the packet indicates silence or speech. Assuming that no silent clues are identified, the current bounce buffering technique performs poorly. One of the reasons for poor performance is that the current jitter buffer design usually only looks at the RTP header information of the packet, not the content on the RTP payload. (c) Protocol hardware or software platform dependencies Hardware or software platform dependencies can create interoperability and/or configuration issues. For interactive user conversations in communications involving multimedia elements such as video, audio, chat, games, or virtual reality, there is a need, for example, to be able to effectively communicate information between the server and the user and to be independent of the hardware. A lightweight protocol for communication protocols such as the Session Initiation Protocol (SIP) operating outside the software platform, a control plane protocol used between the server and the user, and a basic transport layer or medium for server and user communication. There is a need for an agreement that is fast enough to support emergency immediate control messages and is flexible enough to transfer large volumes of data with minimal delay. However, conventional technology agreements such as UMA are often complex and difficult to establish for interoperability. (d) Security when accessing corporate resources from mobile devices More and more companies are allowing their employees to use their own cellular/mobile phones to do business. With high-speed networks such as WiFi, Edge, UMTS, CDMAEVDO, and mobile phones, different vendors 200816753 have implemented VoIP (Internet Telephony) to mobile phones. Such implementation requires an open corporate firewall that enables VoIP-related protocols such as SIP and RTP to operate. In addition to VoIP, other enterprise data center applications can be extended to mobile phones. These applications can include one or more Presence / Instant Messaging, intranet web resources, CRM, Support database, and more. If a user uses a mobile phone to directly access corporate resources for one or more of these applications, the corporate firewall needs to be opened for multiple agreements, and an open corporate firewall can create security issues. SUMMARY OF THE INVENTION In one embodiment, the present invention is directed to an operational architecture configuration for managing telecommunications mobility of a handset. The configuration includes the DiVitas Protocol Proxy Servant (DPP), which is configured to manage the connectivity between mobile users of the handset and mobile servers within the enterprise. The DPP includes a user DPP that is configured to manage the connectivity of the mobile user's mobile users. User D P P receives multiple user connectivity requests from multiple application users. The server D P P is configured to manage the connectivity of the mobile server. The server d P P receives the complex server connectivity request from the plurality of application servers. The user DPP and the server DPP are grouped to interact with each other to establish a secure channel. The above summary is only one or more of the many embodiments of the invention disclosed herein, and is not intended to limit the scope of the invention, the scope of the disclosure of which is incorporated herein by reference. statement. These and other features of the present invention will be described in more detail in the detailed description of the invention hereinbelow. [Embodiment] Directory Architecture B. Acoustic Echo Cancellation Based on Encoder/Decoder C. Content-Based Bounce Buffer Design for IP Voice/Video Communication D. Divitas Description Protocol (DDP) E. Divitas Protocol Agent (DPP). Conclusion The present invention will now be described in detail with reference to certain preferred embodiments illustrated in the accompanying drawings. In the following description, numerous specific details are set forth. However, it will be apparent to those skilled in the art that the present invention may be practiced without some or all of these specific details. In other instances, well known process steps and/or structures are not described in detail in order not to obscure the invention. The features and advantages of the present invention will become more apparent from the understanding of the appended claims. The invention may be described with reference to particular apparatus and examples. Those skilled in the art will understand that the description is only illustrative and provides the best mode for practicing the invention. It should not be construed as limiting the scope of the invention. For example, although reference is made to a particular communication protocol, the present invention contemplates other agreements. For example, although WiFi (IEEE 802.1 1 ) is described as a protocol for wireless communication, -11 - 200816753 may also implement other protocols. The references made to D i v i t a s and the mobility server are equal here. Various embodiments are described below, including methods and techniques. It should be noted that the present invention also encompasses manufactured objects including computer readable media storing computer readable instructions for performing embodiments of the present invention. Computer readable media includes, for example, semiconductor, magnetic, magneto-optical, optical, or other forms of computer readable media for storing computer readable code. In addition, the present invention also encompasses an apparatus for carrying out embodiments of the present invention. Such apparatus includes circuitry (exclusive and/or programmable) that performs the operations of the embodiments of the present invention. Examples of such devices include versatile computers and/or proprietary computing devices when properly programmed, and include combinations of computer/computing devices and proprietary/programmable circuits for various operations related to embodiments of the present invention. . A. Architecture Figure 1 is a diagram of a system network 1 in accordance with an embodiment of the present invention. Setup Actions that use many possible ways to communicate with the network (Μ E ) 1 0 2 . Μ E 1 〇 2 can communicate with a cellular network 1 1 包括 including a base transceiver station (B T S ) 1 1 2, a B T S switching center (B S C ) 1 1 4 , and a mobile switching center (μ S C ) 1 1 6 . The M S C is coupled to a media gateway 120 coupled to a public switched telephone network (PSTN) 122. Other conventional public and private telephones 1 2 4 are also coupled to P S TN. P B X 1 3 0 is coupled to P S TN, and for example, to make and receive calls from the enterprise via telephone 1 36. The mobility server 150 is coupled to the PBX and other networks. For example, the mobility server 150 is coupled to the Internet Protocol Wide Area Network (Wan) through the router 132 - 12-200816753 1 3 8. The mobility server 15 5 is also coupled to the Internet 1 44 via the router 140 and the firewall 1 42. Although the present invention also contemplates multiple access points, only one access point is depicted herein. Access point 160 enables a user with Μ E 1 〇 2 to roam in the enterprise and maintain a connection with the PSTN via mobility servers 150 and 130. If the user roams beyond the border of the LAN, as will be explained in more detail below, the user will connect to another network (e.g., a cellular network). Also depicted is coupled to an internet access point 180 for access under certain conditions as described herein. 2A-C are actuating servers in accordance with an embodiment of the present invention. Security Manager - The security definition when two or more are in positive communication includes the following aspects: 1. Mutual authentication of the communication entity 2. Privacy of the communication channel 3. Integrity of the exchange message 4. Authentication of the message In the Divitas mobility scenario, there are three distinct communication entities: Divitas users, Divitas servers, and external VoIP GWs. And there are two clear path types between these entities: SIP signaling path and media path. As described in the Architecture Manual [1], the following mechanisms are used to achieve the above security aspects of the signaling and data paths between the user, the server, and the external gateway: 1. SIP TLS between the user and the server dialogue. 2. User authentication using SIP notification after SIP TLS is established -13- 200816753 3. Authentication by the user of the server 4. SIP TLS session between the server and the external VoIP gateway. 5. Server authentication using an external VoIP gateway 6. Secure Media Path 7 • Derived Demand User/Device Manager/Action Controller - Device and Mobility Manager (herein referred to as DMM) is on the device There are ongoing calls to handle both device configuration and status and mobility aspects of the module. The following paragraphs record the functions and design specifications of the DMM and the common interface supported by the DMM. 1. The device configuration controlled by the enterprise manager. 2. Report status of the device 3. Image management of the device 4. Maintain and implement mobile logic for mobile phones with ongoing calls - ie, handle WiFi to Cell (and cellular) and vice versa. 5 • Processing device initialization and configuration requests from the user. Control Plane/Telephone Control - Telephone Control (CC) is the main control plane module responsible for the following functions: 1. Voice over IP telephony

2.SIP代理伺服器和B2BUA 3·經由 PSTN GWs 的 PSTN Call 管理 4·經由Asterisk的PBX特徵管理 5 ·資源和連接管理 電話控制模組駐在DN媒體交換器上。電話控制模組 與SIP堆疊和Asterisk (或任何其他)PBX接合以提供上 - 14- 200816753 述功能。 1.SIP 堆疊(用於 UA,CCM,及 Asterisk 等):sip 堆 疊主要被使用當作協定訊息解碼/編碼引擎。SIP堆疊又執 行基本的協定指定工作,諸如以標準爲基的訊息剖析和驗 §登、重傳、專屬訊息驗證等。就大部分代理和B 2 B U A工 作而言,SIP堆疊依賴CC作決定。CC與Asterisk和CC 與C CM之間的互動係經由以標準爲基的SIP訊息。 2·代理引擎/組態管理器(PA/CM ):代理引擎充作用 於所有應用程式的組態管理器。在供應時或系統啓動後讀 取碟DB之後,以PA下載電話控制相關資訊。CC將資料 儲存在RAM做爲本地/較快速存取用。CC又更新任何動 態資訊的PA (如、電話進行中或中斷),或需要資訊 (如、SNMPGET)。 3_資源管理器(11“):資源管理器提供實體/網路資 源的邏輯圖。這些資源包括GE埠、DSP資源、插座、 UDP/TCP埠等,但不包括系統資源,諸如言己憶體、資料緩 衝器、計時器、ί宁列等。資源不包括用於內部IP C通訊的 插座。CC使用RM作爲資源CAC、資源保留和通訊用。 當作通訊的一部分,RM告訴媒體交換器程式化硬體以使 媒體能夠流動。 媒體交換應用程式(MSA) -MSA將被設計成部分在 Linux上而剩下的在TMS320DM64x DSP處理器上執行。 應用程式將執行下面功能: RTP封包處理。 - 15- 200816753 交換。 代碼轉換。 會議電話。 適應性跳動緩衝。 封包損失隱藏。 包括VAD/CNG和AGC的後處理。 MSA軟體需要支援不同說話編碼/解碼器之編碼/解 碼。可在執行期間改變演算法和通道的類型,即需要支援 多通道、多演算法的設計。各個編碼/解碼器演算法需要 是可重入碼的,及程式與資料需要完全可釋放的。爲了支 援各種編碼/解碼器,需將下面列入考慮: a. 因爲DSP在晶片資料記憶體上有限制,所以在多通 道、多演算法應用程式中並非所有資料都能夠一直置放晶 片上。此需要在內文交換期間可重新改變(在晶片上和晶 片外記憶體之間)各個演算法中所有資料(內文和表格) 的位置。此需要找出各個支援的編碼/解碼器之記憶體、 堆疊尺寸、與MIPS需求。 b. 交換指出通道數目與編碼/解碼器類型和任何其他特 徵的主機和D S P之間的訊息之機構。通道組態管理器需要 打開指出所需的功能類型之DSP的通道。必須實施指出 DSP狀態的週期性訊息。 DSP處理器使外部主機能夠存取DSP外部記憶體。 DSP具有1 6千位元組的第一階程式和資料記憶體。程式 與資料記憶體共用25 6k位元組的第二階記憶體。可利用 -16- 200816753 16百萬位元組外部記憶體(SDRAM )。兩處理器之間的 共用記憶體儲存進來與出去的RTP資料。因爲DSP需要 支援N通道數量’所以此§5憶體將包含每一^個長度320位 元組的N接收與傳送緩衝(就視頻而言,這些緩衝需要是 1 5 00位元組的)。用於主機和DSP之間的資訊與每一通 電話爲基礎所需的資訊之資料結構需要被定義。下面步驟 定義DSP功能: a. 在啓動中,一旦將軟體下載到DSP (將藉由在固定 記憶體位置寫入預定値以使DSP指出相同者,藉以指出下 載軟體的主機)。 b. 在成功下載軟體時,DSP將執行內部計時器1〇 m s e c。此時,D S P輪詢通道狀態以改變成處理,此處理係 一旦封包到達藉由主機所設定。 c. 將指出編碼/解碼器類型、資料就緒、與電話類型 (最初只有語音)之來自主機的開始電話或打開通道命令 發送至RX與TX方向。 d·依據所打開的通道,DSP從外部緩衝器取得RTP資 料並且對這些執行DSP相關功能。 e·在TX側上,DSP將編碼資料置放於外部緩衝器 上,讓TX能夠取得。 圖3爲根據本發明的實施例之行動配備用戶圖。 在與Divitas伺服器相容的手機上執行用戶軟體或手 機軟體。典型上,這些是具有提供蜂巢式網路(CDMA或 GSM )的電話連接與LAN網路(有線LAN或無線LAN ) -17- 200816753 的ip連接之雙模式手機。 也可爲具有麥克風和揚聲器的桌上型/膝上型或PDAs 編譯軟體來當作軟體電話。 使用者介面 用戶使用者介面提供下面功能: •設置開機組態-DNS IP位址、Divitas伺服器URL、 開機使用者狀態(INVISIBLE/AVAILABLE)、安全設定 •改變使用者狀態(INVISIBLE/AVAILABLE) •增加企業”buddieS“(夥伴)和取得他們的出席資訊 (INVISIBLE/AVAILABLE/CALL-IN-PROGRESS) •企業”buddies (夥伴)的顯示可利用性狀態並且連 接到他們 •共有企業電話特徵的使用者介面 • 電話撥打 • 電話接聽 • 話中插接 • 指定轉接 • 電話轉接 • 多方會議電話 • 語音郵件通知 • 未接電話通知 • 已接電話通知 • 待接電話通知 -18- 200816753 • 號碼查詢和利用名字撥號 •使用蜂巢式網路取代WiFi網路的手動控制裝置 •顯示器版本失配 •升級請求/狀態 •失能/禁止用戶軟體一ISP應用程式被用於撥打/接收 蜂巢式電話 電話控制和語音 •在LAN介面上撥打VoIP電話之電話控制 •在LAN介面上撥打V〇iP電話之語音引擎一包括編碼 /解碼器、回音消除、跳動控制、錯誤隱藏 •從蜂巢式電話到VoIP電話的電話傳訊 •從VoIP電話到蜂巢式電話的電話傳訊 802.11 •決定可利用哪一個IP網路和它們的信號強度和傳遞 那資訊給伺服器 •AP用戶 • 802.1 1迷你連接埠的功率管理一每當802.1 1的信號 強度低於可接受的臨界時,以罕見的間隔使網路進入睡眠 狀態並且輪詢網路以節省功率 •若電話在進行中,則將信號強度和語音品質資訊包 裝成RTCP封包,或若電話不在進行中,則保持持續有效 以通訊到伺服器。每當信號強度降至可接受的臨界下或語 音品質退化時,伺服器將決定從VoIP交換電話到蜂巢式 -19- 200816753 網路。 平台 因爲市面上有許多手機販售商且提供雙模式手機,所 以軟體需要被設計成大部分的碼能在手機之間共用。医I 此,必須將碼分成平台依賴部分和平台獨立部分。事實 上,幾乎所有的Divitas核心値都應在軟體的平台獨立部 分,如此可容易從一平台攜帶到另一平台。平台依賴部分 應只有功能適應層(尤其是,電S舌、LAN、802.11、聲頻 和顯示適應層)。每當將碼轉移到新平台時,在提供統一 API給平台獨立部分的同時,只需要修正和重寫這些適應 層。 將於多個手機平台上執行用戶軟體。最普遍的手機平 台是 Windows CE、Symbian、及 Linux。 除了雙模式手機之外,用戶應用程式被設計成在不具 有蜂巢式電話介面的802.1 1電話、PDA、或膝上型/桌上 型電腦上運作。在這些平台上,可利用一子組特徵到使用 者。基本上,從VoIP到蜂巢式的電話傳訊是不可能的。 操作理論 在起動時,用戶應用程式尋找手機上可利用的資源。 用戶應用程式首先檢查有線網路的存在。若不存在,則用 戶應用程式檢查802.1 1網路的存在。視企業安全政策進 f了有線或無線媒體認證。手機用戶應支援企業所利用的安 •20- 200816753 全機構。最普遍的安全機構是 WPA ( WiFi受保護存 取)。一旦成功進行認證,則無線用戶取得使用DHCP的 IP介面之IP位址。 應用程式從持續性資料庫取得Divitas伺服器URL和 DNS IP位址,並且嘗試向Divitas伺服器註冊。 可在企業網路內部的手機上執行應用程式用戶。在那 時’用戶可到達Divitas伺服器卻不需要任何其他安全覆 蓋層。在用戶示在公共網路時(例如具有WiFi網際網路 存取的咖啡廳或機場),典型上使用者設定VPN連接到 企業。用戶只有在VPN通道建立之後才可到達Divitas伺 服器。 用戶應用程式軟體藉由發送加密數位簽證(企業IT 所安裝)給伺服器向伺服器認證手機。一旦認證手機,則 用戶取得來自使用者或儲存在手機中的登入/密碼,將登 入/密碼加密並且將經加密登入/密碼發送到伺服器作爲使 用者認證。當成功認證時’伺服器藉由發送企業電話號碼 加以回答。在回答時,用戶發送蜂巢式電話號碼到伺服 器。伺服器爲所有未來的傳訊方案結合該二者。 使用用於發信的SIP/TLS和用於媒體流的SRTP以確 保發信和媒體流。然而’若使用者是在VPN鏈路上,則 用戶不需要添加另一位準的加密。添加另一位準的加密會 導致語音品質降低。在那例子中,SIP被用於發信而RTP /RTCP被用於媒體流。 每當用戶恢復與伺服器的網路連接性時重複上述處 -21 - 200816753 理。 恆穩態操作 藉由在GUI上組配並且在持續性資 態,使用者可在起動時選擇invisible (看不見/可利用)。用戶對伺服器更_ 訊。2. SIP Proxy Server and B2BUA 3. PSTN Call Management via PSTN GWs 4. PBX Feature Management via Asterisk 5 • Resource and Connection Management The Telephony Control Module resides on the DN Media Switch. The telephony control module interfaces with the SIP stack and the Asterisk (or any other) PBX to provide the functionality described in the previous paragraph - 14-200816753. 1. SIP stack (for UA, CCM, and Asterisk, etc.): The sip stack is primarily used as a protocol message decoding/encoding engine. The SIP stack performs basic protocol designation, such as standards-based message profiling and verification, retransmission, and proprietary message verification. For most agents and B 2 B U A work, the SIP stack relies on the CC for decision. The interaction between CC and Asterisk and CC and C CM is based on standard-based SIP messages. 2. Agent Engine/Configuration Manager (PA/CM): The Agent Engine acts on the Configuration Manager for all applications. After reading the disc DB at the time of supply or after the system is started, download the phone control information with the PA. The CC stores the data in RAM for local/faster access. The CC updates the PA of any dynamic information (eg, the call is in progress or is interrupted) or requires information (eg, SNMPGET). 3_Resource Manager (11"): The resource manager provides a logical diagram of the entity/network resources. These resources include GE埠, DSP resources, sockets, UDP/TCP埠, etc., but do not include system resources, such as words. Body, data buffer, timer, 宁宁 column, etc. Resources do not include sockets for internal IP C communication. CC uses RM as resource CAC, resource reservation and communication. As part of the communication, RM tells the media switch Stylized hardware to enable media to flow. Media Exchange Application (MSA) - MSA will be designed to be partially executed on Linux and the rest will be executed on the TMS320DM64x DSP processor. The application will perform the following functions: RTP packet processing. - 15- 200816753 Exchange. Code conversion. Conference call. Adaptive jitter buffer. Packet loss concealment. Includes post-processing of VAD/CNG and AGC. MSA software needs to support encoding/decoding of different speech codecs/decoders. Changing the type of algorithm and channel, that is, the need to support multi-channel, multi-algorithm design. Each encoder/decoder algorithm needs to be reentrant coded, and The data and data need to be completely releasable. To support various encoders/decoders, consider the following: a. Because DSP has limitations on the chip data memory, not all in multi-channel, multi-algorithm applications Data can be placed on the wafer all the time. This requires re-changing (between the wafer and the off-chip memory) the location of all the data (text and table) in each algorithm during the text exchange. Memory, stack size, and MIPS requirements for each supported encoder/decoder b. Exchange mechanism for messages between the host and DSP indicating the number of channels and the encoder/decoder type and any other characteristics. Channel Configuration Manager A channel that indicates the DSP of the desired type of function needs to be opened. A periodic message indicating the state of the DSP must be implemented. The DSP processor enables the external host to access the external memory of the DSP. The DSP has a first-order program of 1 6 kilobytes. And data memory. The program and data memory share the second-order memory of 25 6k bytes. You can use 16-200816753 16 million-bit external record Body (SDRAM). The shared memory between the two processors stores incoming and outgoing RTP data. Because the DSP needs to support the number of N channels', this §5 memory will contain N bits of 320 bits per length. With the transfer buffer (in the case of video, these buffers need to be 1 00 bytes). The data structure used for the information between the host and the DSP and the information required for each call is defined. Define the DSP function: a. During startup, once the software is downloaded to the DSP (the host that will download the software will be indicated by writing the predetermined address in the fixed memory location so that the DSP indicates the same). b. When the software is successfully downloaded, the DSP will execute the internal timer 1〇 m s e c. At this time, D S P polls the channel status to change to processing, and this processing is once the packet arrives and is set by the host. c. Send a start or open channel command from the host indicating the encoder/decoder type, data ready, and phone type (initially only voice) to the RX and TX directions. d. Based on the channel being opened, the DSP takes the RTP data from the external buffer and performs DSP related functions on these. e. On the TX side, the DSP places the encoded data on an external buffer for TX to acquire. 3 is a diagram of a mobile device user in accordance with an embodiment of the present invention. Execute user software or phone software on a phone that is compatible with the Divitas server. Typically, these are dual-mode phones with an ip connection that provides a cellular connection (CDMA or GSM) and an ip connection to a LAN network (wired LAN or wireless LAN) -17-200816753. It can also be used as a software phone for desktop/laptop or PDAs with microphones and speakers. The user interface user interface provides the following functions: • Set boot configuration - DNS IP address, Divitas server URL, INVISIBLE / AVAILABLE, security settings • Change user status (INVISIBLE / AVAILABLE) • Increase the company "buddieS" (partners) and get their presence information (INVISIBLE/AVAILABLE/CALL-IN-PROGRESS) • Enterprise "buddies" to show the availability status and connect to them • Users of the corporate phone feature Interface • Telephone dialing • Telephone answering • In-line docking • Designated transfer • Telephone transfer • Multi-party conference call • Voicemail notification • Missed call notification • Received call notification • Call notification -18- 200816753 • Number inquiry Dial-up with name dialing • Manual control using a cellular network instead of a WiFi network • Display version mismatch • Upgrade request/status • Disabling/disabling user software An ISP application is used to dial/receive cellular phone calls And voice • Telephone control for making VoIP calls on the LAN interface • On the LAN interface Voice engine for V〇iP calls includes encoder/decoder, echo cancellation, jitter control, error concealment • telephony from cellular phones to VoIP phones • telephony from VoIP phones to cellular phones 802.11 • Decide to be available Which IP network and their signal strength and the information to pass to the server • AP users • 802.1 1 mini port 埠 power management - whenever the signal strength of 802.1 1 is below the acceptable threshold, at a rare interval The network goes to sleep and polls the network to save power. • If the call is in progress, the signal strength and voice quality information is wrapped into an RTCP packet, or if the call is not in progress, it remains active for communication to the server. Whenever the signal strength drops to an acceptable threshold or the speech quality degrades, the server will decide to switch from VoIP to the cellular -19-200816753 network. The platform has many mobile phone vendors on the market and offers dual-mode phones. , so the software needs to be designed so that most of the code can be shared between the phones. I need to divide the code into platform dependencies. Part and platform independent part. In fact, almost all Divitas cores should be in the platform independent part of the software, so it can be easily carried from one platform to another. The platform dependent part should only have the functional adaptation layer (especially, electric S Tongue, LAN, 802.11, audio and display adaptation layer. Whenever the code is transferred to the new platform, it is only necessary to modify and rewrite these adaptation layers while providing a unified API to the platform independent part. Execute user software on it. The most common mobile platforms are Windows CE, Symbian, and Linux. In addition to dual-mode phones, user applications are designed to operate on 802.1 1 phones, PDAs, or laptops/tablets that do not have a cellular phone interface. On these platforms, a subset of features can be utilized to the user. Basically, it is impossible to VoIP from cellular to cellular. Theory of Operation At startup, the user application looks for resources available on the phone. The user application first checks for the presence of the wired network. If not, the user application checks for the presence of the 802.1 1 network. Depending on the corporate security policy, it is wired or wireless media certified. Mobile phone users should support the company's use of the company's 20-200816753. The most common security mechanism is WPA (WiFi Protected Access). Once the authentication is successful, the wireless user obtains the IP address of the IP interface using DHCP. The application retrieves the Divitas server URL and DNS IP address from the persistence database and attempts to register with the Divitas server. Application users can be executed on mobile phones within the corporate network. At that time, the user can reach the Divitas server without any additional security overlay. When the user is on a public network (e.g., a cafe or airport with WiFi internet access), the user typically sets up a VPN connection to the enterprise. The user can only reach the Divitas server after the VPN tunnel is established. The user application software authenticates the server to the server by sending an encrypted digital visa (installed by the corporate IT). Once the handset is authenticated, the user obtains a login/password from the user or stored in the handset, encrypts the login/password and sends the encrypted login/password to the server as a user authentication. When successful authentication, the server responds by sending a corporate phone number. In response, the user sends a cellular phone number to the server. The server combines the two for all future messaging solutions. SIP/TLS for signaling and SRTP for media streaming are used to ensure signaling and media streaming. However, if the user is on a VPN link, the user does not need to add another level of encryption. Adding another level of encryption can result in reduced voice quality. In that example, SIP is used for signaling and RTP/RTCP is used for media streaming. Repeat the above - 21 - 200816753 whenever the user restores network connectivity to the server. Constant Steady Operation By combining on the GUI and in continuous state, the user can select invisible at startup (invisible/available). The user has more information on the server.

使用者亦可經常輸入企業內所謂的伙 上的持續性資料庫中保存那組態 INVISIBLE、AVAILABLE、或 CALL-IN 話中),用戶取得這些伙伴的出席資訊( 發生時,伺服器對用戶更新這些伙伴的出 每當不在電話中時,用戶和伺服器週 效。 用戶週期性發送網路狀態到伺服笔 802.1 1無線網路上,用戶發送SSID、相 的信號強度和頻寬給伺服器。若在電言 SSID當作頻帶中的RTCP封包之一部分。 則用戶發送頻帶外的持續有效訊息。 每當從用戶到伺服器可利用到網路對 撥打和接收電話的較佳模式是在網路介面 者可選擇無視較佳模式的存在,在蜂巢式 的電話。此選擇不傳遞到伺服器且不影響 選擇亦不儲存在持續性資料庫中。使用者 料庫中保存那組 或 AVAILABLE 使用者出席資 伴,並且在手機 。無論它們是 PROGRESS (電 巨量)。當事件 帛資訊。 期性交換持續有 I。若用戶示在 關存取點(AP ) §中,用戶發送 若不在電話中, 話時,對用戶之 上。然而,使用 網路上撥打出去 進來的電話。此 必須在使用者撥 -22- 200816753 打出去的電話時都明確地作選擇。 每當從用戶到伺服器無法利用到網路對話,則 話焊接電話的唯一方式是在蜂巢式介面上。使用者 到所有企業特徵的存取。無論用戶軟體是否只提供 服務供應商特徵,使用者可使用用戶軟體UI撥打 電話。爲了使用蜂巢式服務供應商網路的所有特徵 者必須終止(或禁止)用戶軟體並且使用蜂巢式服 商撥接應用程式。若服務供應商應用程式正被用於 接電話,則在下面3·4·2段中所說明的傳訊將不可會丨 只要用戶具有已建立到伺服器的對話,則使用 有到所有企業特徵的存取。用戶GUI被用於提供到 業特徵的存取給使用者。 語音 SIP發信被用於建立用戶和伺服器之間的語音 將來自聲頻接收器的語音編碼成GIPS語音引擎( 支援的編碼/解碼器之一,將被封裝成RTP封包, 的話被加密,並且在IP介面上被發送到伺服器 地,若需要的話,解密從伺服器接收的RTP,使j 解碼器之一解碼並且實施。由接收側上的GIPS VE 度解碼、跳動控制、及錯誤隱藏。 除了加密/解密、速度的編碼/解碼之外,GIPS 擎還執行錯誤隱藏、跳動控制、適應性封包緩衝、 音消除和抑制、雜訊消除和抑制、自動增益控制、 撥打電 不具有 一子組 和接收 ,使用 務供應 撥打和 者就具 這些企 電話。 VE)所 若需要 。同樣 毛編碼/ 進行速 語音引 聲學回 語音活 -23- 200816753 動偵測、舒適雜訊產生。 漫遊 不像可攜式膝上型電腦一般,手機用戶是行動性裝 置。 WLAN內的傳訊 當使用者是在具有電話交談的802.11網路中且行走 於建築物之間時,AP傳訊可能發生,即、除了手機先前 結合的AP之外,使用者的手機現在還與不同的AP結 合。若傳訊在同一子網路或到另一子網路,則不需要IP 位址變化就可發生AP傳訊,在該例子中’手機的IP位址 改變。若IP位址改變,則用戶需要再次向伺服器註冊。 在同時,已建立的電話使用舊的流動資訊繼續流動,直到 語音引擎(VE )被通知新的IP位址。 當無線用戶使用802. IX認證時,在無線用戶按無線 存取點(AP )之間有一連串訊息發送以交換證書。此訊息 交換引起連接處理時的延遲。當無線用戶從一無線AP漫 遊到另一無線AP時,執行802· IX認證的延遲可能導致網 路連接的明顯中斷,尤其是諸如以語音或視頻爲基的資料 流等時間相依流量而言。爲了最小化與漫遊到另一無線 Ap相關聯的延遲,無線設備可支援PMK快取和預先認 證。 -24- 200816753 PMK快取 當無線用戶從一無線ΑΡ漫遊到另一無線ΑΡ時,無 線用戶必須執行與各個無線ΑΡ的全面802. IX認證。WPA 使無線用戶和無線AP能夠快取全面8 02.1 X認證的結果, 以便若用戶漫遊回到無線用戶先前已認證的無線AP,則 無線用戶只需要執行4方交握且決定新的配對過渡鑰匙。 在相關請求圖框中,無線用戶包括在最初認證期間所決定 且儲存有無線用戶按無線AP的PMK快取條目之PMK識 別符號。如在無線用戶和無線AP上組配一般,將PMK快 取條目儲存一*段有限時間量。 爲了使使用充作8 02. IX認證器的開關之無線網路基 礎建設的過渡更快,WPA/WPS IE Update計算PMK識別 符號値,使得當在附加到同一開關的無線AP之間漫遊 時,重新使用如與開關802· IX認證所決定的PMK。此實 施被視作投機取巧的PMK快取。 預先認證 憑藉預先認證,在連接到其目前的無線AP同時, WPA無線用戶可隨意與其範圍內的其他無線 AP執行 8 02· IX認證。無線用戶透過其現存的無線連接將預先認證 流量發送到額外的無線AP。在與無線AP預先認證且在 PMK快取記憶體中儲存PMK和其相關資訊之後,連接到 無線用戶已預先認證的無線AP之無線用戶只需要執行4 方交握。 -25- 200816753 支援預先認證的 WPA用戶可只與公: 力在Beacon和Probe Response圖框中之無The user can also frequently enter the configuration in the so-called continuous database of the company to save the configuration INVISIBLE, AVAILABLE, or CALL-IN), and the user obtains the presence information of these partners (when the server occurs, the server updates the user) When the partners are not on the phone, the user and the server are effective. The user periodically sends the network status to the servo pen 802.1 1 wireless network, and the user sends the SSID, phase signal strength and bandwidth to the server. The SSID is used as part of the RTCP packet in the frequency band. The user sends an out-of-band persistent message. The best mode for making and receiving calls from the user to the server is the network interface. You can choose to ignore the presence of the preferred mode in a cellular phone. This selection is not passed to the server and does not affect the selection and is not stored in the persistent database. The group or AVAILABLE user is saved in the user repository. Companion, and on the mobile phone. Whether they are PROGRESS (electrical huge amount). When the event 帛 information. The term exchange continues to have I. If the user shows in the deposit Point (AP) §, if the user sends the call, if it is not on the phone, then it is on the user. However, use the call on the network to make incoming calls. This must be clear when the user dials -22-200816753. The choice is made. Whenever the network conversation is not available from the user to the server, the only way to solder the phone is on the cellular interface. The user accesses all enterprise features. Whether the user software only provides service provision. The feature is that the user can make a call using the user software UI. In order to use all features of the cellular service provider network, the user software must be terminated (or disabled) and the cellular service provider can be used to dial the application. The program is being used to answer the call, and the messaging described in paragraph 3.4.2 below will not be possible. As long as the user has a conversation that has been established to the server, access to all enterprise features is used. User GUI Used to provide access to the industry features to the user. Voice SIP signaling is used to establish the voice between the user and the server will come from the audio connection The voice of the device is encoded into a GIPS voice engine (one of the supported encoders/decoders, which will be encapsulated into RTP packets, encrypted, and sent to the server on the IP interface, if needed, decrypted from the server RTP, which decodes and implements one of the j decoders. GIPS VE degree decoding, jitter control, and error concealment on the receiving side. In addition to encryption/decryption, speed encoding/decoding, GIPS engine also performs error concealment, Bounce control, adaptive packet buffering, tone cancellation and suppression, noise cancellation and suppression, automatic gain control, dialing does not have a subgroup and reception, and the service provider dials the call. VE) If needed. The same hair code / speed speech voice acoustic back voice live -23- 200816753 motion detection, comfort noise generated. Roaming Unlike a portable laptop, a mobile phone user is a mobile device. Communication within the WLAN When the user is in an 802.11 network with a telephone conversation and walking between buildings, AP communication may occur, that is, the user's mobile phone is different from the AP previously combined with the mobile phone. AP combination. If the communication is on the same subnet or on another subnet, AP communication can occur without IP address change. In this example, the IP address of the mobile phone changes. If the IP address changes, the user needs to register with the server again. At the same time, the established phone continues to flow using the old mobile information until the voice engine (VE) is notified of the new IP address. When a wireless subscriber uses 802. IX authentication, a series of messages are sent between the wireless subscribers by wireless access point (AP) to exchange certificates. This message exchange causes a delay in connection processing. When a wireless user roams from one wireless AP to another, the delay in performing 802. IX authentication may result in significant disruption of the network connection, especially for time dependent traffic such as voice or video based data streams. To minimize the delay associated with roaming to another wireless Ap, the wireless device can support PMK caching and pre-authentication. -24- 200816753 PMK Cache When a wireless subscriber roams from one radio to another, the wireless subscriber must perform full 802. IX authentication with each radio. WPA enables wireless users and wireless APs to cache the results of full 802.1X authentication so that if a user roams back to a previously authenticated wireless AP of a wireless subscriber, the wireless subscriber only needs to perform a 4-way handshake and decide on a new pairing transition key. . In the associated request frame, the wireless subscriber includes the PMK identification symbol determined during the initial authentication and stored by the wireless subscriber's PMK cache entry for the wireless AP. For example, in a wireless user and a wireless AP, the PMK cache entry is stored for a limited period of time. In order to make the transition of the wireless network infrastructure using the switch that is used as the 8 02. IX authenticator faster, the WPA/WPS IE Update calculates the PMK identification symbol 値 so that when roaming between wireless APs attached to the same switch, Reuse the PMK as determined by the switch 802·IX certification. This implementation is considered an opportunistic PMK cache. Pre-certification With pre-certification, WPA wireless users are free to perform 8 02· IX authentication with other wireless APs within their range while connected to their current wireless AP. Wireless users send pre-authenticated traffic to additional wireless APs over their existing wireless connections. After pre-authenticating with the wireless AP and storing the PMK and its associated information in the PMK cache, the wireless user connected to the wireless AP that the wireless user has pre-authenticated only needs to perform a 4-way handshake. -25- 200816753 Support for pre-certified WPA users can only be used with the public: Force in the Beacon and Probe Response frames

WiFi-蜂巢式傳訊 當在具有電話交談的802.1 1網路中之 有802.1 1連接性或不足的建築物外面時, 蜂巢式網路。 由用戶做出傳訊電話的決定。決定係ί 號強度、通道負載、與語音品質臨界。一互 將決定傳遞到在蜂巢式網路上啓動電話到月 用戶檢查進來電話的撥打者id (識別符號 撥打者id比較,若有匹配,則接受蜂巢 8 02· 1 1電話腳。在伺服器側上,伺服器 8 02 · 1 1電話腳,修補到另一說話方的8 02.1 節源 當手機用戶在802.1 1網路上是閒置的 你連接埠進入睡眠。在進入睡眠之前,手機 希望藉由在每一圖框的802.1 1標頭中設淀 入睡眠。AP接收圖框,及通知用戶的希望 式。在用戶的802.1 1迷你連接埠睡著的同 用戶緩衝封包。迷你連接埠在睡著時的功譯 你連接埠週期性醒來以接收從存取點進來纪 輸。節源用戶需要在傳輸求救時剛好醒著 其預先認證能 AP認證。 .使用者走到沒 將電話送交到 交據 802.11信 β做了決定,則 1戶之伺服器。 ),與 802.11 式電話且丟掉 丟掉到用戶的 [電話腳。 時,802.1 1 迷 ΐ告知ΑΡ手機 ί節源位元以進 (以進入節源模 時,ΑΡ開始爲 ^消耗極低。迷 J定期性求救傳 以接收求救。 -26- 200816753 TSP (時序同步化功能)確保AP和節源用戶同步化。在 基地台睡著時,T S P計時器保持運行。這些求救辨識睡著 的基地台是否具有AP已緩衝的封包且等待運送到其各自 的目的地。 當沒有進來的求救一段長時間週期時,8 0 2 · 1 1迷你連 接埠進入睡眠狀態。迷你連接埠週期性醒來,探測AP的 網路連接,若未存在,則迷你連接ί阜回到睡眠狀態。在此 例中,迷你連接埠睡得比前一例子更長的期間。 Β·以編碼/解碼器爲基的聲學回音消除 本發明的一或多個實施例係相關於消除信號的裝置。 裝置可包括辨識碼(ID碼)產生器,其被組配成產生ID 碼。裝置亦可包括ID碼注入器,其被組配成將ID碼注入 到信號和經處理信號的至少一者以產生迴旋信號。經處理 信號係由信號的處理所產生。裝置可另外包括ID碼偵測 器,其被組配成偵測迴旋信號、變換信號、和迴旋信號之 變換的至少一者,變換信號係由迴旋信號的變換所產生。 裝置可另外包括算術函數,其被組配成去除迴旋信號和變 換信號的至少一者。 圖4描畫根據本發明的一或多個實施例之以編碼/解 碼器爲基的聲學回音消除之方法。 當近端和遠端說話者二者都在說話時’難以區分遠端 說話者的語音之回音和近端說話者的語音’因爲二者都存 在於具有相同人類目吾首知*徵的近麵ί目號輸入中。在此應用 27- 200816753 程式中’提出新方法處理聲學回音,該方法與目前習知 AEC相當不同。 本發明的一實施例是在第一節點和第二節點之間通訊 期間用以消除回音之方法。方法包括將密碼注入到第一節 點的信號輸入。根據本發明的一或多個實施例,第一節黑占 是遠端使用者所使用的網路裝置,第二節點是近端使用者 所使用的網路裝置。根據本發明的一或多個實施例,第〜 節點是近端使用者所使用的網路裝置,第二節點是遠端使 用者所使用的網路裝置。 根據本發明的一或多個實施例,將密碼注入到遠端信 號輸入內。如此,在此密碼上攜帶信號或遠端信號的多重 回音並且到達近端信號輸入中。近端信號又包括近端說話 者語音。因爲只在遠端信號的回音上而非近端說話者的語 音上攜帶密碼,所以密碼可充作那些回音的本身,並且幫 助我們區分近端說話者語音。諸如關聯性或其他方式等某 些種類的匹配濾波器可被用於以密碼辨識遠端信號的回音 與近端說話者語音並且去除它們。在遠端信號輸出上將產 生最終無回音信號。 爲了進行此新的設計工作’有兩重要的實施考量。其 中一考量是如何選擇和設計密碼,而另一考量是如何將密 碼注入到遠端輸入信號內。兩種考量都有不應讓端對端收 聽者察覺到密碼的同一考慮。 當某人在麥克風前說話時’不僅此人的語音而且某程 度的背景雜訊也將進入麥克風。但是因爲說話者語音遮蓋 -28- 200816753 掉背景雜訊’所以通常此背景雜訊不干擾收聽者。只要背 景雜訊保持是低的’並且SNR (信號對雜訊比)保持在特 定臨界以上,背景雜訊不會變成會有影響的因素。事實 上,背景雜訊總是存在於實際今日語音通訊中。 依據上述事實,首先,可將密碼變換成稱作,,密碼隨 機雜訊“的虛擬隨機雜訊。接著,從遠端信號輸入去除現 存的背景雜訊’及將密碼隨機雜訊插入到遠端信號輸入。 只要新的SNR保持在特定臨界以上,則近端收聽者不會 聽出任何差異。根據本發明的一或多個實施例,圖4所示 的注入器將密碼擾頻成虛擬隨機雜訊,去除遠端信號輸入 中的現存背景雜訊,然後插入密碼隨機雜訊。 因爲只有當遠端說話者正在講話時回音會存在,所以 遠端信號偵測器將偵測到遠端信號存在並且觸發密碼產生 器。密碼導頻可包括密碼時序和相位。密碼導頻偵測器被 用於偵測攜帶在遠端信號的回音上之密碼導頻,並且因爲 可變的回音路徑,所以亦被用於調整到匹配濾波器的密碼 延遲。在密碼導頻偵測器終將需要不擾頻處理。 密碼和密碼導頻可被設計成密碼偵測器和匹配濾波器 容易辨識帶有此密碼和其導頻之遠端信號的回音,然後去 除這些回音。此外,可在匹配濾波器之後使用非線性處理 器進一步降低剩餘回音且提局AEC性能。 參考下面的圖式和討論將可更加明白本發明的特徵和 優點。 回音是通訊中的一大問題。如發明背景所討論一般’ -29- 200816753 在習知技術中,濾波器(或回音消除器)可被用 嘗試提供信號以消除回音之回音路徑。 圖8A爲包括回音消除用的濾波器814 (或 器8 1 4 )之示範性習知技術通訊裝置800 (習知 8 00 )的方塊圖。如圖8A的例子所示,習知技術 可包括信號接收器802,用以接收來自遠方(或 遠端信號(如、信號y’);和信號發送器,用以 (如、信號z )到遠方。 習知技術裝置800又包括揚聲器806,用以 到的信號給習知技術裝置800的使用者(即、本 方):和麥克風8 1 0,用以收集近端信號(如、 可包括本地方的語音和背景雜訊)。 習知技術裝置8 00又包括緩衝器8 12,用以 號接收器802所接收到的信號;和濾波器814, 化揚聲器806與麥克風810之間的回音路徑808 處理緩衝器8 1 2中所緩衝的信號。回音路徑8 0 8 遲、衰減、混響等的多重路徑,例如,將信號 yl等。 習知技術裝置800另外包括總和函數8 16, 克風8 1 0的輸出減掉濾波器8〗4的輸出。習知 800另外包括信號反饋路徑,用以將總和函數8 i 饋送回到濾波器8 1 4。 信號接收器802所接收到的信號(如、信號 寄到揚聲器8 0 6和緩衝器8 1 2。濾波器8 1 4從緩 於模型化 回音消除 技術裝置 裝置800 遠端)的 發送信號 播放接收 地或近端 信號X, 緩衝從信 用以模型 ,且用以 可表示延 y’變換成 用以從麥 技術裝置 6的輸出 y’)可轉 衝器8 1 2 -30- 200816753 接收信號,利用回音路徑8 0 8的模型處理信號以產生消除 信號(如、x2,y ’的函數),及發送消除信號到總和函數 8 1 6。接著,總和函數8 1 6從自麥克風8丨〇所接收的信號 (如、X 1 =x + y 1 )減掉從濾波器8 1 4所接收到的消除信號 (如、x2 = f ( y’))以產生減法信號(如、z )且發送減法 信號到信號發送器8 1 8。將總和函數8 1 6的輸出饋送回到 濾波器8 1 4以更新和改良濾波器8 1 4中的回音路徑模型。 進一步參考圖8B說明習知配置800中所實施的回新 消除方法。 圖8 B爲例如習知技術裝置8 0 0 (圖8 A所示)用以消 除回音的示範性習知技術方法之流程圖。如圖8 B的例子 所示,方法開始於步驟8 5 0,其中接收器802 (圖8A所 示)發送信號y’。然後,將控制移至步驟8 52及8 5 4。 在步驟852,揚聲器806 (圖8A所示)接收信號 y’。在步驟156中,麥克風810 (圖8A所示)接收信號 yl加上近端信號X。信號yl表示因爲延遲、衰減、混響 等所產生之信號y’的變形信號。延遲、衰減、混響等係由 揚聲器806和麥克風808(圖8A所示)之間的回音路徑 8 〇 8所產生。信號x包括本地方的語音加上麥克風8丨〇所 拾取的本地周遭背景雜訊。然後’將表示信號y 1和信號χ 的組合之信號X 1發送到總和函數8 1 6 (圖8 Α所示)。 在步驟8 5 4中,緩衝器8 1 2又接收信號y,。在步驟 8 5 8中,濾波器8丨4利用回音路徑8 0 8的模型處理信號y, 以產生信號x2,其爲y,的函數,如、f ( y,),然後將此 -31 - 200816753 發送到總和函數8 1 6 (圖8 A所示)。 在步驟860中,總和函數816從信號xl減掉信號x2 以產生信號z。理想上,若f ( y,)等於y1 ’則z將等於 X,其爲與已去除回音(由yl表示)的遠方有關之近端信 號。然而,濾波器814中所實施之回音路徑8 08的模型可 能不精確,典型上z不等於z。 在步驟8 6 2中,總和函數8 1 6將信號z發送到將z傳 送到遠方的信號發送器8 1 8。 在步驟8 6 4中,總和函數8 1 6饋入信號z回到濾波器 8 1 4,用以更新和改良步驟8 5 8中所利用的回音路徑模 型。信號z的反饋和相關計算與更新使得濾波器8 1 4需要 額外的處理時間或處理功率。 信號z的品質(即有關信號X的信號z之錯誤)視濾 波器8 1 4中所實施之回音路徑模型和演算法與實施濾波器 8 1 4的計算裝置之記憶體和處理功率而定。 就習知技術裝置、配置、和方法(如圖8A的習知技 術裝置8 0 0和圖8 B的方法所示者)而言,回音路徑8 0 8 的校正模型化(如、濾波器8 1 4所執行者)對有效消除回 音是重要的。然而,既定的各種周遭雜訊、周遭雜訊的混 響、及/或其他因素,回音路徑8 0 8是動態的,因此難以 準確地模型化。結果,習知技術裝置、配置、及方法無法 有效消除回音。 習知技術裝置、配置、方法另外面臨本地方(或近 端)和遠方(或遠端)同時說話之雙邊通話情況。因爲本 -32- 200816753 地方的語音和遠方的語音具有類似的人聲特性,濾波器 814無法準確地辨識哪一個信號欲輸入到回音路徑8 08的 模型。結果,本地方的語音部分可能被消除,及回音部分 不被消除,及濾波器8 1 4中的回音路徑模型之錯誤可能變 成發散以取代收斂,導致不理想的通訊品質。 因此,在習知技術中,已投入許多資源以改良模型化 回音路徑808的演算法。另外,濾波器114需要大量資料 記憶體和需要具有高處理功率的CPUs。結果,產生實施 回音消除的高成本。 對照之下,即使未設置濾波器,本發明的一或多個實 施例仍包含用以消除信號的設備。在一或多個實施例中, 信號表示數位信號。設備包括辨識碼(ID碼)產生器, 其被組配成產生ID碼。設備又包括ID碼注入器,其被組 配成將ID碼注入到信號和經處理信號的至少一者以產生 迴旋信號。經處理信號係由信號的處理所產生,諸如背景 雜訊的去除等。設備另外包括ID碼偵測器,其被組配成 偵測迴旋信號、變換信號、及迴旋信號之變換的至少一 者,其中變換信號係由迴旋信號的變換所產生。可因設備 的組態及/或環境產生迴旋信號的變換。例如,迴旋信號 的變換表示設備的揚聲器和麥克風之間的一或多個回音路 徑所產生的延遲;變換信號表示延遲存在的延遲信號。設 備另外包括算術函數,其被組配成去除迴旋信號和變換信 號的至少一者。 圖9A爲根據本發明的一或多個實施例之即使未設置 -33- 200816753 濾波器仍可消除回音之通訊裝置900 (裝置900 )的方塊 圖。方塊圖又表示具有實施在一或多個裝置中之圖9A所 示之組件的通訊系統或配置。 裝置900包括輸入/輸出組件,諸如信號接收器904 用以接收來自遠方的遠端信號)、信號發送器93 2 (用以 發送信號到遠方)、揚聲器914、及麥克風916(本地麥 克風9 1 6 )等。存在從揚聲器9 1 4行進到麥克風9 1 6的回 音路徑9 0 8。 裝置900亦可包括信號處理模組,諸如背景雜訊去除 器906等。背景雜訊去除器906可被組配成從接收自信號 接收器904的信號去除背景雜訊。可利用諸如去除背景雜 訊用的光譜減法等一或多個眾所皆知的演算法實施背景雜 訊去除器9 0 6。 裝置900亦可包括用以消除回音之模組。模組可包括 辨識碼產生器922 ( ID碼產生器922 )、辨識碼注入器 910 ( ID碼注入器910 )、辨識碼偵測器924 ( ID碼偵測 器924 )、及緩衝器926。模組亦可包括變換模組,諸如 延遲器92 8等,例如用以變換信號、引入延遲。模組亦可 包括算術函數,諸如例如總和函數93 0等。 ID碼產生器922可被組配成產生可控制且可去除的 ID碼,使得能夠辨識一部分信號。然後例如爲了回音消 除目的則將該部分信號去除。ID碼可表示可模擬背景雜 訊或緩和雜訊之虛擬隨機碼。ID碼產生器922可包括線 性反饋移位暫存器,用以產生欲使用的虛擬隨機雜訊序列 -34- 200816753 當作ID碼。 另外’ ID碼可包括人類耳朵無法察覺到的高頻或低 頻信號。在一或多個實施例中,麥克風9 i 6的抽樣率可被 組配成例如經由組配麥克風916的硬體及/或軟體(或驅 動器)來處理高頻或低頻信號。在一或多個實施例中,憑 藉表示人類耳朵無法察覺到的信號之ID碼,裝置900可 不包括背景雜訊去除器906。 ID碼注入器910可被組配成將ID碼產生器922所產 生的ID碼注入到信號中。可藉由諸如將id碼插入到信號 內的數位相關法,例如藉由將ID碼與信號迴旋以產生迴 旋信號等藉由一些眾所皆知的演算法實施ID碼注入器 910 〇 ID碼偵測器924可被組配成偵測迴旋信號內的iD 碼,例如在包含一或多個其他信號的混合、疊置、及/或 另外迴旋信號中。另外,ID碼偵測器924可被組配成偵 測由迴旋信號的變換所產生之經變換信號及/或ID碼;例 如裝置900的組態及/或環境可產生變換。另外,ID碼偵 測器924可被組配成偵測變換。變換可包括延遲及信號位 準衰減。ID碼偵測器924可實施一或多個眾所皆知的演 算法,諸如數位相關法或偵測ID用的匹配濾波器等。 延遲器92 8可被組配成將延遲引入到信號中。延遲器 可被用於模擬變換。可藉由引入延遲用的簡易延遲線移位 暫存器實施延遲器928。 各個雜訊去除器906、ID碼產生器922、ID碼注入器 - 35- 200816753 910、ID碼偵測器924、及延遲器928都包括在可下載到 諸如電話、行動電話、電訊會議裝置等使用者裝置(如、 用於聲學回音消除)、及/或伺服器裝置(如、用於線路 或網路回音消除)的軟體中。 圖9B爲根據本發明的一或多個實施例之用於裝置 900(圖9A所示)的ID碼產生器922之方塊圖。ID碼產 生器922可只包括在將直接產生隨機碼之碼產生器921 中。在此例中,諸如藉由憑藉小心選擇適當反饋函數之線 性反饋移位暫存器等一些眾所皆知的演算法實施碼產生器 921 ° 然而,ID碼產生器922可包括伴隨隨機函數發生器 923的碼產生器921。在此例中,首先,碼產生器921可 產生適當辨識碼而不用擔心隨機化發生。然後,將此辨識 碼饋入隨機函數發生器923中,以變成當作922的輸出之 虛擬隨機雜訊序列。可憑藉碼產生器92 1所控制的反饋函 數之經修正線性反饋移位暫存器實施隨機函數產生器 923 〇 圖9C爲根據本發明的一或多個實施例之用以消除例 如裝置900 (圖9A所示)中的回音之方法的流程圖。方 法開始於步驟9 52,在該步驟中,信號接收器904 (圖9A 所示)可從遠方接收信號y’(n)。 在步驟954中,雜訊去除器906可從y’(n)去除背景 雜訊,產生信號y(n)。爲了爲包括隨機雜訊的ID碼留空 間,可去除背景雜訊。因此,本地方不接收過度的雜訊。 -36- 200816753 在步驟95 8中,ID碼產生器922 (圖9A所示)可產 生ID碼c(n)。a碼c(n)可表示已知和可控制的函數。在 步驟956中,π碼注入器910 (圖9A所示)可將ID碼 ^"^主入到信號y(n)中。結果可產生c(n)及y(n)的迴旋。 修J如 C(n)及y(n)的迴旋可以是迴旋信號c(n)*y(n)。然 後’將控制移轉到步驟9 6 2及步驟9 8 0。 在步驟962中’揚聲器914(圖9A所示)可接收迴 旋信號c(n)*y(n)。在步驟964中,麥克風916(圖9A所 示)可從揚聲器914接收延遲信號,即信號c(n-d)*y(n-d)。麥克風916亦可拾取另一輸入信號x(n),其包括本地 方的語音(如、在雙邊通話方案中)及/或環繞在麥克風 9 1 6四周的背景雜訊。然後,麥克風9 1 6可將組合信號 x(n) + c(n-d)*y(n_d)輸出到ID碼偵測器 924 (圖 9A所 示)和總和函數9 3 0 (如圖9 A所示)。 在步驟980中,緩衝器926 (圖9A所示)可緩衝迴 旋信號c(n)*y(n)的複本並且將迴旋信號的複本輸出到延遲 器 928。 在步驟9 6 6中,ID碼偵測器9 2 4 (圖9 A所示)可偵 測到組合信號^11) + (:(11-(1)*7(114)中的11)碼以11-幻’並且 假設c(n)是已知且可控制的函數’則可藉由比較從ID碼 產生器9 2 2所接收到的c (η)與c (η - d)以決定延遲量d。可 將延遲量d饋入到延遲器928 (圖9A所示)。 在步驟982中’延遲器928 (圖9A所示)可從步驟 980將延遲纛d引入緩衝器926的輸出(即c(n)*y(n)的複 -37- 200816753 本),產生c(n-d)*y(n-d)的複本。 在步驟9 9 0中,總和函數9 3 0 (圖9 A所示)可從步 驟964的輸出(即、信號+ 減掉步驟 982的輸出(即、信號產生c(n_d)*y(n_d)的複本)。換言 之’在步驟990中,總和函數93 0計算信號x(n) + c(n-d)*y(n_d)-C(n-d)*y(n-d)以獲得信號x(n),其表示未存在信 號y’(n)的回音(以信號y(n_d)表示)之接收器麥克風916 (圖9A所示)所拾取的輸入信號。信號x(n)可包括諸如 在雙邊通話方案中等本地方的語音,及/或在麥克風916 四周的背景雜訊。 在步驟992中,包括諸如在雙邊通話方案中等本地方 的語音及/或在麥克風916四周的背景雜訊及未包含回音 之信號x(n)可被發送到信號發送器93 2。如此,可有效消 除單邊通話和雙邊通話方案中的回音。 從上述可明白,本發明的實施例可有效消除回音,卻 不需要習知技術裝置、配置、或方法中需要的濾波器(或 回音消除器)。在免除濾波器依賴的回音路徑模型化中之 可能錯誤下,本發明的實施例可提供更準確的回音消除和 更快速的消除,因此,獲得更好的服務品質。另外,本發 明的實施例可有效地消除習知濾波器通常執行不良之雙邊 通話方案中的回音。 在實際上不依賴濾波器和沒有回音路徑模型化的相關 複雜性之下,本發明的實施例亦可有利地免掉濾波器所需 之高CPU處理功率和大資料記憶體的需要,藉以減少實 -38- 200816753 施回音消除的成本。 C·透過IP通訊的影音之以內容爲基的跳動緩衝計畫 在不依賴濾波器和相關的回音路徑模型化複雜性之 下,本發明的實施例亦有利地去除濾波器所需之高c p u 處理功率和大資料記憶體的需要,藉以降低實施回音消除 的成本。 C.透過IP的語音/視頻通訊之以內容爲基的跳動緩衝設計 本發明的一或多個實施例提供一機構以使用聲頻的 VAD和跳動補償來處理過多WLAN跳動。本發明的一或 多個實施例亦爲沒有移動或無移動與封包跳動一起使用之 視頻運作。 本發明的一或多個實施例係相關於封包通訊裝置。封 包通訊裝置可包括偵測器,其被組配成偵測封包通訊裝置 所接收到之進來封包中的特徵化內容。封包通訊裝置可另 外包括實施控制器,其被組配成若偵測器已偵測到進來封 包中的特徵化內容,則執行進來封包的調整以產生經調整 封包和輸出經調整封包。 提出被稱作以內容爲基的跳動緩衝之新跳動緩衝設計 以解決目前的跳動緩衝技術限制。根據本發明的一或多個 實施例,不僅注意到進來封包的RTP標頭資訊,而且也注 意到它們的RTP酬載內容,藉以辨識進來封包上的無聲和 說話乍現。然後依據此無聲和說話乍現線索以決定何時能 -39- 200816753 夠插入實施延遲以補償網路封包跳動。利用此新的設計, 接收器側上的跳動緩衝將不再依賴發送器的無聲抑制。 圖5 A-B爲跳動緩衝架構的高位階槪要圖。將經由語 音品質引擎(VQE )中的函數方塊追蹤封包的路徑。此處 的目的係引進適應性去跳動控制器以使實施相等。可利用 類似的設計處理視頻跳動。 在習知技術跳動緩衝設計之一中,髓爲接收測VAD (語音活動偵測)被用於防止跳動緩衝器溢位。 換言之,當無聲或說話乍現線索到達最大長度時,無 聲或說話乍現線索被用於嵌平跳動緩衝。新規劃與習知技 術設計的不同處包括無聲或說話乍現現所被用於控制何時 可插入實施延遲以補償網路封包跳動。因此,根據本發明 的一或多個實施例,無聲或說話乍現偵測將變成跳動緩衝 設計的重要部分。在某些情況下,當跳動緩衝變成溢位 時,進行任何調整都太遲。 此處是如何將此以內容爲基的跳動緩衝設備和方法應 用到工作中的應用程式。將語音和視頻例子都說明如下。 圖5 A爲根據本發明的一或多個實施例之語音跳動緩 衝器的方塊圖。核心跳動緩衝器包括用於封包f宁列、封包 實施、跳動計算、及跳動補償的一或多個組件。在此處, 解碼器和VAD將產生無聲和說話乍現指標。然後將無聲 或說話乍現指標饋回到跳動補償部分,且被用於決定何時 插入實施無聲以補償網路封包跳動。 圖5 B爲根據本發明的一或多個實施例之視頻跳動緩 -40- 200816753 衝器的方塊圖。除了當視頻圖框上沒有移動或移動極低時 將插入實施延遲之外,核心跳動緩衝器類似於語音的核心 跳動緩衝器。在此處,於解碼器之後,移動估算和移動補 償將產生剩餘圖框。可從此剩餘圖框加上一些特定臨界形 成無移動指標。然後將無移動指標饋回到跳動補償部分, 且用於偵測何時插入實施無聲以補償網路封包跳動。在視 頻中,插入實施無聲實際上係在重複先前視頻圖框的同 時,停止實施新的圖框。 如上述,諸如封包延遲(即、封包晚到)、封包延遲 變化、及封包損失等問題對封包通訊中的服務品質 (Q〇s )具有負面影響。封包延遲和封包延遲變化亦可視 作跳動。爲了解決這些問題,在習知技術中,藉由當實施 來自封包緩衝器的封包時週期性插入延遲(即、無聲封包 或舒適雜訊封包的形式)以將固定式去跳動緩衝設計用於 補償封包的晚到。然而,利用固定式去跳動設計,在語音 封包之間會過度插入延遲,產生突變語音。 在習知技術中,發送器側語音活動偵測器(VAD )亦 可被用於適應性插入延遲,藉以補償封包延遲和封包延遲 變化。然而,一些使用者裝置不支援發送器側VAD。另 外,例如,當傳輸方正執行音樂播放時,因爲音樂中斷被 視作無聲和不適當處理,所以如果是現存的 VAD演算 法,則發送器側VAD會產生不想要的雜訊或突變語音。 就另一例子而言,當傳輸方與打開的發送器側VAD —起 使用G.729AB編碼/解碼器以播放一些音樂時,接收器側 -41 - 200816753 中的使用者會察覺到變形失真的音樂。因此,封包通訊服 務供應商通常會關掉發送器側VAD,而無法補償封包延遲 和封包延遲變化。結果,仍舊會利用固定式去跳動緩衝設 計,服務品質仍然不是接收方想要的。 另外,在習知技術中,接收器側無聲偵測器可被用於 控制封包緩衝器溢位,以防止封包損失。然而’根據習知 技術中的組配,會丟棄語音封包,因此當封包緩衝器幾乎 是滿的或是滿的時會損失,此種服務品質並非接收方想要 的。 相反地,本發明的實施例可利用接收器側無聲偵測器 適時補償延遲和延遲變化,且適應性實施來自封包緩衝器 的封包。有利的是,不需要發送器側VAD,可提供想要的 服務品質。另外,本發明的一或多個實施例可利用接收器 側視頻偵測器,藉以適應性處理視頻通訊中的跳動。 在一或多個實施例中,本發明係相關於封包通訊裝 置,該裝置可包括偵測器,其被組配成偵測封包通訊裝置 所接收的進來封包中之特徵化內容。特徵化內容可表示語 音通訊中的無聲(如、未具有所接收到的語音封包之時間 週期)。另一選擇是,特徵化內容可表示低於臨界之移動 或無移動的至少一者。例如,可將無移動或靜止圖像的臨 界選擇成視頻通訊中的全部活動圖像之10%到15% (就資 料體積而言)。 封包通訊裝置可另外包括實施控制器,其被組配成若 偵測器已偵測到進來封包中的特徵化內容時,則執行進來 -42- 200816753 封包的調整,以產生經調整封包和輸出經調整封包。 包括例如無聲封包或舒適雜訊封包的形式之延遲的插 另一選擇是,調整可包括重複實施先前已實施之封包 果,可適時補償封包緩衝器中所接收到的進來封包之 和延遲變化,及經調整封包是接受方可接受的品質。 參考下面的圖式和討論可更加明白本發明的特徵 點。 圖1 〇 A爲具有適應性跳動緩衝設計的第一示範習 術封包語苜通訊配置(第一習知技術配置)之方塊圖 圖1 0 A的例子所示一般,第一習知技術配置包括經由 1 003連接的發送器側裝置1091和接收器側裝置1092 個發送器側裝置1091和接收器側裝置1 092可表示電 行動電話、或電訊會議裝置。 發送器側裝置1 〇 9 1可包括下面組件:速度緩 1 000、語音活動偵測器 1001 ( VAD 1001 )、及發 1 002。將這些組件說明如下: 速度緩衝器1 〇〇〇可被組配成從麥克風接收語音 (封包)、緩衝封包、然後傳輸經緩衝封包到 1001。 可VAD 1001可被組配成當從速度緩衝器1 000所 的封包中具有無聲(即、語音封包之間的時間週期) 入無聲描述符(SID )。 發送器1 002可被組配成從VAD 1 000接收封包且 封包到網路1 〇 〇 3。 調整 入。 。結 延遲 和優 知技 。如 網路 。各 話、 衝器 送器 封包 VAD 接收 時插 傳輸 -43- 200816753 接著,網路1003可將封包傳輸到接收器側裝置 1 092 ° 接收器側裝置1 092可包括下面組件:封包緩衝器 1004、封包實施控制器1〇〇5、延遲插入控制器1006、延 遲資訊模組1 007、跳動計算機1 008、及實施延遲計算機 1〇09。將這些組件說明如下: 封包緩衝器1004可被組配成從網路1 003接收封包、 緩衝封包、然後發送封包到跳動計算機1 008、延遲插入控 制器1 006、及封包實施控制器1 005。 跳動計算機1 〇〇8可被組配成計算封包中的跳動尺 寸。跳動可表示無聲,即沒有資料的兩語音封包到達之間 的時間週期。 延遲插入控制器1 006可被組配成依據發送器側裝置 109 1的VAD 1001插入在封包中的SID以決定何時插入延 遲。延遲插入控制器1 006可接收來自跳動計算機1 008的 跳動尺寸資訊,且可接收來自封包緩衝器1 〇〇4的封包。 實施延遲計算機1 009可被組配成接收來自跳動計算 機1 008的跳動尺寸資訊。依據跳動尺寸資訊,實施延遲 計算機1 009可計算欲插入到封包的延遲尺寸。 延遲資訊模組1 007可被組配成統合來自延遲插入控 制器1006的有關插入延遲的時序之資訊和來自實施延遲 計算機1 009的有關延遲的尺寸之資訊。因此,延遲資訊 模組1 007可建立經統合資訊到資料結構內和發送資料結 構到封包實施控制器1 0 0 5 ◦ -44- 200816753 封包實施控制器1 005可被組配成根據從延遲資訊模 組1 007所接收的資料結構接收來自封包緩衝器1〇〇4的封 包及插入延遲到封包。 圖10B爲圖10A的例子中所示之第一習知技術配置中 所利用的習知技術跳動緩衝設計之發送器側處理的流程 圖。發送器側處理開始於步驟1 060,在該步驟中,速度緩 衝器1 000 (圖10A所示)可接收例如來自傳輸方所使用 的麥克風之封包。然後,速度緩衝器1 000可緩衝封包。 在步驟1 0 6 2中,速度緩衝器1 〇 〇 〇可將以預設將各個 封包的標示符號位元設定爲〇。當各個封包到達最後步驟 1 0 7 2時’若封包是說g舌乍現的第一^語音封包,則將封包的 標示符號位元設定成1。否則,可將標示符號位元保持爲 〇 〇 在步驟1064中,VAD 1001可決定封包是否包含一或 多個無聲週期(即、在封包之間沒有資料的一或多個週 期)。若封包包含一或多個無聲週期,則控制移轉到步驟 1 074 ;若未包含,則控制移轉到步驟1 066。 在步驟1〇74中,VAD 1〇〇1可決定是否已在封包中設 定S ID。S ID (無聲描述符)被組配成標示無聲週期的開 始。若已爲封包中的無聲週期設定S ID,則控制直接移轉 回到1 072 ;若尙未設定,則在開始移轉到步驟1 072前將 控制移轉到步驟1 0 7 6。在步驟1 0 7 6中,V A D 1 0 0 1可爲封 包產生SID。在步驟1072中,發送器10〇2(圖i〇A所 示)可傳輸封包到網路1 003。 -45- 200816753 在步驟1066中,VAD 1001可決定在無聲週期之後封 包是否包含第一語音封包。若封包包含第一語音封包,則 控制移轉到1 068,在該步驟中VAD 1001可將第一語音封 包的標不符號位元設定成1。若封包未包含第一語苜封 包,則控制移轉到步驟1 072,在該步驟中,發送器1〇〇2 可傳輸封包到1 0 0 3。 圖1 0C爲習知技術延遲計算處理的流程圖。延遲計算 處理可以是用於圖1 0 A所示之第一習知技術配置的接收器 側裝置1 092中之接收器側處理的一部分。延遲計算處理 可被執行包含圖10A的例子所示之接收器側裝置1 092的 封包緩衝器1 004,延遲插入控制器1 006跳動計算機 1〇〇8、實施延遲計算機1 009、及延遲資訊模組1 007。 延遲計算處理可開始於步驟1 022,在該步驟中,封包 緩衝器1 004可接收來自網路1 003的封包並且緩衝封包。 例如,封包可表示步驟 1 072 (圖10B所示)中發送器 1 0 02 (圖10A所示)所傳輸的封包。 在步驟1 024中,跳動計算機1 008可計算平均跳動 j ° 在步驟1 026中,跳動計算機1 008可計算跳動偏差 v ° 在步驟1 028中,實施延遲計算機1 009可使用j及v 及依據以f(j,v)所表示的網路模型以計算實施延遲(即、 延遲 d = f(j, v))。 在步驟1030中,延遲插入控制器1006可決定封包緩 -46- 200816753WiFi-Hive Communication A cellular network when there is an 802.1 1 connectivity or insufficient building in an 802.1 1 network with telephone conversations. The decision of the user to make a communication call. Decide on the strength of the ί, channel load, and speech quality criticality. One mutual decision is passed to the caller id that initiates the call on the cellular network to the monthly user check incoming call (identification symbol caller id comparison, if there is a match, accept the hive 8 02 · 1 1 phone call. On the server side On, the server 8 02 · 1 1 phone foot, patched to the other speaker's 8 02.1 source when the mobile phone user is idle on the 802.1 1 network, your connection 埠 goes to sleep. Before going to sleep, the phone hopes to In each frame, the 802.1 1 header is set to sleep. The AP receives the frame and informs the user of the desired expression. The user's 802.1 1 mini connection is asleep with the user buffering the packet. The mini connection is sleeping while sleeping. The interpreter of your connection 埠 periodically wakes up to receive the entry from the access point. The source user needs to wake up to the pre-authentication AP authentication when transmitting the call for help. The user did not send the call to the customer. According to the 802.11 letter β made a decision, then the server of one household.), and the 802.11 type telephone and lost the [phone foot lost to the user. At the time, 802.1 1 confused to inform the mobile phone ί section source bit to enter (to enter the mode source mode, ΑΡ start for ^ consumption is extremely low. Fan J regular help to pass for help. -26- 200816753 TSP (timing synchronization The function ensures that the AP and the source user are synchronized. When the base station is asleep, the TSP timer keeps running. These calls identify whether the sleeping base station has the AP buffered packets and waits for delivery to their respective destinations. When there is no incoming call for a long period of time, the 8 0 2 · 1 1 mini-connector goes to sleep. The mini-connector wakes up periodically and detects the AP's network connection. If it does not exist, the mini-connection is back. Sleep state. In this example, the mini-link sleeps longer than the previous example. Β·According/Decoder-Based Acoustic Echo Cancellation One or more embodiments of the present invention are related to signal cancellation. The apparatus may include an identification code (ID code) generator that is configured to generate an ID code. The apparatus may also include an ID code injector configured to inject the ID code into at least one of the signal and the processed signal. With Generating a gyro signal. The processed signal is generated by processing of the signal. The apparatus may additionally include an ID code detector configured to detect at least one of a transition of the gyro signal, the transformed signal, and the gyro signal, and transform the signal The apparatus is generated by a transformation of the gyro signal. The apparatus can additionally include an arithmetic function that is configured to remove at least one of the gyro signal and the transformed signal. Figure 4 depicts encoding/decoding in accordance with one or more embodiments of the present invention. Device-based method for acoustic echo cancellation. When both the near-end and far-end talkers are speaking, it is difficult to distinguish between the echo of the far-end speaker's voice and the voice of the near-end speaker' because both exist in In the same application, the application of the 27-200816753 program proposes a new method for processing acoustic echo, which is quite different from the conventional AEC. An embodiment of the present invention is A method for canceling echo during communication between a first node and a second node. The method includes injecting a password into a signal input of a first node. One or more according to the present invention In an embodiment, the first node is the network device used by the remote user, and the second node is the network device used by the near-end user. According to one or more embodiments of the present invention, the node is The network device used by the near end user, the second node is the network device used by the remote user. According to one or more embodiments of the invention, the password is injected into the far end signal input. This password carries multiple echoes of the signal or far-end signal and arrives at the near-end signal input. The near-end signal in turn includes the near-end speaker voice. Because it is carried only on the echo of the far-end signal rather than the voice of the near-end speaker. Passwords, so passwords can be used as echoes themselves, and help us distinguish between near-end speaker speech. Certain types of matched filters, such as correlation or other means, can be used to identify the echo and near-end of the far-end signal with a password. Speakers speak and remove them. A final echo-free signal will be generated at the far-end signal output. There are two important implementation considerations for this new design effort. One of the considerations is how to choose and design a password, and another consideration is how to inject the password into the far-end input signal. Both considerations have the same consideration that the end-to-end listener should not be aware of the password. When someone speaks in front of the microphone, not only the voice of the person but also a certain amount of background noise will enter the microphone. However, because the speaker's voice covers -28-200816753 and the background noise is off, usually this background noise does not interfere with the listener. As long as the background noise remains low and the SNR (signal-to-noise ratio) remains above a certain critical level, background noise does not become an influential factor. In fact, background noise is always present in actual today's voice communications. Based on the above facts, first, the password can be converted into a virtual random noise called "cryptographic random noise. Then, the existing background noise is removed from the remote signal input" and the random noise of the password is inserted into the far end. Signal input. The near-end listener does not hear any difference as long as the new SNR remains above a certain threshold. According to one or more embodiments of the invention, the injector shown in Figure 4 scrambles the password into a virtual random Noise, remove the existing background noise in the far-end signal input, and then insert the password random noise. Because the echo will exist only when the far-end speaker is speaking, the far-end signal detector will detect the far-end signal. The cryptographic generator is present and triggered. The cryptographic pilot can include the cipher timing and phase. The crypto pilot detector is used to detect the cryptographic pilot carried on the echo of the far-end signal, and because of the variable echo path, It is also used to adjust the cipher delay to the matched filter. The cipher pilot detector will eventually need to be scrambled. The cipher and cipher pilot can be designed as a cipher detector and The matched filter easily recognizes the echo of the far-end signal with this cipher and its pilot, and then removes these echoes. In addition, the nonlinear processor can be used to further reduce the residual echo and improve AEC performance after the matched filter. The features and advantages of the present invention will become more apparent from the drawings and discussion. Echo is a major problem in communication. As discussed in the background of the invention, generally -29-200816753 In the prior art, a filter (or echo canceller) An attempt can be made to provide a signal to cancel the echo path of the echo. Figure 8A is a block diagram of an exemplary conventional communication device 800 (conventional 800) including a filter 814 (or 8 1 4) for echo cancellation. As shown in the example of FIG. 8A, conventional techniques may include a signal receiver 802 for receiving signals from a remote (or far-end signal (eg, signal y'); and a signal transmitter for (eg, signal z) to The prior art device 800 further includes a speaker 806 for the signal to the user of the prior art device 800 (ie, the party): and the microphone 810 for collecting the near-end signal (eg, Including local voice and background noise.) The prior art device 800 further includes a buffer 8 12 for receiving the signal received by the receiver 802; and a filter 814 between the speaker 806 and the microphone 810. The echo path 808 processes the signal buffered in the buffer 8 1 2. The echo path 8 0 8 multiple paths of delay, decay, reverberation, etc., for example, the signal yl, etc. The prior art device 800 additionally includes a sum function 8 16, The output of the wind 8 1 0 subtracts the output of the filter 8 4. The conventional 800 additionally includes a signal feedback path for feeding the sum function 8 i back to the filter 8 1 4. The signal receiver 802 receives The signal (eg, the signal is sent to the speaker 8 06 and the buffer 8 1 2). The filter 8 1 4 plays the received or near-end signal X from the transmitted signal of the modeled echo cancellation technology device device 800, buffers the credit from the model, and is used to represent the delay y' The output y') of the wheat technology device 6 can receive signals, and the signal is processed by the model of the echo path 800 to generate a cancellation signal (such as a function of x2, y '), and transmitted. Eliminate the signal to the sum function 8 1 6 . Next, the sum function 8 16 subtracts the cancellation signal received from the filter 8 1 4 from the signal received from the microphone 8 (eg, X 1 =x + y 1 ) (eg, x2 = f (y) ')) to generate a subtraction signal (eg, z) and send a subtraction signal to the signal transmitter 8 1 8 . The output of the sum function 8 1 6 is fed back to the filter 8 1 4 to update and improve the echo path model in the filter 8 1 4 . The retro-removal method implemented in the conventional configuration 800 is further described with reference to FIG. 8B. Figure 8B is a flow diagram of an exemplary prior art method for removing echo, such as the prior art device 800 (shown in Figure 8A). As shown in the example of Figure 8B, the method begins in step 850 with the receiver 802 (shown in Figure 8A) transmitting a signal y'. Then, control is moved to steps 8 52 and 8 5 4 . At step 852, speaker 806 (shown in Figure 8A) receives signal y'. In step 156, microphone 810 (shown in Figure 8A) receives signal yl plus the near-end signal X. The signal yl represents a deformation signal of the signal y' generated due to delay, attenuation, reverberation or the like. Delay, attenuation, reverberation, etc. are produced by the echo path 8 〇 8 between the speaker 806 and the microphone 808 (shown in Figure 8A). The signal x includes the local voice plus the local ambient background noise picked up by the microphone 8丨〇. Then, a signal X 1 representing a combination of the signal y 1 and the signal 发送 is sent to the sum function 8 1 6 (shown in FIG. 8A). In step 854, the buffer 8 1 2 in turn receives the signal y. In step 8 5 8 , the filter 8丨4 processes the signal y using the model of the echo path 8000 to generate a signal x2, which is a function of y, such as f(y,), and then this -31 - 200816753 is sent to the sum function 8 1 6 (shown in Figure 8A). In step 860, sum function 816 subtracts signal x2 from signal x1 to produce signal z. Ideally, if f(y,) is equal to y1' then z will be equal to X, which is the near-end signal associated with the far-out of the echo (represented by yl). However, the model of the echo path 808 implemented in filter 814 may be inaccurate, typically z is not equal to z. In step 826, the sum function 8 16 sends the signal z to the signal transmitter 8 1 8 that passes z to the far side. In step 864, the sum function 8 16 feeds the signal z back to the filter 8 1 4 to update and improve the echo path model utilized in step 851. The feedback of the signal z and the associated calculations and updates cause the filter 8 1 4 to require additional processing time or processing power. The quality of the signal z (i.e., the error of the signal z associated with the signal X) depends on the echo path model and algorithm implemented in the filter 814 and the memory and processing power of the computing device implementing the filter 814. With respect to prior art devices, configurations, and methods (as shown by the prior art device 800 and the method of FIG. 8B of FIG. 8A), the correction model of the echo path 80 8 (eg, filter 8) 1 4 performers) is important to effectively eliminate echo. However, the echo path 808 is dynamic, so it is difficult to accurately model the various surrounding noises, the reverberation of the surrounding noise, and/or other factors. As a result, conventional techniques, configurations, and methods do not effectively eliminate echo. The prior art devices, configurations, and methods additionally face bilateral calls where the local (or near) and remote (or remote) speak simultaneously. Since the local-32-200816753 local speech and the distant speech have similar vocal characteristics, the filter 814 cannot accurately identify which signal is to be input to the echo path 808 model. As a result, the local speech portion may be eliminated, and the echo portion is not eliminated, and the error of the echo path model in the filter 8.1 may become divergent instead of convergence, resulting in undesirable communication quality. Therefore, in the prior art, many resources have been invested to improve the algorithm of the modeled echo path 808. In addition, the filter 114 requires a large amount of data memory and CPUs that require high processing power. As a result, a high cost of implementing echo cancellation is generated. In contrast, one or more embodiments of the present invention include a device for canceling signals even if no filters are provided. In one or more embodiments, the signal represents a digital signal. The device includes an identification code (ID code) generator that is configured to generate an ID code. The device in turn includes an ID code injector that is configured to inject an ID code into at least one of the signal and the processed signal to produce a whirling signal. The processed signal is generated by the processing of the signal, such as the removal of background noise. The apparatus additionally includes an ID code detector configured to detect at least one of a transition of the whirling signal, the transformed signal, and the whirling signal, wherein the transformed signal is produced by a transformation of the whirling signal. The transformation of the whirling signal can be caused by the configuration of the device and/or the environment. For example, the transition of the whirling signal represents the delay produced by one or more echo paths between the speaker and the microphone of the device; the transformed signal represents the delayed signal that is delayed. The apparatus additionally includes an arithmetic function that is configured to remove at least one of the whirling signal and the transformed signal. Figure 9A is a block diagram of a communication device 900 (device 900) that cancels echo even if the -33-200816753 filter is not provided, in accordance with one or more embodiments of the present invention. The block diagram again shows a communication system or configuration having the components shown in Figure 9A implemented in one or more devices. Apparatus 900 includes input/output components, such as signal receiver 904 for receiving remote signals from a remote location, signal transmitter 93 2 (to transmit signals to a remote location), speaker 914, and microphone 916 (local microphone 9 1 6 )Wait. There is an echo path 9 0 8 that travels from the speaker 9 1 4 to the microphone 9 16 . Device 900 can also include signal processing modules, such as background noise remover 906 and the like. The background noise remover 906 can be configured to remove background noise from signals received from the signal receiver 904. The background noise remover 906 can be implemented using one or more well-known algorithms such as spectral subtraction for background noise removal. Device 900 can also include a module for canceling echo. The module can include an identification code generator 922 (ID code generator 922), an identification code injector 910 (ID code injector 910), an identification code detector 924 (ID code detector 924), and a buffer 926. The module may also include a transform module, such as a delay 92 8 or the like, for example to transform signals, introduce delays. The module may also include arithmetic functions such as, for example, a sum function 93 0 and the like. The ID code generator 922 can be configured to generate a controllable and removable ID code such that a portion of the signal can be identified. The partial signal is then removed, for example for echo cancellation purposes. The ID code can represent a virtual random code that can simulate background noise or mitigate noise. The ID code generator 922 can include a linear feedback shift register for generating the virtual random noise sequence to be used -34-200816753 as the ID code. In addition, the ID code can include high frequency or low frequency signals that are not detectable by human ears. In one or more embodiments, the sampling rate of the microphone 9 i 6 can be grouped to process high frequency or low frequency signals, for example, via hardware and/or software (or drivers) that assemble the microphone 916. In one or more embodiments, device 900 may not include background noise remover 906 by virtue of an ID code indicating a signal that is not detectable by the human ear. The ID code injector 910 can be configured to inject the ID code generated by the ID code generator 922 into the signal. The ID code injector 910 〇 ID code detection can be implemented by a well-known algorithm such as by inserting an id code into a signal by a digital correlation method, for example, by rotating an ID code and a signal to generate a whirling signal. The detector 924 can be configured to detect an iD code within the whirling signal, such as in a mix, overlay, and/or another whirling signal that includes one or more other signals. Additionally, ID code detector 924 can be configured to detect transformed signals and/or ID codes generated by the transformation of the whirling signals; for example, the configuration and/or environment of device 900 can produce transforms. Additionally, ID code detector 924 can be configured to detect transforms. The transform can include delay and signal level attenuation. ID code detector 924 can implement one or more well-known algorithms, such as digital correlation or matched filters for detecting IDs. Delayer 92 8 can be configured to introduce delay into the signal. A delay can be used to simulate the transformation. The delay 928 can be implemented by introducing a simple delay line shift register for delay. Each of the noise remover 906, the ID code generator 922, the ID code injector - 35-200816753 910, the ID code detector 924, and the delay 928 are all included in downloadable to, for example, a telephone, a mobile phone, a teleconferencing device, and the like. Software in user devices (eg, for acoustic echo cancellation), and/or server devices (eg, for line or network echo cancellation). Figure 9B is a block diagram of an ID code generator 922 for apparatus 900 (shown in Figure 9A) in accordance with one or more embodiments of the present invention. The ID code generator 922 may be included only in the code generator 921 which will directly generate a random code. In this example, the code generator 921 is implemented, such as by a well-known algorithm such as a linear feedback shift register that carefully selects an appropriate feedback function. However, the ID code generator 922 can include a companion random function. The code generator 921 of the device 923. In this example, first, the code generator 921 can generate an appropriate identification code without fear of randomization occurring. This identification code is then fed into the random function generator 923 to become a virtual random noise sequence that is the output of 922. The modified linear feedback shift register can be implemented by means of a feedback function controlled by the code generator 92 1 to implement a random function generator 923. FIG. 9C is used to eliminate, for example, the device 900 in accordance with one or more embodiments of the present invention. A flow chart of the method of echoing in Figure 9A). The method begins in step 9 52, in which signal receiver 904 (shown in Figure 9A) can receive signal y'(n) from a remote location. In step 954, the noise remover 906 can remove background noise from y'(n), producing a signal y(n). In order to leave space for the ID code including random noise, background noise can be removed. Therefore, this place does not receive excessive noise. -36- 200816753 In step 958, ID code generator 922 (shown in Figure 9A) can generate an ID code c(n). The a code c(n) can represent a known and controllable function. In step 956, the π code injector 910 (shown in Figure 9A) can host the ID code ^"^ into the signal y(n). As a result, a convolution of c(n) and y(n) can be produced. The cyclotrons such as C(n) and y(n) may be the convoluted signal c(n)*y(n). Then, control is transferred to step 9 6 2 and step 9 80. In step 962, the speaker 914 (shown in Figure 9A) can receive the whirling signal c(n)*y(n). In step 964, microphone 916 (shown in Figure 9A) can receive a delayed signal from speaker 914, i.e., signal c(n-d)*y(n-d). The microphone 916 can also pick up another input signal x(n) that includes local voice (e.g., in a bilateral call plan) and/or background noise that surrounds the microphone 9 16 . Then, the microphone 9 16 can output the combined signal x(n) + c(nd)*y(n_d) to the ID code detector 924 (shown in FIG. 9A) and the sum function 9 3 0 (as shown in FIG. 9A). Show). In step 980, buffer 926 (shown in Figure 9A) may buffer a copy of the whirling signal c(n)*y(n) and output a copy of the whirling signal to delay 928. In step 966, the ID code detector 9 24 (shown in FIG. 9A) can detect the combined signal ^11) + (: 11 in 11(1)(7)) Taking 11-magic' and assuming that c(n) is a known and controllable function' can be determined by comparing c(η) and c(η - d) received from the ID code generator 9 2 2 The amount of delay d. The amount of delay d can be fed to a delay 928 (shown in Figure 9A). In step 982, the 'delay 928 (shown in Figure 9A) can introduce a delay 纛d from the output of the buffer 926 from step 980. (ie, complex -37-200816753 of c(n)*y(n)), produces a replica of c(nd)*y(nd). In step 9900, the sum function 9 3 0 (Fig. 9A The output from step 964 can be output (ie, signal + subtracts the output of step 982 (ie, the signal produces a replica of c(n_d)*y(n_d)). In other words, in step 990, the sum function 93 0 calculates the signal. x(n) + c(nd)*y(n_d)-C(nd)*y(nd) to obtain the signal x(n), which represents the absence of the echo of the signal y'(n) (with the signal y(n_d) The input signal picked up by the receiver microphone 916 (shown in Figure 9A). The signal x(n) may include such a place as in a bilateral call plan Voice, and/or background noise around the microphone 916. In step 992, voices such as local to the bilateral call plan and/or background noise around the microphone 916 and signals not including the echo x (n) are included. It can be sent to the signal transmitter 93 2 . Thus, the echo in the unilateral call and the bilateral call scheme can be effectively eliminated. From the above, it can be understood that the embodiment of the present invention can effectively eliminate the echo without requiring a prior art device, Filters (or echo cancellers) required in the configuration, or method. Embodiments of the present invention provide more accurate echo cancellation and faster cancellation, without the possible errors in echo-dependent echo path modeling. Therefore, a better quality of service is obtained. In addition, embodiments of the present invention can effectively eliminate echo in a bilaterally-talking scheme in which a conventional filter is generally poorly implemented. In fact, it does not rely on filters and correlations without echo path modeling. Under the complexity, the embodiments of the present invention can also advantageously eliminate the high CPU processing power required by the filter and the need for large data memory. To reduce the cost of echo cancellation in real-38-200816753. C. Content-based jitter buffering scheme for video over IP communication, without relying on filter and associated echo path modeling complexity, the present invention The embodiment also advantageously removes the high CPU processing power required by the filter and the need for large data memory, thereby reducing the cost of implementing echo cancellation. C. Content-based jitter buffer design for voice/video communication over IP One or more embodiments of the invention provide a mechanism to handle excessive WLAN jitter using audio VAD and jitter compensation. One or more embodiments of the present invention also operate for video that is used with no or no movement and packet bounce. One or more embodiments of the invention are related to packet communication devices. The packet communication device can include a detector that is configured to detect the characterization content in the incoming packet received by the packet communication device. The packet communication device can additionally include an implementation controller that is configured to perform an adjustment of the incoming packet to produce an adjusted packet and an output adjusted packet if the detector has detected the characterization content in the incoming packet. A new jitter buffer design called a content-based jitter buffer is proposed to address the current jitter buffering technique limitations. In accordance with one or more embodiments of the present invention, not only the RTP header information of incoming packets is noted, but also their RTP payload content is noted, thereby recognizing the silent and speechal presentations on incoming packets. Then based on this silent and speaking clues to determine when -39-200816753 enough to insert the implementation delay to compensate for network packet bounce. With this new design, the jitter buffer on the receiver side will no longer rely on the silent suppression of the transmitter. Figure 5 A-B is a high-order schematic diagram of the jitter buffer architecture. The path of the packet will be tracked via the function block in the Voice Quality Engine (VQE). The purpose here is to introduce an adaptive debounce controller to make the implementation equal. A similar design can be used to handle video jitter. In one of the conventional technique bounce buffer designs, the medullary reception VAD (Voice Activity Detection) is used to prevent the bounce buffer from overflowing. In other words, when a silent or speech cues reaches the maximum length, an unvoiced or spoken cues are used to embed the bounce buffer. Differences between new and conventional technology designs include silent or speech, which is now used to control when insertion delays can be inserted to compensate for network packet bounce. Thus, in accordance with one or more embodiments of the present invention, silent or speech detection will become an important part of the jitter buffer design. In some cases, when the bounce buffer becomes an overflow, it is too late to make any adjustments. Here's how to apply this content-based bounce buffer device and method to a working application. Both voice and video examples are explained below. Figure 5A is a block diagram of a speech hopping buffer in accordance with one or more embodiments of the present invention. The core jitter buffer includes one or more components for the packet, the packet implementation, the jitter calculation, and the jitter compensation. Here, the decoder and VAD will produce silent and speech indicators. The Silent or Speaking Indicator is then fed back to the Bounce Compensation section and used to determine when the insertion is silent to compensate for network packet bounce. Figure 5B is a block diagram of a video jittering -40 - 200816753 buffer in accordance with one or more embodiments of the present invention. The core jitter buffer is similar to the core jitter buffer of speech except that when the video frame is not moved or the movement is extremely low, the insertion delay is implemented. Here, after the decoder, the motion estimation and motion compensation will produce the remaining frames. From this remaining frame, some specific thresholds can be added to form a no-movement indicator. The no-movement indicator is then fed back to the jitter compensation portion and used to detect when the insertion is silent to compensate for network packet bounce. In video, inserting a silent implementation actually stops the implementation of the new frame while repeating the previous video frame. As mentioned above, issues such as packet delay (i.e., packet arrival late), packet delay variation, and packet loss have a negative impact on the quality of service (Q〇s) in packet communication. Packet delay and packet delay variation can also be considered as jitter. In order to solve these problems, in the prior art, a fixed debounce buffer is designed to compensate by periodically inserting a delay (ie, a silent packet or a comfort noise packet) when implementing a packet from a packet buffer. The late arrival of the packet. However, with a fixed debounce design, excessive insertion delays between voice packets can result in abrupt speech. In the prior art, a transmitter side voice activity detector (VAD) can also be used for adaptive insertion delay to compensate for packet delay and packet delay variation. However, some user devices do not support the transmitter side VAD. In addition, for example, when the transmission party is performing music playback, since the music interruption is regarded as silent and inappropriate processing, if it is an existing VAD algorithm, the transmitter side VAD generates unwanted noise or abrupt speech. As another example, when the transmitting party uses the G.729AB encoder/decoder to play some music with the open transmitter side VAD, the user on the receiver side -41 - 200816753 will perceive distortion distortion. music. Therefore, the packet communication service provider usually turns off the transmitter side VAD and cannot compensate for packet delay and packet delay variation. As a result, the fixed debounce buffer design is still used, and the quality of service is still not what the receiver wants. Additionally, in the prior art, a receiver side silent detector can be used to control the packet buffer overflow to prevent packet loss. However, according to the combination in the prior art, the voice packet is discarded, so that when the packet buffer is almost full or full, the quality of the service is not what the receiver wants. Conversely, embodiments of the present invention may utilize receiver side silent detectors to compensate for delay and delay variations in a timely manner, and adaptively implement packets from the packet buffer. Advantageously, the transmitter side VAD is not required to provide the desired quality of service. Additionally, one or more embodiments of the present invention may utilize a receiver side video detector to adaptively handle jitter in video communications. In one or more embodiments, the present invention is directed to a packet communication device, and the device can include a detector configured to detect characterized content in an incoming packet received by the packet communication device. The characterization content can represent a silence in the voice communication (e.g., a time period in which the received voice packet is not received). Alternatively, the characterization content can represent at least one of less than critical movement or no movement. For example, the border of no moving or still images can be selected to be 10% to 15% of all moving images in the video communication (in terms of data volume). The packet communication device can additionally include an implementation controller configured to perform an adjustment of the incoming packet to generate the adjusted packet and output if the detector has detected the characterization content in the incoming packet Adjusted packets. Another option, including delays in the form of, for example, a silent packet or a comfort noise packet, is that the adjustment may include iteratively implementing a previously implemented packet, and timely compensating for incoming packets and delay variations received in the packet buffer, And the adjusted package is acceptable to the recipient. The features of the present invention will become more apparent with reference to the drawings and discussion below. Figure 1 〇A is a block diagram of a first exemplary practice packet vocabulary communication configuration (first prior art configuration) with an adaptive jitter buffer design. Figure 10A shows an example. Generally, the first prior art configuration includes The transmitter side device 1091 and the receiver side device 1092 connected to the sender side device 1091 and the receiver side device 1 092 may represent an electric mobile phone or a teleconference device. The transmitter side device 1 〇 9 1 may include the following components: speed slow 1000, voice activity detector 1001 (VAD 1001), and hair 1 002. These components are described as follows: Speed buffer 1 〇〇〇 can be configured to receive voice (packet) from the microphone, buffer the packet, and then transmit the buffered packet to 1001. The VAD 1001 can be configured to have a silent descriptor (SID) when there is silence (i.e., a time period between voice packets) from the packets in the speed buffer 1000. Transmitter 1 002 can be configured to receive packets from VAD 1 000 and packet to network 1 〇 〇 3. Adjust in. . Junction delay and good idea. Such as the Internet. Each of the words, the transmitter and the packet are VAD-received and then transmitted. -43- 200816753 Next, the network 1003 can transmit the packet to the receiver-side device 1 092 °. The receiver-side device 1 092 can include the following components: a packet buffer 1004, The packet implementation controller 1〇〇5, the delay insertion controller 1006, the delay information module 1 007, the jitter computer 1 008, and the implementation delay computer 1〇09. These components are described as follows: Packet buffer 1004 can be configured to receive packets from network 1 003, buffer packets, then send packets to jitter computer 008, delay insertion controller 1 006, and packet implementation controller 1 005. The beat computer 1 〇〇 8 can be configured to calculate the jitter size in the packet. Bounce can indicate silence, that is, the time period between the arrival of two voice packets without data. The delay insertion controller 1 006 can be configured to determine the insertion delay in accordance with the SID inserted in the packet in accordance with the VAD 1001 of the transmitter side device 109 1 . The delay insertion controller 1 006 can receive jitter size information from the jitter computer 008 and can receive packets from the packet buffer 1 〇〇 4. The implementation delay computer 1 009 can be configured to receive jitter size information from the jitter computer 008. Based on the jitter size information, the implementation delay computer 1 009 calculates the delay size to be inserted into the packet. The delay information module 007 can be configured to integrate information about the timing of the insertion delay from the delay insertion controller 1006 and information about the size of the delay from the implementation of the delay computer 009. Therefore, the delay information module 1 007 can establish the integrated information into the data structure and send the data structure to the packet implementation controller 1 0 0 5 ◦ -44- 200816753 The packet implementation controller 1 005 can be configured to be based on the delay information. The data structure received by module 1 007 receives the packet from packet buffer 1-4 and the insertion delay to the packet. Figure 10B is a flow diagram of the transmitter side processing of the prior art jitter buffer design utilized in the first prior art configuration shown in the example of Figure 10A. Transmitter-side processing begins in step 1 060, in which a speed buffer 1 000 (shown in Figure 10A) can receive, for example, a packet from a microphone used by the transmitting party. The speed buffer 1 000 can then buffer the packet. In step 1 0 6 2, the speed buffer 1 〇 〇 〇 can set the flag bit of each packet to 以 by default. When each packet reaches the last step 1 0 7 2, if the packet is the first voice packet, the flag bit of the packet is set to 1. Otherwise, the marker symbol can be maintained as 〇 〇 In step 1064, the VAD 1001 can determine whether the packet contains one or more silent periods (i.e., one or more periods of no data between packets). If the packet contains one or more silent periods, then control transfers to step 1 074; if not, control transfers to step 1 066. In step 1 〇 74, VAD 1〇〇1 may determine whether the S ID has been set in the packet. The S ID (Speech Descriptor) is grouped to indicate the beginning of the silent period. If the S ID has been set for the silent period in the packet, the control moves directly back to 1 072; if it is not set, then control is transferred to step 1 0 7 6 before moving to step 1 072. In step 1 0 7 6 , V A D 1 0 0 1 may generate a SID for the packet. In step 1072, the transmitter 10〇2 (shown in Figure iA) can transmit the packet to the network 1003. -45- 200816753 In step 1066, VAD 1001 may determine whether the packet contains the first voice packet after the silent period. If the packet contains the first voice packet, then control transfers to 1 068, in which VAD 1001 may set the flag bit of the first voice packet to one. If the packet does not contain the first language packet, then control transfers to step 1 072, in which the transmitter 1〇〇2 can transmit the packet to 1 0 0 3. FIG. 1C is a flow chart of a conventional technique delay calculation process. The delay calculation process may be part of the receiver side processing in the receiver side device 1 092 for the first prior art configuration shown in Fig. 10A. The delay calculation process can be performed by the packet buffer 1 004 including the receiver side device 1 092 shown in the example of FIG. 10A, the delay insertion controller 1 006 bounces the computer 1 〇〇 8, implements the delay computer 1 009, and delays the information mode. Group 1 007. The delay calculation process can begin in step 1 022, in which packet buffer 1 004 can receive the packet from network 1 003 and buffer the packet. For example, the packet may represent the packet transmitted by the transmitter 1 0 02 (shown in Figure 10A) in step 1 072 (shown in Figure 10B). In step 1 024, the jitter computer 1 008 can calculate the average jitter j °. In step 1 026, the jitter computer 1 008 can calculate the jitter deviation v °. In step 1 028, the implementation delay computer 1 009 can use j and v and The network model represented by f(j, v) is used to calculate the implementation delay (ie, delay d = f(j, v)). In step 1030, the delay insertion controller 1006 can determine the packet buffer -46-200816753

衝器1 004是否是空的。若封包緩衝I 制移轉到步驟1 〇 3 8 ;若不是空的 1 03 2 〇 在步驟1 03 2中,延遲插入控制| 疋値1的標不符號位兀。若已設定値 則可將控制移轉到步驟1 03 8 ;若未設 1 034。 在步驟1034中,延遲插入控制, 是否有SID。若具有SID,則控制移 具有,則控制移轉到步驟1 0 3 6。 在步驟1 03 6中,延遲插入控制| 動j是否大於預設臨界。例如,此處 器1 0 0 4的長度。 若平均跳動j大於預設臨界 1 03 8 ;若未大於,則控制直接移轉到 在步驟1 03 8中,延遲資訊模組 的尺寸和時序資訊,然後將控制移轉 在步驟1 040中,可將有關插入 施控制器1 〇 〇 5。 圖1 0D爲習知技術封包實施控制 實施控制處理可以是用於圖1 〇 A所元 的接收器側裝置1 092中之接收器側 圖1 0 A所示的封包實施控制器1 0 〇 5 理。 1 004是空的,則控 ’則控制移轉到步驟 蓉1 006決定是否已設 1的標符號位元, :定,則將控制移轉到 蓉1 006可決定封包中 轉到步驟1 0 3 8 ;若不 蓉1 006可決定平均跳 ;臨界可以是封包緩衝 ,則控制移轉到步驟 步驟1 0 4 0。 1 007可統合插入延遲 到步驟1 040。 延遲的資訊輸出到實 I處理的流程圖。封包 :之第一習知技術配置 處理的一部分。可由 執行封包實施控制處 -47- 200816753 封包實施控制處理開始於步驟1 042,在該步驟中,封 包實施控制器1 005可從封包緩衝器1 004 (圖10A所示) 接收封包,和可從延遲資訊模組1〇〇7 (圖10A所示)接 收有關插入延遲的資訊當作步驟1 040的結果(圖l0C所 示)。 在步驟1044中,封包實施控制器1005可決定是否已 插入足夠的封包。若已插入足夠封包,則控制移轉到步驟 1 048 ;若未插入足夠封包,則控制移轉到步驟1 046。 在步驟1046中,封包實施控制器1005可插入延遲 (如、以無聲封包或舒適雜訊封包的形式)到從封包緩衝 器1 004所接收到的封包。 在步驟1048中,封包實施控制器1005可檢索來自封 包緩衝器1 0 0 4的封包。 在步驟1 05 0中,封包實施控制器1 004可實施從步驟 1046及1048所產生的封包。 圖10E爲當打開發送器側VAD 1001 (圖10A所示) 時之封包緩衝器1 〇〇4所接收到的封包流之槪要表示圖。 如圖1 0E的例子所示,所接收到的封包流可包括語音封包 1080、在語音封包1080後面的無聲1084、接在無聲1084 後面的語音封包1 〇 8 6、接在語音封包1 〇 8 6後面的無聲 1 088等。無聲1 084和無聲1 08 8表示封包實施控制器 1 005未接收到語音封包期間的時間週期。因爲打開VAD 1001,所以VAD 1001已將諸如封包l〇80a及1086a等第 一語音封包的標示符號位元設定成1。圖1 0 C所示的步驟 -48- 200816753 1 032中可利用値1的標示符號位元以決定何時插入延 另外,VAD 1001在無聲 1084的一開始插入 1082,及在無聲1088的一開始插入SID 1090。SID 及SID 1090亦可被用在圖10C所示的步驟1034中以 何時插入延遲。 圖10F爲當關掉發送器側VAD 1001 (圖l〇A所 時之封包緩衝器1 〇 〇 4 (圖1 0 A所示)中所接收到的 流之槪要表示圖。因爲V A D 1 0 0 1中所利用的現存演 例如在音樂播放時產生不想要的雜訊或突變語音, VAD 1001 —般會被封包通訊服務供應商關掉,因此 提供有關語音活動的資訊。 如圖1 0F的例子所示,所接收到的封包流包括語 包1 092、接在語音封包1 092後面的無聲封包1〇94、 無聲封包1 094後面的語音封包1 096、接在語音封包 後面的無聲封包1098等。因爲VAD 1001被關掉,所 爲以無聲封包1 094及無聲封包1 098爲代表的無聲週 入S ID。結果,不執行圖10C所示的步驟1 034 (即、 SID )。 另外,雖然語音封包1 092a具有1的標示符號 値,但是所有剩下的已接收封包都具有〇的標示符號 値。因此,不執行圖10C所示的步驟1 03 2 (即、決 一封包的標示位元値是否被設定成1 )。 另外,當關掉發送器側1091上的VAD 1001時, 可連續進來到接收器側1 092上的封包緩衝器1 004, 遲。 SID 1082 決定 示) 封包 算法 所以 無法 音封 接在 1096 以不 期插 偵測 位元 位元 定第 封包 使得 -49- 200816753 封包緩衝器1 004從不會是空的。因此,可視設計而定, 不執行圖10C所示的步驟1 03 0 (即、決定封包緩衝器 1004是否是空的)。 因此,當關掉VAD 1001時,延遲插入控制1006無法 爲決定插入延遲的時序執行步驟 1030、1032、及 1034。 雖然在圖10C所示的步驟1036中,延遲插入控制器1006 仍能夠獲得有關平均跳動j(i)是否大於預設臨界的資訊, 但是該資訊不足以決定插入延遲的時序。例如,當平均跳 動j(i)大於預設臨界時,對插入延遲已太遲。結果,在不 準確的時序中插入延遲,產生語音通訊中的突變語音。 而且,即使打開VAD 1001現存的VAD演算法也無法 使VAD 10 01能夠精確插入SID。結果,發生語音封包的 前端剪掉及/或後端剪掉,語音品質非接收方想要。 圖1 1 A爲包括適應性緩衝器溢位控制器的第二習知技 術封包語音通訊配置(第二習知技術配置)之接收器側裝 置1 1 〇〇的方塊圖。如圖1 1 A的例子所示,接收器側裝置 1 1 〇〇包括圖1 0A所示的第一習知技術配置中之接收器側 裝置1 092的組件。此外,接收器側裝置1 1 〇〇包括附加組 件1 1 80。附加組件1 1 80可包括解碼器U 1 8、無聲偵測器 1 1 1 6、及緩衝器溢位控制器1 1 1 4,說明如下: 無聲偵測器1 1 1 6可被組配成偵測從解碼器1 i丨8所接 收到的封包中之無聲。若具有無聲,則無聲偵測器1 1 1 6 可將無聲旗標値設定成1。若沒有無聲,則無聲偵測器 1116可將無聲旗標値設定成0。 -50- 200816753 緩衝器溢位控制器1 1 1 4可被組配成監視封包緩衝器 1102的狀態。根據封包緩衝器1102的狀態,緩衝器溢位 控制器1 1 1 4可決定是否丟掉或保有在封包緩衝器丨〗02中 所接收的下一封包。 圖11B爲圖11A的例子中所示之接收器側裝置1100 所利用的無聲偵測處理之流程圖。於步驟11 20開始無聲 偵測處理,在該步驟中,解碼器1 1 1 8 (圖1 1 A所示)可 解壓縮從封包實施控制器1 1 04 (圖1 1 A所示)所接收之 語音封包(封包)。 在步驟1 1 24中,無聲偵測器1 1 1 6 (圖1 1 A所示)可 決定是否有無聲在接收封包中。若具有無聲,則控制移轉 到1 1 3 0,在該步驟中,無聲偵測器1 1 1 6將無聲旗標値設 定成1。若沒有無聲,則控制移轉到步驟1 1 26,在該步驟 中,無聲偵測器1 1 1 6將無聲旗標値設定成〇。 在步驟1 1 2 8中,無聲偵測器11 1 6可輸出無聲旗標 値。 圖1 1C爲圖11A的例子中所示之接收器側裝置11〇〇 中所利用的緩衝器溢位控制處理之流程圖。可由圖1 1 A所 示的緩衝器溢位控制器1 1 1 4執行緩衝器溢位控制處理。 在步驟11 3 2開始緩衝器溢位控制處理,在該步驟中,緩 衝器溢位控制器1 1 1 4接收來自無聲偵測器1 1 1 6 (圖1 1 A 所示)的無聲旗標値。 在步驟1 1 3 4中,緩衝器溢位控制1 1 1 4可決定封包緩 衝器η 02 (圖2 A所示)是否已到達第一臨界,諸如剛好 -51 - 200816753 1 〇 ο %等。若封包緩衝器1 1 0 2已到達第一臨界,則控制移 轉到步驟1 1 4 4 ;若未到達,則控制移轉到步驟1 1 3 6。 在步驟11 44中,緩衝器溢位控制器1 1 1 4可命令封包 緩衝器1 1 0 2丟棄最近接收到的封包,不管最近接收到的 封包是否表示語音封包。緩衝器溢位控制器1 1 1 4亦可命 令封包緩衝器1 1 〇 2提供欲實施的封包。 在步驟1 1 3 6中,緩衝器溢位控制器n i 4可決定封包 緩衝器1 1 〇2是否已到達第二臨界,諸如剛好80%等。若 封包緩衝器η 02已到達第二臨界,則控制移轉到步驟 1 1 4 0 ;若未到達,則控制移轉到步驟丨丨3 8。 在步驟1 1 4 0中,緩衝器溢位控制器n i 4可決定從無 聲偵測器η 16接收到的無聲旗標値是否是1。若無聲旗標 値是1 ’則控制移轉到步驟1 1 4 2 ;若不是,則控制移轉到 步驟1 1 3 8。 在步驟11 4 2中,緩衝器溢位控制η丨4可命令封包緩 衝器1 1 02丟棄最近收到的封包,因爲最近收到的封包表 示無聲。緩衝器溢位控制器1 1 1 4亦可命令封包緩衝器 1 1 02提供欲實施的封包。然後控制移轉到步驟n 3 8。 在步驟1 1 3 8中,封包緩衝器1 i 〇 2可接收和緩衝封 包。 圖1 1 C的例子中所示之緩衝器溢位控制處理對維持服 務品質無效。例如,當封包緩衝器Π 02到達第一臨界, 如、剛好100%時,可根據步驟1144丟棄語音封包。因 此,產生突變語音。另外,當封包緩衝器1 1 〇 2到達非第 -52· 200816753 一臨界的弟一臨界’如、非剛好1 〇 0 %的剛好8 0 %時,封 包緩衝器1 1 〇 2仍然接收比封包緩衝器1 1 〇 2的剩下容量還 大之語音封包的資料組。結果,溢位仍舊發生,及超過封 包緩衝器1 102的容量之封包(包括語音封包)仍舊會損 失。結果,服務品質非接收方所想要的。 圖1 2 A爲根據本發明的一或多個實施例之具有適應性 跳動處理的封包語音通訊系統之接收器側裝置1 200的方 塊圖。接收器側裝置1 2 0 0可表示諸如電話、行動電話、 電訊會議裝置、聲頻播放器、或視頻電話等使用者裝置。 另一選擇是,接收器側裝置1 2 0 0可表示封包通訊網路中 的伺服器裝置。 圖12A的例子所示一般,接收器側裝置1 200可包括 一或多個下面組件:封包緩衝器1 2 0 2、封包實施控制器 1208、解碼器1210、延遲插入控制器1214、延遲資訊模 組1216、跳動計算機1 204、和實施延遲計算機1 206。接 收器側裝置1 2 0 0可另外包括被組配成偵測特徵化內容之 偵測器,諸如偵測無聲的無聲偵測器1 2 1 2等。無聲偵測 器1 2 1 2可被組配成接收來自解碼器1 2 1 0的經解壓縮封 包。無聲偵測器1 2 1 2可另外被組配成處理經解壓縮封 包,並且經由鏈路1 2 9 9提供無聲旗標(但是非經解壓縮 封包)給延遲插入控制器1 2 1 4。 可在被下載到接收器側裝置1 2 0 0內的軟體中包括一 或多個組件。 接收器側裝置1 2 0 0的一或多個組件可具有類似於圖 -53- 200816753 1 1A所示的接收器側裝置1 100之組件的能力。然而,與 接收器側裝置1100的無聲偵測器η 16相反地,無聲偵測 器1 2 1 2可被組配成決定何時插入處理跳動的延遲以取代 控制封包緩衝器溢位,或除了控制封包緩衝器溢位之外還 加上此功能。 另外,與接收器側裝置1100的延遲插入控制器1108 相反地,延遲插入控制器1 2 1 4可接收來自無聲偵測器 1 2 1 2的資訊以取代習知技術跳動緩衝設計中之接收來自跳 動計算機1 204的資訊。 延遲插入控制器12 14可經由鏈路1 299直接耦合到無 聲偵測器1212。鏈路1 299可表示直接邏輯鏈路或實體鏈 路。與圖11Α的例子所示之延遲插入控制器1108和跳動 計算機1 1 10之間的鏈路1 199與圖10Α的例子所示之跳動 計算機1 008和延遲插入控制器1〇〇6之間的鏈結1 099相 反地,在跳動計算1 204和延遲插入控制器1 2 1 4之間沒有 直接邏輯或實體連接。 圖12Β爲根據本發明的一或多個實施例之用於圖12Α 的例子所示之接收器側裝置1 200中所利用的適應性跳動 處理所用之延遲插入控制處理圖。延遲插入控制處理開始 於步驟1 220,在該步驟中,延遲插入控制器1214 (圖 12Α所示)可決定封包緩衝器1 202 (圖12Α所示)何時 是空的,即沒有包含實施的封包。若封包緩衝器1 202是 空的,則控制移轉到步驟1 22 8 ;若不是空的,則控制移轉 到 1 222。 -54- 200816753 在步驟1 222中,延遲插入控制器1214可決定在經由 封包緩衝器1 2〇2所接收到的進來封包中設定値1的標示 符號位元。若具有SID,則控制移轉到步驟1 228 ;若未具 有S ID,則控制移轉到步驟1 226。 在步驟1226中,延遲插入控制器1214可決定從無聲 偵測器1 2 1 2 (圖1 2 A所示)所接收到的無聲旗標値是否 是1。若無聲旗標値是1,則可將控制移轉到步驟1 22 8 ; 若不是1,則控制可移轉到步驟1 2 3 0。 在步驟1 2 2 8中,封包實施控制器1 2 0 8 (圖1 2 A所 示)可根據延遲資訊模組1 2 1 6 (圖1 2 A所示所接收到的 資訊插入延遲(如、無聲封包或舒適雜訊封包等)到進來 的封包以產生經調整封包。延遲資訊包括實施延遲計算機 1 2 06 (圖3A所示)所提供的尺寸資訊和延遲插入控制器 1 2 1 4所提供的時序資訊。 在步驟1 2 3 0中,封包實施控制器1 2 〇 8可實施經調整 封包。由解碼器1 2 1 0解壓縮經調整封包,然後由接收器 側裝置1 200實施。 如從圖12B可明白一般,根據本發明的一或多個實施 例,即爲從跳動計算機1 2 0 4接收到任何資訊,延遲插入 控制器1214仍可依據從無聲偵測器ι212(在步驟1226 中)所接收到的無聲旗標値來決定插入延遲的時序。 圖1 3爲根據本發明的一或多個實施例之利用調整性 跳動處理之封包視頻通訊系統的接收側裝置1 3 〇 〇之方塊 圖。接收側裝置1 3 0 0可表示電話、行動電話、電訊會議 -55- 200816753 裝置、視頻電話、及視頻播放器的至少一者。另一選擇 是,接收器側裝置1 3 00可表示封包通訊網路中的伺服器 裝置。 接收器側裝置1 3 00可包括執行類似於圖3A的例子中 所示之接收器側裝置1 200的組件之功能的功能之組件。 接收器側裝置1 3 00可包括封包緩衝器1 3 02、跳動計算機 1 3 04、補償控制器1314、補償計算機1 3 06、補償資訊模 組1 3 1 6、封包實施控制器1 3 0 8、解碼器1 3 1 0、及視頻偵 測器1 3 1 2中的一或多個。 不同的是視頻偵測器1 3 1 2可被組配成偵測視頻封包 中的無移動或低移動以取代無聲。另外,補償計算機 1 3 06、補償控制器1314、及補償資訊模組1316可被組配 成計算和統合視頻補償的資訊以取代被組配成計算和統合 延遲插入的資訊。視頻補償可包括在重複視頻圖框的同時 停止播放新的視頻圖框,並且可由封包實施控制器1 3 0 8 執行。 類似於接收器側裝置1 2 0 0的組態,補償控制器1 3 1 4 可經由鏈路1 3 99直接耦合到視頻偵測器1 3 1 2以決定視頻 補償的時序。 用於接收器側裝置1 3 00之跳動處理的視頻補償控制 處理與圖1 2 B的例子中所示之延遲插入控制處理類似。 本發明的一或多個實施例包含接收器側裝置,該接收 器側裝置包括類似於接收器側裝置1 3 00的組態之組態, 並且被組配成處理包括語音和視頻之多媒體通訊中的跳 -56- 200816753 動。另外,本發明的一或多個實施例可包含類似於圖1 2 B 的例子中所示之延遲插入控制處理的延遲插入控制和視頻 補償控制處理。 如從上述可明白一般,本發明的實施例可有效處理封 包通訊中的跳動,卻不必依賴發送器側語音活動偵測器 (VAD )或固定式跳動緩衝設計。爲延遲插入控制以取代 只爲緩衝器溢位控制使用接收器側無聲偵測器,本發明的 實施例可準確地插入延遲,卻不需要插入延遲到語音封 包。有利的是,可降低突變的語音,確保語音品質。另 外,本發明的實施例可用於視頻通訊及/或多媒體通訊。 D.Divitas 描述協定(DDP ) 本發明的一或多個實施例包括透過SIP的輕量協定, 其將在伺服器和用戶之間有效傳送資訊,且將在不受硬體 和軟體平台支配之下運作。 DDP的架構;已在考量下面因素之下架構DDP : 不受伺服器和用戶軟體及〇S的支配:協定(DDP ) 的結構和格式係成DDP不知道伺服器或手機硬體平台與 在兩平台上執行的作業系統。根據本發明的一或多個實施 例,協定被架構和設計成在任何伺服器或手機硬體平台上 執行,且也不受執行之 Operating System/SW平台的支 配。例如,可在 Linux、Symbian、Windows Mobile 5.0 等 上執行DDP。總之,每次以轉移此模組到新的硬體或軟體 平台上時都不必設計或發展特定的配接器層。 -57- 200816753 從控制面協定解耦:DDP已被架構成能夠與在特定平 台(即SIP、H.3 23等)上使用的任何控制面技術一起使 用。 不受傳送協定的支配:被設計成當透過UDP和TCP 二者使用時有效。若透過傳送層使用是最好的選擇,則具 有一隨意模組以保證可靠度和性能的位準(使用 ACK/ NACK和視窗機構)。尤其是具有高度封包遺失的環境 中,此可靠模組去除較高層應用程式擔心保證運送的負 擔。 智慧型和不在意應用程式:DDP將被用於從具有嚴格 的即時要求之緊要控制面訊息到需要在伺服器和用戶之間 移轉大量資料的應用程式之廣泛的應用程式範圍。DDP內 的隨意模組使應用程式能夠在伺服器和用戶之間移轉檔案 和緩衝區。協定亦不在意應用程式資料的類型一即二元、 本文。 服務優先權位準:能夠爲具有不同延遲和服務要求的 應用程式排程和佇列具有不同優先權位準之訊息。 加密的支援:DDP內的隨意模組使伺服器和手機能夠 在啓動時建立安全通道,並且 DDP的所有進一步交換都 被加密,以提供一安全位準給需要加密的應用程式。此將 仍舊讓應用程式能夠爲不需要加密的此種應用程式交換未 加密訊息。 內建對話管理:具有特定控制訊息以啓動和維持伺服 器和用戶之間的對話。 -58 - 200816753 不受媒體支配:協定不受將用戶連接到伺服器之媒體 的支配。對話可透過wiFi、蜂巢式資料通道、或有線乙 太網路。 圖6A爲根據本發明的一或多個實施例所製造之DDP 架構的槪要圖。如圖6A所示’ DDP是透過SIP協定所執 行的對話層應用程式。在用戶和伺服器之間傳輸加密的應 用層資訊被用於影響傳訊決定’提供對話持久性給資料應 用程式,諸如電子郵件或SMTP等,但並不侷限於此。圖 6A爲組成DDP的不同模組之高階圖。此處槪要說明根據 本發明的一或多個實施例之DDP內的不同模組。 i. DDP訊息處理器:此由剖析器和訊息格式化模組所 組成。剖析器負責檢查所接收到的DDP訊息之有效性, 並且在召喚回收處理器之前析取各種資訊片段。 Π.對話管理:評估兩同層之間的DDP對話之健康的 內建機構,及若對話失敗則告知已註冊應用程式的機構。 iii. DDP排程器:依據應用程式要求以提供不同優先 權位準給DDP訊息。 iv. 可靠的DDP模組:視應用程式要求而定保證可靠 運送DDP訊息之支援。 V· DDX ( Divitas資料移轉)模組:使用DDP以移轉 同層之間的檔案和資料緩衝區之模組。DDX模組將不受檔 案格式或緩衝內容的支配加以運作,並且具有用於錯誤檢 查和運送確認之機構。Whether the punch 1 004 is empty. If the packet buffer I is transferred to step 1 〇 3 8 ; if it is not empty 1 03 2 〇 In step 1 03 2, the delay insertion control | 疋値1 is not marked. If 値 is already set, move control to step 1 03 8 ; if 1 034 is not set. In step 1034, the insertion control is delayed, and there is a SID. If there is a SID, the control shift has, and control moves to step 1 0 3 6 . In step 1 03 6 , the delay insertion control | action j is greater than a preset threshold. For example, the length of the device 1 0 0 4 here. If the average jitter j is greater than the preset threshold 1 03 8 ; if not greater, the control directly moves to the size and timing information of the delay information module in step 1 0 8 , and then transfers the control to step 1 040, The relevant controller 1 〇〇 5 can be inserted. FIG. 10D is a conventional technology packet implementation control implementation control process may be used for the receiver side of the receiver side device 1 092 of FIG. 1A, the packet implementation controller 1 0 〇5 shown in FIG. Reason. 1 004 is empty, then control 'then control moves to step 1 006 to determine whether the 1 symbol bit has been set, : fixed, then transfer control to Rong 1 006 can determine the packet to go to step 1 0 3 8 ; If not Rong 1 006 can determine the average jump; the threshold can be the packet buffer, then the control moves to step 1 0 4 0. 1 007 can integrate the insertion delay to step 1 040. The delayed information is output to the flow chart of the real I processing. Packet: The first known technology configuration part of the processing. The packet implementation control process can be performed by the execution packet-47-200816753. The packet implementation control process begins in step 1 042, in which the packet implementation controller 1 005 can receive the packet from the packet buffer 1 004 (shown in FIG. 10A), and can The delay information module 1〇〇7 (shown in FIG. 10A) receives the information about the insertion delay as the result of step 1 040 (shown in FIG. 10C). In step 1044, the packet enforcement controller 1005 can determine if sufficient packets have been inserted. If sufficient packets have been inserted, control transfers to step 1 048; if sufficient packets are not inserted, control transfers to step 1 046. In step 1046, the packet enforcement controller 1005 can insert a delay (e.g., in the form of a silent packet or a comfort noise packet) to the packet received from the packet buffer 1 004. In step 1048, the packet enforcement controller 1005 can retrieve the packet from the packet buffer 1 0 0 4 . In step 100, the packet enforcement controller 1 004 can implement the packets generated from steps 1046 and 1048. Figure 10E is a schematic representation of the packet stream received by the packet buffer 1 〇〇 4 when the transmitter side VAD 1001 (shown in Figure 10A) is turned on. As shown in the example of FIG. 10E, the received packet stream may include a voice packet 1080, a silence 1084 behind the voice packet 1080, a voice packet 1 〇 8 6 following the silence 1084, and a voice packet 1 〇 8 6 behind the silent 1 088 and so on. Silent 1 084 and Silent 1 08 8 indicate the time period during which the packet implementation controller 1 005 did not receive the voice packet. Since the VAD 1001 is turned on, the VAD 1001 has set the sign bit of the first voice packet such as the packets 100a and 1086a to 1. The signal symbol of 値1 can be used in step-48-200816753 1 032 to determine when to insert the extension. VAD 1001 is inserted at the beginning of silence 1084 and inserted at the beginning of silent 1088. SID 1090. SID and SID 1090 can also be used in step 1034 shown in Figure 10C to when the insertion delay is inserted. Figure 10F is a diagram showing the flow of the stream received in the packet side buffer V1 1001 (shown in Figure 10A) when the transmitter side VAD 1001 is turned off. Because VAD 1 0 The existing performances used in 0 1 generate unwanted noise or abrupt speech during music playback, and the VAD 1001 will normally be turned off by the packet communication service provider, thus providing information about voice activity. As shown in the example, the received packet stream includes a packet 1 092, a silent packet 1 〇 94 connected to the voice packet 1 092, a voice packet 1 096 behind the silent packet 1 094, and a silent packet 1098 following the voice packet. Etc. Because the VAD 1001 is turned off, it is a silent weekly S ID represented by the silent packet 1 094 and the silent packet 1 098. As a result, the step 1 034 (i.e., SID) shown in Fig. 10C is not executed. Although the voice packet 1 092a has the designation symbol 1 of 1, the remaining received packets all have the 标示 mark symbol 値. Therefore, the step 1 03 2 shown in FIG. 10C is not executed (ie, the flag of the packet is determined. Whether Yuanxiao is set to 1). In addition, When the VAD 1001 on the transmitter side 1091 is turned off, the packet buffer 1 004 on the receiver side 1 092 can be continuously entered. The SID 1082 determines the packet algorithm so that it cannot be sealed at 1096 to intervene. The bitwise bit is fixed so that the -49-200816753 packet buffer 1 004 is never empty. Therefore, depending on the visual design, the step 1 03 0 shown in Fig. 10C is not executed (i.e., it is determined whether the packet buffer 1004 is empty). Therefore, when the VAD 1001 is turned off, the delay insertion control 1006 cannot perform steps 1030, 1032, and 1034 for determining the timing of the insertion delay. Although in step 1036 shown in FIG. 10C, the delay insertion controller 1006 is still able to obtain information as to whether the average jitter j(i) is greater than a preset threshold, the information is insufficient to determine the timing of the insertion delay. For example, when the average jitter j(i) is greater than the preset threshold, the insertion delay is too late. As a result, delays are inserted in inaccurate timings to produce abrupt speech in speech communications. Moreover, even if the existing VAD algorithm of the VAD 1001 is turned on, the VAD 10 01 cannot be accurately inserted into the SID. As a result, the front end of the voice packet is clipped and/or the back end is clipped, and the voice quality is not desired by the recipient. Figure 1 A is a block diagram of a receiver side device 1 1 第二 of a second conventional technique packet voice communication configuration (second prior art configuration) including an adaptive buffer overflow controller. As shown in the example of Fig. 11A, the receiver side device 1 1 includes components of the receiver side device 1 092 in the first prior art configuration shown in Fig. 10A. Further, the receiver side device 1 1 〇〇 includes an additional component 1 1 80. The add-on component 1 1 80 may include a decoder U 18, a silent detector 1 1 16 , and a buffer overflow controller 1 1 1 4, as explained below: The silent detector 1 1 1 6 may be configured into The silence in the packet received from the decoder 1 i 8 is detected. If there is no sound, the silent detector 1 1 1 6 can set the silent flag 1 to 1. If there is no silence, the silent detector 1116 can set the silent flag 0 to zero. -50- 200816753 The buffer overflow controller 1 1 1 4 can be configured to monitor the state of the packet buffer 1102. Based on the state of the packet buffer 1102, the buffer overflow controller 1 1 1 4 can decide whether to drop or hold the next packet received in the packet buffer 丨 02. Fig. 11B is a flow chart showing the silent detection processing utilized by the receiver side device 1100 shown in the example of Fig. 11A. In step 11 20, the silent detection process is started. In this step, the decoder 1 1 18 (shown in FIG. 1 1 A) can be decompressed and received from the packet implementation controller 1 10 04 (shown in FIG. 1 1 A). Voice packet (packet). In step 1 24, the silent detector 1 1 16 (shown in Figure 1 1 A) can determine if there is silence in the receiving packet. If there is no sound, the control shifts to 1 1 3 0. In this step, the silent detector 1 1 16 sets the silent flag 1 to 1. If there is no silence, then control transfers to step 1 1 26, in which the silent detector 1 1 16 sets the silent flag 〇 to 〇. In step 1 1 2 8 , the silent detector 11 16 can output a silent flag 値. Fig. 1 1C is a flowchart of the buffer overflow control process utilized in the receiver side device 11A shown in the example of Fig. 11A. The buffer overflow control process can be performed by the buffer overflow controller 1 1 1 4 shown in Fig. 11A. The buffer overflow control process is started in step 11 3 2, in which the buffer overflow controller 1 1 1 4 receives the silent flag from the silent detector 1 1 16 (shown in FIG. 1 1 A). value. In step 1 1 3 4, the buffer overflow control 1 1 1 4 determines whether the packet buffer η 02 (shown in Figure 2A) has reached the first critical value, such as just -51 - 200816753 1 〇 ο % and so on. If the packet buffer 1 102 has reached the first threshold, then control transfers to step 1 1 4 4; if not, control transfers to step 1 1 3 6 . In step 11 44, the buffer overflow controller 1 1 1 4 may command the packet buffer 1 1 2 2 to discard the most recently received packet, regardless of whether the most recently received packet indicates a voice packet. The buffer overflow controller 1 1 1 4 can also command the packet buffer 1 1 〇 2 to provide the packet to be implemented. In step 1 1 36, the buffer overflow controller n i 4 may determine whether the packet buffer 1 1 〇 2 has reached the second threshold, such as exactly 80%. If the packet buffer η 02 has reached the second threshold, then control transfers to step 1 1 4 0; if not, control transfers to step 丨丨38. In step 1 1 40, the buffer overflow controller n i 4 may determine whether the silent flag received from the silent detector η 16 is 1. If the silent flag 値 is 1 ' then control transfers to step 1 1 4 2; if not, control transfers to step 1 1 3 8 . In step 11 4 2, the buffer overflow control η 丨 4 may command the packet buffer 1 1 02 to discard the most recently received packet because the most recently received packet indicates no silence. The buffer overflow controller 1 1 1 4 can also command the packet buffer 1 1 02 to provide the packet to be implemented. Control then moves to step n38. In step 1 1 3 8 , the packet buffer 1 i 〇 2 can receive and buffer the packet. The buffer overflow control process shown in the example of Fig. 1 1 C is ineffective for maintaining the service quality. For example, when the packet buffer Π 02 reaches the first threshold, such as just 100%, the voice packet can be discarded according to step 1144. Therefore, a mutant speech is generated. In addition, when the packet buffer 1 1 〇 2 reaches a critical threshold of -52·200816753, if the threshold is just 80% of the exactly 1 〇 0%, the packet buffer 1 1 〇 2 still receives the packet. The data set of the voice packet of the buffer 1 1 〇 2 is still large. As a result, the overflow still occurs, and packets (including voice packets) that exceed the capacity of the packet buffer 1 102 are still lost. As a result, the quality of service is not what the recipient wants. Figure 1 2A is a block diagram of a receiver side device 1 200 of a packet voice communication system with adaptive jitter processing in accordance with one or more embodiments of the present invention. The receiver side device 1 200 can represent a user device such as a telephone, a mobile phone, a teleconferencing device, an audio player, or a video phone. Alternatively, the receiver side device 1 200 can represent a server device in the packet communication network. As shown in the example of FIG. 12A, generally, the receiver side device 1 200 may include one or more of the following components: a packet buffer 1 2 0 2, a packet implementation controller 1208, a decoder 1210, a delay insertion controller 1214, and a delay information mode. Group 1216, jitter computer 1 204, and implementation delay computer 1 206. The receiver side device 1 200 may additionally include a detector that is configured to detect the characterization content, such as detecting a silent silent detector 1 2 1 2, and the like. The silent detector 1 2 1 2 can be configured to receive the decompressed packet from the decoder 1 2 1 0. The silent detector 1 2 1 2 may additionally be configured to process the decompressed packet and provide a silent flag (but not a decompressed packet) via link 1 29 to the delay insertion controller 1 2 1 4 . One or more components may be included in the software downloaded to the receiver side device 12000. One or more components of the receiver side device 1 200 may have capabilities similar to those of the receiver side device 1 100 shown in Figures 53-200816753 1 1A. However, contrary to the silent detector η 16 of the receiver side device 1100, the silent detector 1 2 1 2 can be configured to determine when to insert a delay in processing the beat to replace the control packet buffer overflow, or in addition to control This feature is added in addition to the packet buffer overflow. In addition, contrary to the delay insertion controller 1108 of the receiver side device 1100, the delay insertion controller 1 2 1 4 can receive information from the silent detector 1 2 1 2 instead of receiving from the prior art jitter buffer design. The information of the computer 1 204 is beaten. Delay insertion controller 12 14 can be directly coupled to silent detector 1212 via link 1 299. Link 1 299 can represent a direct logical link or an entity link. The link 1 199 between the delay insertion controller 1108 and the hopping computer 1 1 10 shown in the example of FIG. 11A and the hopping computer 1 008 and the delay insertion controller 1 〇〇 6 shown in the example of FIG. Link 1 099 Conversely, there is no direct logical or physical connection between the jitter calculation 1 204 and the delay insertion controller 1 2 1 4 . Figure 12 is a diagram showing a delay insertion control process for adaptive bounce processing utilized in the receiver side device 1 200 shown in the example of Figure 12A, in accordance with one or more embodiments of the present invention. The delay insertion control process begins in step 1 220, in which the delay insertion controller 1214 (shown in Figure 12A) determines when the packet buffer 1 202 (shown in Figure 12A) is empty, i.e., does not contain the implemented packet. . If the packet buffer 1 202 is empty, then control transfers to step 1 22 8; if not, control transfers to 1 222. -54- 200816753 In step 1 222, the delay insertion controller 1214 may determine to set a flag bit of 値1 in the incoming packet received via the packet buffer 12.2. If there is a SID, then control transfers to step 1228; if there is no S ID, then control transfers to step 1226. In step 1226, the delay insertion controller 1214 may determine whether the silent flag received from the silent detector 1 2 1 2 (shown in Figure 1 2A) is one. If the silent flag 1 is 1, then control can be transferred to step 1 22 8; if not 1, control can be moved to step 1 2 3 0. In step 1 2 2 8 , the packet implementation controller 1 2 0 8 (shown in FIG. 1 2 A) may be based on the delay information module 1 2 16 (the information insertion delay shown in FIG. 1 2 A (eg, , the unvoiced packet or the comfort noise packet, etc.) to the incoming packet to generate the adjusted packet. The delay information includes implementing the size information provided by the delay computer 1 2 06 (shown in FIG. 3A) and the delay insertion controller 1 2 1 4 The timing information is provided. In step 1 2 3 0, the packet enforcement controller 1 2 〇 8 can implement the adjusted packet. The adjusted packet is decompressed by the decoder 1 1 1 0 and then implemented by the receiver side device 1 200. As can be appreciated from FIG. 12B, in accordance with one or more embodiments of the present invention, that is, any information received from the jitter computer 1 2 0 4, the delay insertion controller 1214 can still rely on the slave silence detector ι 212 (in steps) The silent flag received in 1226 determines the timing of the insertion delay. Fig. 13 is a receiving side device 1 3 of the packet video communication system using the adaptive jitter processing according to one or more embodiments of the present invention. Block diagram of the 〇. Receive side loading Setting 1 300 indicates at least one of a telephone, a mobile phone, a teleconference-55-200816753 device, a video phone, and a video player. Alternatively, the receiver-side device 1 300 can represent a packet communication network. The server side device 1 300 can include components that perform functions similar to those of the components of the receiver side device 1 200 shown in the example of Fig. 3A. The receiver side device 1 300 can include a packet Buffer 1 3 02, jitter computer 1 3 04, compensation controller 1314, compensation computer 1 3 06, compensation information module 1 3 1 6 , packet implementation controller 1 3 0 8 , decoder 1 3 1 0, and video One or more of the detectors 1 3 1 2. The difference is that the video detector 1 3 1 2 can be configured to detect no movement or low movement in the video packet instead of silent. In addition, the compensation computer 1 3 06. The compensation controller 1314 and the compensation information module 1316 can be configured to calculate and integrate the video compensation information to replace the information that is assembled into the calculation and integration delay insertion. The video compensation can be included in the repeated video frame. Stop playing new views at the same time Frequency frame, and can be performed by the packet implementation controller 1 3 0 8. Similar to the configuration of the receiver side device 1 2 0 0, the compensation controller 1 3 1 4 can be directly coupled to the video detection via the link 1 3 99 The timing of the video compensation is determined by the device 1 3 1 2. The video compensation control process for the jitter processing of the receiver side device 1 300 is similar to the delay insertion control process shown in the example of Fig. 12B. The or more embodiments include a receiver side device that includes a configuration similar to the configuration of the receiver side device 130, and is configured to handle a jump in multimedia communication including voice and video - 56- 200816753 Move. Additionally, one or more embodiments of the present invention may include delay insertion control and video compensation control processing similar to the delay insertion control process illustrated in the example of FIG. As can be appreciated from the above, embodiments of the present invention can effectively handle jitter in packet communications without relying on a transmitter side voice activity detector (VAD) or a fixed jitter buffer design. To delay the insertion control instead of using the receiver side silent detector only for buffer overflow control, embodiments of the present invention can accurately insert delays without the need to insert delays into the voice packets. Advantageously, the mutated speech can be reduced to ensure speech quality. Additionally, embodiments of the present invention can be used for video communications and/or multimedia communications. D. Divitas Description Protocol (DDP) One or more embodiments of the present invention include a lightweight protocol over SIP that will effectively transfer information between the server and the user and will be unaffected by the hardware and software platforms. Under work. DDP architecture; architecture DDP has been considered under the following factors: not subject to server and user software and 〇S: the structure and format of the protocol (DDP) is DDP does not know the server or mobile hardware platform and in two The operating system executed on the platform. In accordance with one or more embodiments of the present invention, the protocol is architected and designed to execute on any server or mobile hardware platform and is also not subject to the Operating System/SW platform being executed. For example, DDP can be executed on Linux, Symbian, Windows Mobile 5.0, and so on. In summary, it is not necessary to design or develop a particular adapter layer each time a module is transferred to a new hardware or software platform. -57- 200816753 Decoupling from Control Plane Agreement: DDP has been constructed to work with any control plane technology used on a particular platform (ie SIP, H.3 23, etc.). Not subject to the delivery protocol: designed to be valid when used by both UDP and TCP. If the best choice is through the transport layer, there is a random module to ensure reliability and performance levels (using ACK/NACK and windowing). Especially in environments with high packet loss, this reliable module removes the burden of higher-level applications from worrying about shipping. Smart and careless applications: DDP will be used for a wide range of applications ranging from critical control surface messages with strict on-demand requirements to applications that need to transfer large amounts of data between servers and users. The random module within the DDP enables the application to transfer files and buffers between the server and the user. The agreement also does not care about the type of application data, namely binary, this article. Service Priority Level: Ability to schedule and queue messages with different priority levels for applications with different latency and service requirements. Encryption support: Random modules within the DDP enable the server and handset to establish a secure channel at boot time, and all further DDP exchanges are encrypted to provide a secure level for applications that require encryption. This will still allow the application to exchange unencrypted messages for such applications that do not require encryption. Built-in dialog management: Has specific control messages to initiate and maintain a dialogue between the server and the user. -58 - 200816753 Not subject to media: The agreement is not subject to the media that connects users to the server. Dialogues can be via wiFi, cellular data channels, or wired Ethernet. 6A is a schematic diagram of a DDP architecture fabricated in accordance with one or more embodiments of the present invention. As shown in Fig. 6A, the DDP is a dialog layer application executed through the SIP protocol. The transmission of encrypted application layer information between the user and the server is used to influence the messaging decision to provide dialog persistence to the data application, such as email or SMTP, but is not limited thereto. Figure 6A is a high-order diagram of the different modules that make up the DDP. Different modules within a DDP in accordance with one or more embodiments of the present invention are described herein. i. DDP Message Processor: This consists of a parser and a message formatting module. The parser is responsible for checking the validity of the received DDP message and extracting various pieces of information before summoning the recycling processor.对话. Dialogue Management: A health-built institution that evaluates the health of DDP conversations between two peers, and an organization that has notified the registered application if the conversation fails. Iii. DDP Scheduler: Provides DDP messages with different priority levels depending on the application requirements. Iv. Reliable DDP Module: Support for reliable delivery of DDP messages, depending on application requirements. V· DDX (Divitas Data Transfer) Module: A module that uses DDP to transfer files and data buffers between layers. The DDX module will operate without the constraints of the file format or buffer content and will have mechanisms for error checking and shipping confirmation.

vi· DDPS: DDP中的模組,其在發信封包中插入DDP -59- 200816753 之前將DDP內容加密和解密。DDP具有用以在2 Divitas 同層之間建立安全DDP通道之協定。 圖6B爲根據本發明的一或多個實施例之當使用者登 入裝置之一時的用戶起動期間之DDP訊息的交換圖。 根據本發明的一或多個實施例,DDP是層4或應用程 式層協定。DDP可使用TCP、UDP、或TLS作爲傳送用。 類似於SIP或SDP,DDP是內容編碼的協定。根據本發明 的一或多個實施例,DDP訊息包含列或欄位的順序,其中 欄位的各列開始於表示正被運送的資訊類型之單一小寫字 母;剩下的列或欄位包含與功能或方法相關聯的資訊之片 段。根據本發明的一或多個實施例,可有多個具有相同開 始名稱或類型的列或欄位。根據本發明的一或多個實施 例,視正發送的D D P訊息之特定類型而定,各個d D P訊 息包含一組命令列或欄位和任意列或欄位。若命令列遺 失’則剖析器將拒絕D D P訊息。跳過剖析器不明白的任 意列。如此允許不同軟體版本之間的向上相容性和可交互 運作性。此處是DDP訊息的例子: v = 〇 . 〇 . 〇 . 1 o=server r = data 2 c=ext 4444 c = pref cell wifi gprs sms wka 5 cka 10 pwd 12 0 0 whys 20 chys 60 c = wifi rssilo 30 rssihi 60 chlo 30 chhi 50 -60- 200816753 c = qos delaylo 50 delayhi 10 0 losslo losshi 10 jitterlo 3 0 j itterhi 5 0 c = srv intip 1 0234 1 4444 extip- 1 3 43 245 03 2 c = end 然後添力卩 DDP 訊息當作具有”application /ddp“或” application/ddps“的訊息本體類型之SIP訊息中的 訊息本體。若需要的話,DDP本體易可與其他發送協定一 起發送。 根據本發明的一或多個實施例之DDP的示範性應用 程式將說明如下。 語音行動性:語音行動性視許多因素而定……主要的 因素是由用戶所感受到的WiFi品質。DDP被用於即時發 送具有有關手機目前所結合之AP的資訊之WiFi報告以做 出行動性決定。W i F i報告亦可任意地包含有關相鄰AP的 資訊,使得行動性伺服器可使用此資訊以依據該預測手機 的移動來進行先發制人的行動性決定。除了依據W i F i條 件自動化更新之外,DDP亦被用於使用者啓動行動性決 定。 用戶/裝置管理:將DDP延伸使用在管理手機上的用 戶和使用者經驗。此處有幾種管理用戶所使用之以DDP 爲基的控制和巨量轉移訊息之方法: a. 裝置組態:一旦已認證裝置/使用者,則在啓動期間 發送裝置特定組態到裝置。 b. 行動性臨界:依據管理者對用戶的設定之WiFi臨 200816753 界以啓動行動性活動。 C.使用者資訊:當使用者登入到用戶之一時,則伺服 器透過 DDP推送使用者特定資訊(如、分機、偏好 等)。 d·裝置影像管理;使用DDP巨量移轉能力能夠達成透 過網路連接升級手機軟體之能力。 下載到手機的語音郵件/電子郵件:Divitas解決方案 的主要差別處之一在於下載語音郵件到手機並且視你方便 時間管理它們之能力。藉由與語音郵件系統相接的優先權 控制訊息,可有管理沒有IVR的語音郵件之能力,移轉語 音郵件到手機之DDP中的巨量移轉能力也是一樣。亦可 爲能夠建立配接器模組以與選擇的電子郵件系統相接之電 子郵件系統達成類似的功能。 使用者出席管理:將具有透過不同媒體之語音和內容 的使用者偏好之D D P訊息傳遞到出席管理用的伺服器。 這是能夠支援出席提醒電話的功能之重要部分。會議電話 的架構和設計亦依據增強的出席和使用者偏好…一全部都 透過DDP傳達以提供服務會議電話被設計以提供。 即時訊息:透過DDP對話通隧用於IM的訊息。此使 手機上的IM用戶能不察覺到裝置正在操作的媒體/協定。 可參考下面的圖式和討論更加明白本發明的特徵和優 點。 圖1 4爲在應用程式用戶與應用程式伺服器之間建立 連接的電話流程之習知技術例子圖。假設手機的使用者想 -62- 200816753 要利用應用程式用戶1 404以經由HTTP (超文件傳輸協 定)連接透過網頁瀏覽器請求軟體下載1 406之情況。 在發生軟體下載1 406之前,首先必須在應用程式用 戶1 404和應用程式伺服器1 402之間建立HTTP連接。在 第一步驟1408中,應用程式用戶1404可發送TCP (傳輸 控制協定)SYN (同步化)到應用程式伺服器1 402。在下 一步驟1410中,應用程式伺服器1 402可發送TCP SYN-ACK ( TCP同步化應答)回到應用程式用戶1 404。在下一 步驟1412中,應用程式用戶1404可發送TCP ACK到應 用程式伺服器1 402。 一旦已在應用程式用戶1 404與應用程式伺服器1402 之間建立HTTP連接,則在下一步驟1414中,應用程式 用戶1404可發送HTTP Get到應用程式伺服器1 402。換 言之,在步驟1414中,應用程式用戶1404正發送使用者 對軟體下載1 406的請求到應用程式伺服器1 402。 當接收到HTTP Get時,在下一步驟1416中,應用程 式伺服器1402可執行搜尋以找出所請求的下載。 在下一步驟1 4 1 8中,一旦已找出軟體,則應用程式 伺服器1 402可開始發送所請求的軟體當作資料封包 (如、TCP資料區段)到應用程式用戶1 404。在發送所請 求的軟體檔案時,可將軟體檔案分成複數資料封包,以幫 助經由網路處理發送軟體檔案。 在下一步驟1 420中,當接收到TCP資料區段時,應 用程式用戶1 404可發送TCP ACK到應用程式伺服器 -63- 200816753 1 402 ° 可在由應用程式伺服器1 402發送所請求的軟 之所有資料封包到應用程式用戶1 404之前,重 1418 及 1420 。 一旦已發送所有TCP資料區段,則在下一步馬 中,應用程式伺服器1 402可發送HTTP 200 OK到 式用戶1 404。在發送HTTP 200 OK時,應用程式 14 02通知應用程式用戶1 404已發送有關軟體下載 所有資料封包。 一旦應用程式用戶1 404已接收到各個資料封 應用程式用戶1 404可發送通知1 424給使用者,告 者已完成下載。 就手機上的各個應用程式用戶而言,必須由各 程式用戶執行圖1的電話流程中所說明之方法。如 手機包括多個應用程式用戶(如、視頻應用程式用 音應用程式用戶、即時訊息應用程式用戶、遊戲應 用戶、虛擬實境應用程式用戶等),則在應用程式 應用程式伺服器之間的互動開始之前,必須在各個 式用戶與其對應的應用程式伺服器之間建立獨立通 於用戶上執行多個應用程式,所以無法保證不同應 之間的通訊。結果,特定用戶上執行的應用程式未 到在同一用戶上的另一應用程式正發生資料交換。 此外,圖1所說明的方法是種麻煩的方法,其 戶上的各個應用程式適當組配以確保應用程式能夠 體下載 複步驟 I 1422 應用程 伺服器 請求的 包,則 知使用 個應用 此,若 戶、語 用程式 用戶與 應用程 道。由 用程式 能注意 需要用 成功地 -64- 200816753 與企業內的指定伺服器上之其對應的應用程式互動。由於 在用戶和伺服器之間通訊的各個應用程式需要分開的網路 對話,所以此方法產生安全性風險並且增加複雜性。 在本發明的一觀點中,在此處,本發明人實現可利用 不受硬體(如、手機)及軟體(如、視頻應用程式用戶、 語音應用程式用戶、即時訊息應用程式用戶、遊戲應用程 式用戶、虛擬實境應用程式用戶等)支配之單一協定統合 所有的應用程式網路對話。換言之,本發明人實現應用程 式用戶無須與其對應的應用程式伺服器建立多個網路對 話。取而代之的是,可利用現存的控制和傳輸協定實施協 定,且協定是獨立於軟體和硬體之外,藉以使複數應用程 式用戶能夠與其對應的複數應用程式伺服器互動。 根據本發明的實施例,藉由實施Divitas描述協定 (DDP )提供行動性架構配置。在一實施例中,DDP包括 DDP用戶和DDP伺服器。本發明的實施例使DDP能夠在 手機上的複數應用程式用戶與企業內的複數應用程式伺服 器之間有效地傳輸資料封包。本發明的實施例又使DDP 能夠在不受硬體及軟體平台的支配之下加以實施。 在本發明的實施例中,DDP不受硬體平台的支配。如 此,可在雙模式手機、個人數位助理(PDAs) 、802.11 電話等上實施DDP。在本發明的實施例中,DDP亦不受軟 體平台的支配。結果,可在Linux®系統、Symbian®系統、 Window TM Mobile 5.0 系統上執行 DDP。 在習知技術中,多個網路對話的建立需要在用戶和伺 -65- 200816753 服器之間建立多個通道。換言之,必須在企業的防 內”刺穿“複數個”洞“以使複數應用程式用戶能夠與其 的應用程式伺服器互動。在本發明的實施例中,可 DDP以建立可實施手機上的應用程式用戶與企業內的 程式伺服器之間的互動之單一安全通道。 憑藉可交換複數資料流量的單一安全通道,可由 程式用戶管理下載到手機上的資訊。如此,需要利用 載的資訊之應用程式用戶不必請求再次下載資料。取 之的是,具有DDP的行動性用戶能夠引導應用程式 到所請求的資料之儲存位置。 在本發明的實施例中,D D P可不受網路支配。在 子中,DDP所建立的安全通道可例如經由Wi_Fi網路 巢式資料網路。當用戶裝置上的使用者漫遊時,此使 能夠確保網路對話傳送到分開的網路。 在一實施例中,DDP建立在控制協定和傳輸協定 層。在一實施例中,可利用任何可用到的控制協定( SIP、H. 3 23等)實施DDP。在另一實施例中,可利用 使用者資料元協定(UDP )、傳輸控制協定(TCP ) 傳輸層安全協定(TLS )等任何可利用到的傳輸協定 DDP。如此,DDP能夠有效地路由資料封包和管理連 而不必關心可利用的控制及/或傳輸協定。 在本發明的實施例中,DDP可包括可靠性 (RDDP ),該模組確保遞送資料流量的可靠性位準 利用不提供可靠性之諸如UDP等傳輸協定時使用 火牆 對應 實施 應用 應用 已下 而代 用戶 一例 或蜂 DDP 的上 如、 諸如 、或 實施 接性 模組 。當 此模 -66- 200816753 組。如此,DDP可提供成功傳輸的保證並且解除監視來自 應用程式用戶的資料流量之負擔。 在本發明的實施例中,可爲複數應用程式(即、應用 程式用戶和其對應的應用程式伺服器)實施DDP。在一例 子中,可由不需要即時交換資料的簡易應用程式利用 DDP。在另一例子中,可由具有即時資料交換要求之應用 程式利用D D P。由於D D P的可調整性,可添加或去除應 用程式卻不會影響DDP的能力和多樣性。 在本發明的實施例中,DDP包括可被組配成排程和佇 列資料流量之優先權訊息排程模組。DDP可利用該優先權 訊息排程模組將複數應用程式需要或要求的複數下載和上 載自動化。 參考下面的圖式和討論可更加明白本發明的特徵和優 點。 圖1 5爲本發明的實施例中之D D P發明的簡易架構 圖。在本發明的實施例中,DDP 1536不受硬體及/或軟體 平台的支配。在一例子中,可將DDP 1 5 3 6實施在複數用 戶裝置上,包括雙模式手機、PDAs、膝上型電腦等,但並 不侷限於此。在另一例子中,可與諸如Linux®系統、 Symbian®系統、Window TM Mobile 5.0系統等不同的操作 系統一起實施D D P 1 5 3 6。結果,利用最小的修改,可將 DDP 1536載入到不同的硬體及/或軟體平台上。 DDP 1 5 3 6可建立在控制協定和傳輸協定的最上層。 在一例子中,可與不同控制協定類型(如、s IP 1 5 3 2和另 -67- 200816753 一控制協定1 524 )和不同的傳輸協定類型(如、UDP 1534、UDP 1528、TCP 1530、TCP 1526 等)一起使用 DDP 1536。可爲了執行DDP 1536的功能而由DDP 1536 利用之控制協定及/或傳輸協定的類型可容易由DDP適 應。如此,若控制協定及/或傳輸協定改變,貝ij DDP 1536 將視需要使本身能夠利用可用到的傳輸和控制協定之任何 組合。需注意的是,控制協定及/或傳輸協定的改變不影 響應用層,應用層包括語音行動性控制應用程式用戶 1 5 06、裝置管理應用程式15〇4、企畫管理應用程式 1 502、語音郵件/電子郵件傳輸應用程式1 5 08、裝置影像 管理應用程式1 5 1 0、即時訊息應用程式1 5 1 2等,但並不 侷限於此。 此外,在一實施例中,DDP 1 5 3 6能夠決定提供最佳 的性能和可靠性之較佳的傳輸協定。如此,辨識正確的傳 輸協定責任可從複數應用程式集中和移動到DDP 1 5 3 6。 因爲DDP用戶和伺服器之間的所有資料流量現在都由 DDP 1 5 3 6處理,所以DDP 1 5 3 6能夠在最小化資料封包損 失的同時決定路由資料流量的最佳傳輸協定。 在一實施例中,DDP 1 5 3 6可包括一或多個模組,諸 如具有安全延伸的DDP模組(DDPS模組1 522 )、優先權 訊息排程模組 1518、可靠 DDP模組(RDDP模組 1516)、內建對話管理模組1 520、及Divitas資料交換模 組(DDX 模組 1514 )。 在一實施例中,DDPS模組1 5 22可提供安全功能給 -68- 200816753 DDP 1536。在一例子中,DDPS模組1522可使安全通道 能夠建立在手機的行動性用戶和企業內的行動性伺服器之 間。憑藉安全通道’可經由單一安全通道路由來自複數應 用程式之所有進來和出去的資料流量。 在某些情況中,在應用程式用戶能夠與其對應的應用 程式伺服器互動之前必須發生個別認證。不像習知技術一 般,認證處理可以自動化。在一實施例中,DDPS模組 1 5 2 2可包括資料庫,該資料庫包括在應用程式用戶和應用 程式伺服器之間建立連接所需的認證資料。 在本發明的實施例中,DDPS模組1 522可提供加密/ 解密功能,如此使DDP 1 5 3 6能夠提供安全給需要該功能 的應用程式在一例子中,從電子郵件伺服器路由來自應用 程式用戶1 5 0 8的重要電子郵件到手機上的電子郵件應用 程式用戶。爲了確保電子郵件的安全性’在發送封包到對 應的應用程式伺服器之前,DDPS模組1 522可將資料封包 加密。在另一例子中,可以非安全方法發送兩IM用戶之 間的即時訊息。如此,DDP 1 5 3 6可路由即時訊息,卻不 必利用DDPS模組1 5 22加密發送於IM用戶之間的資料封 包。 在本發明的實施例中,D D P 1 5 3 6可包括優先權訊息 排程模組1 5 1 8,該模組1 5 1 8可被組配成排程和佇列資料 封包。換言之,優先權訊息排程模組1518負責管理DDP 1 5 3 6所服務之複數不同的資料封包。在一實施例中,優先 權訊息排程模組1 5 1 8可建立處理進來和出去的資料封包 -69- 200816753 之政策。在一實施例中,優先權訊息排程模組1 5 1 8視發 源的應用程式而定,可具有不同的優先權位準。在一例子 中,應用程式A (如、電子郵件)不要求即時遞送棋資料 封包。然而,應用程式B (如、出席管理)對時間延遲相 當敏感,需要即時遞送資料封包。在一實施例中,優先權 訊息排程模組1518可以是任意的DDP模組。在一例子 中,若DDP 1 5 3 6目前只爲一應用程式處理資料流量,則 DDP 1 5 3 6不必利用優先權訊息排程模組1518處理資料封 包的排程。 在本發明的實施例中,DDP 1 5 3 6可包括可靠模組 (RDDP 15 16 ),其可提供運送複數資料封包之一定位準 的保證。在一實施例中,爲了擔保運送,RDDP 1516具有 重傳在特定時間間隔內未成功到達它們的目的地之封包的 機構。在一實施例中,若在預設的時間間隔內未接收到資 料封包,則將重傳封包。在通知應用程式封包的傳輸已失 敗之前可重傳封包特定次數。憑藉RDDP 1516,DDP 1536 可提供以應用程式需要的次序發送及/或接收資料封包之 保證。 在一實施例中,DDP 1 5 3 6可包括DDX模組1514,其 可被用於在行動性用戶和行動性伺服器之間傳輸大量資料 (如、影像檔案、日誌檔案等)。在實施例中,DDX模組 1 5 1 4包括確保行動性用戶和行動性伺服器之間的資料傳輸 之資料完整性的機構。在本發明的另一實施例中,DDX模 組1 5 1 4可包括用以確認完成資料傳輸到應用程式之機 -70- 200816753 構。 在本發明的實施例中,可爲複數應用程式實施DDP 1 5 3 6,複數應用程式包括語音行動性控制應用程式1 5 06、 裝置管理應用程式1 504、企畫管理應用程式1 502、語音 郵件/電子郵件傳輸應用程式1 5 08、裝置影像管理應用程 式1 5 1 0、即時訊息應用程式1 5 1 2等,但並不侷限於此。 在本發明的實施例中,複數應用程式可被分成兩群。 在第一群中,複數應用程式(如、語音郵件/電子郵 件傳輸應用程式1 5 0 8、裝置影像管理應用程式1 5 1 0、即 時訊息應用程式1 5 1 2等)是容易發送較大檔案的應用程 式,如此DDP 1 5 3 6可利用DDX模組1514將檔案轉換成 能夠利用包括1 5 1 6、1 5 1 8、1 5 2 2之D D P 1 5 3 6內的任何其 他模組之較小的資料封包,並且提供已成功傳輸資料檔案 並且通知應用程式有關已完成的傳輸之保證。 在第二群中,複數應用程式(語音行動性控制應用程 式1506、裝置管理應用程式15 04、企畫管理應用程式 1 5 02等)通常是容易發送較小控制訊息的應用程式。通 常,第二群中的應用程式傾向是控制應用程式。在一例子 中,語音行動性控制器 1 5 0 6可使行動性用戶和行動性伺 服器能夠共用可以單一 DDP封包發送之行動性狀態。 •圖1 6A爲在一實施例中之具有DDP的行動性架構配 置內之資料如何在在位在用戶裝置內的應用程式用戶與企 業所管理的應用程式伺服器之間流動的例子圖。假設用戶 裝置上的使用者想要利用語音郵件用戶1 6 0 2檢索來自語 -71 - 200816753 音郵件伺服器1 6 0 4的語音郵件之情況。 當接收到來自應用程式用戶1 6 02的請求時,語音郵 件伺服器1 604可啓動檔案轉移。語音郵件伺服器1 604可 沿著路徑1 65 0發送檔案。當接收到檔案時,行動性伺服 器可經由安全通道準備欲發送檔案到用戶裝置上的行動性 用戶。 在一實施例中,行動性伺服器內的伺服器DDX模組 1 608可被用於將檔案轉換成與安全通道的控制和傳輸協定 相容之格式。在一例子中,伺服器D D X模組1 6 0 8可將雙 格式的檔案轉換成透過SIP協定可傳輸的格式。再者,伺 服器DDX模組1 608可將檔案分成複數資料封包,以確保 經由安全通道路由複數資料封包之有效性。 在完成啓動處理之後,伺服器DDX模組1 608可發送 第一資料封包到伺服器DDP 1 6 1 6。在一實施例中,伺服 器DDP 1616可包括是應用程式所需將資料封包加密之 D DPS模組。在一例子中,無須加密即可發送簡易資料封 包(如、即時訊息)。在另一例子中,可在路由到請求者 之前將重要的資料封包(如、機密電子郵件)加密。 從伺服器DDP 1616出來,第一資料封包可被封裝作 SIP通知訊息(如圖16B的碼例子3 70所示),並且經由 網路1 624透過安全通道發送到用戶裝置。在一例子中, 可藉由使用伺服器SIP控制協定1 620和伺服器UDP傳輸 協定1622且經由安全通道發送第一資料封包。由可經由 用戶UDP傳輸協定1 626和用戶SIP控制協定1 628接收 -72- 200816753 到資料封包之用戶裝置的行動性用戶安全地接收到第一資 料封包。 在行動性用戶內,用戶 D D P 1 6 3 2可接收第一資料封 包。用戶RDDP 1 634可執行與伺服器RDDP 1614所執行 的類似檢查。再者,用戶RD D P 1 6 3 4可沿著路徑1 6 5 2經 由安全通道發送具有DDP應答的SIP通知訊息到伺服器 DDX模組1608。藉由發送DDP應答,用戶RDDP 1634可 從行動性用戶發送保證到已接收到資料封包的行動性伺服 器。同樣地,若伺服器RDDP模組1614未接收到RDDP 應答’則伺服器RDDP模組1614將重傳資料封包,直到 已成功應答封包或耗盡重試的最大數目爲止。 在一實施例中,將發送資料封包且在已接收到DDP 應答之前,不發送下一資料封包。在一例子中,在已接收 到D D P應答之前,伺服器D d X模組1 6 0 8不發送第二資 料封包。在另一實施例中,可發送固定的資料封包數目, 及在已爲一或多個最初資料封包接收到應答之前,不發送 額外封包。在一例子中,伺服器D D X模組1 6 〇 8可發送一 群1 0資料封包,及在能夠傳輸額外資料封包之前,在至 少接收到一應答前需要等待。 一旦行動性用戶已發送DDP應答到行動性伺服器, 則將路由資料封包到用戶D D X模組1 6 3 6。在一例子中, 在已接收到所有資料封包之前,用戶DDX模組1 63 6可保 留資料封包。在一實施例中,伺服器DDX模組ι 60 8可發 送指出已發送所請求的檔案之各個資料封包並且沒有額外 -73- 200816753 的檔案資料封包即將到來之訊息。一旦已接收到所有資$ 封包,則用戶DDX模組1 63 6將重組檔案,且通知語音郵 件用戶1 602可利用語音郵件檔案。 如從圖15及16可見一般,DDP的架構可提供複數應 用程式用戶與複數應用程式伺服器互動的單一安全通道。 藉由具有流經單一安全通道的資料流量,DDP的架構可籍 由保證接收到資料封包、已進行核實以便得知已接收到戶斤 有資料封包、並且沒有損失的資料封包以提供控制。在^ 例子中,DDP的架構可使大的檔案被分成較小的資料封 包,這些較小的資料封包可利用由接收側接收應答的保言g 加以發送。 圖1 7爲在本發明的實施例中之如何在用戶裝置和行 動性伺服器之間建立安全通道的電話流程之例子圖。在一 實施例中,爲了建立安全通道,發生註冊。假設使用者第 一次啓動用戶裝置的情況。Vi· DDPS: A module in DDP that encrypts and decrypts DDP content before inserting DDP-59-200816753 into the envelope package. DDP has a protocol to establish a secure DDP tunnel between 2 Divitas peers. Figure 6B is an exchange diagram of DDP messages during user activation when a user logs into one of the devices in accordance with one or more embodiments of the present invention. In accordance with one or more embodiments of the invention, the DDP is a layer 4 or application layer protocol. DDP can use TCP, UDP, or TLS for transmission. Similar to SIP or SDP, DDP is a protocol for content encoding. In accordance with one or more embodiments of the present invention, the DDP message includes an order of columns or fields, wherein the columns of the field begin with a single lowercase letter indicating the type of information being shipped; the remaining columns or fields contain and A fragment of information associated with a function or method. In accordance with one or more embodiments of the invention, there may be multiple columns or fields having the same starting name or type. In accordance with one or more embodiments of the present invention, depending on the particular type of D D P message being transmitted, each d D P message contains a set of command columns or fields and any columns or fields. If the command line is missing, the parser will reject the D D P message. Skip any column that the parser does not understand. This allows for upward compatibility and interoperability between different software versions. Here is an example of a DDP message: v = 〇. 〇. 〇. 1 o=server r = data 2 c=ext 4444 c = pref cell wifi gprs sms wka 5 cka 10 pwd 12 0 0 whys 20 chys 60 c = wifi Rssilo 30 rssihi 60 chlo 30 chhi 50 -60- 200816753 c = qos delaylo 50 delayhi 10 0 losslo losshi 10 jitterlo 3 0 j itterhi 5 0 c = srv intip 1 0234 1 4444 extip- 1 3 43 245 03 2 c = end Then Add the DDP message as the message body in the SIP message with the message body type of "application /ddp" or "application/ddps". If required, the DDP body can be sent with other delivery protocols. An exemplary application of the DDP in accordance with one or more embodiments of the present invention will be described below. Voice Mobility: Voice mobility depends on many factors... The main factor is the WiFi quality perceived by the user. The DDP is used to instantly send a WiFi report with information about the AP currently associated with the handset to make an operational decision. The W i F i report can also optionally contain information about neighboring APs so that the mobile server can use this information to make pre-emptive action decisions based on the predicted mobile phone movement. In addition to automating updates based on W i F i conditions, DDP is also used by users to initiate action decisions. User/Device Management: Extend DDP to the user and user experience on managing mobile phones. There are several ways to manage DDP-based controls and massive transfer messages used by users: a. Device configuration: Once the device/user has been authenticated, the device-specific configuration is sent to the device during startup. b. Mobility Critical: Based on the administrator's setting of the user's WiFi Pro 200816753 to initiate an active activity. C. User Information: When the user logs in to one of the users, the server pushes the user-specific information (eg, extension, preferences, etc.) through the DDP. d·Device image management; using DDP's massive transfer capability to achieve the ability to upgrade mobile software over a network connection. Download voicemail/email to your phone: One of the main differences between Divitas solutions is the ability to download voicemails to your phone and manage them as you need them. With the priority control message connected to the voice mail system, there is the ability to manage voice mail without IVR, and the same is true for the huge transfer capability of transferring the voice mail to the DDP of the mobile phone. It can also perform similar functions for an e-mail system that can establish an adapter module to interface with a selected e-mail system. User attendance management: A D D P message with user preferences through voice and content of different media is delivered to the attendance management server. This is an important part of the ability to support attendance calls. The structure and design of the conference call is also based on enhanced attendance and user preferences... all delivered through DDP to provide service conference calls are designed to be provided. Instant messaging: Messages for IM through the DDP session. This allows the IM user on the handset to be unaware of the media/agreement that the device is operating on. Features and advantages of the present invention will become more apparent from the following description and discussion. Figure 14 is a diagram showing an example of a conventional technique for establishing a connection between an application user and an application server. Assume that the user of the mobile phone wants to use the application user 1 404 to request the software download 1 406 via the web browser via the HTTP (Super File Transfer Protocol) connection. Before the software download 1 406 occurs, an HTTP connection must first be established between the application user 1 404 and the application server 1 402. In a first step 1408, the application user 1404 can send a TCP (Transmission Control Protocol) SYN (synchronized) to the application server 1 402. In the next step 1410, the application server 1 402 can send a TCP SYN-ACK (TCP synchronization response) back to the application user 1 404. In the next step 1412, the application user 1404 can send a TCP ACK to the application server 1 402. Once an HTTP connection has been established between application user 1 404 and application server 1402, then in next step 1414, application user 1404 can send HTTP Get to application server 1 402. In other words, in step 1414, the application user 1404 is sending a user request for software download 1 406 to the application server 1 402. Upon receiving HTTP Get, in a next step 1416, the application server 1402 can perform a search to find the requested download. In the next step 1 4 18, once the software has been found, the application server 1 402 can begin sending the requested software as a data packet (e.g., a TCP data section) to the application user 1 404. When the requested software file is sent, the software file can be divided into multiple data packets to help send the software file via the network. In the next step 1 420, when receiving the TCP data section, the application user 1 404 can send a TCP ACK to the application server -63-200816753 1 402 °. The requested request can be sent by the application server 1 402. All data packets are soft before the application user 1 404, weighing 1418 and 1420. Once all TCP data segments have been sent, in the next step, the application server 1 402 can send an HTTP 200 OK to the user 1 404. When sending an HTTP 200 OK, the application 14 02 notifies the application user 1 404 that the software package has been sent to download all the data packets. Once the application user 1 404 has received the individual data package, the application user 1 404 can send a notification 1 424 to the user, and the advertiser has completed the download. For each application user on the mobile phone, the method described in the telephone flow of Figure 1 must be performed by each program user. If the mobile phone includes multiple application users (eg, video application audio application users, instant messaging application users, game application users, virtual reality application users, etc.), between the application application servers Before the interaction begins, multiple applications must be executed independently between the various users and their corresponding application servers, so communication between different applications cannot be guaranteed. As a result, the application executing on a particular user is not being exchanged for data with another application on the same user. In addition, the method illustrated in FIG. 1 is a cumbersome method in which each application on the home is appropriately configured to ensure that the application can download the packet requested by the application server in step I 1422, and it is known to use the application. If you are a user, a language user and an application. The application can be used to successfully interact with the corresponding application on the specified server in the enterprise -64- 200816753. Since each application that communicates between the user and the server requires a separate network conversation, this approach creates a security risk and adds complexity. In one aspect of the present invention, the inventors herein are enabled to utilize hardware (eg, mobile phones) and software (eg, video application users, voice application users, instant messaging application users, game applications). The single agreement governed by program users, virtual reality application users, etc., integrates all application web conversations. In other words, the inventor realizes that the application user does not need to establish a plurality of network conversations with the corresponding application server. Instead, the existing control and transport protocols can be used to implement the protocol, and the protocol is independent of the software and hardware so that multiple application users can interact with their corresponding multiple application servers. In accordance with an embodiment of the present invention, an operational architecture configuration is provided by implementing a Divitas Description Protocol (DDP). In an embodiment, the DDP includes a DDP user and a DDP server. Embodiments of the present invention enable DDP to efficiently transfer data packets between a plurality of application users on a mobile phone and a plurality of application servers within the enterprise. Embodiments of the present invention in turn enable DDP to be implemented without being dominated by hardware and software platforms. In an embodiment of the invention, the DDP is not subject to the hardware platform. As such, DDP can be implemented on dual mode handsets, personal digital assistants (PDAs), 802.11 phones, and the like. In an embodiment of the invention, the DDP is also not subject to the software platform. As a result, DDP can be executed on Linux® systems, Symbian® systems, and Window TM Mobile 5.0 systems. In the prior art, the establishment of multiple network conversations requires establishing multiple channels between the user and the server. In other words, multiple “holes” must be “pierced” within the enterprise's defense to enable multiple application users to interact with their application servers. In an embodiment of the invention, the DDP can be used to establish a single secure channel that enables interaction between application users on the handset and a program server within the enterprise. With a single secure channel that exchanges multiple data traffic, program users can manage the information downloaded to the phone. In this way, application users who need to use the loaded information do not have to request to download the data again. In this case, an active user with DDP can direct the application to the location where the requested data is stored. In an embodiment of the invention, D D P may be unaffected by the network. In the sub-network, the secure channel established by the DDP can be, for example, via a Wi_Fi network nested data network. This enables the network conversation to be transmitted to a separate network when the user on the user device roams. In an embodiment, the DDP is established at the control protocol and transport protocol layer. In an embodiment, the DDP can be implemented using any available control protocol (SIP, H. 3 23, etc.). In another embodiment, any available transport protocol DDP, such as User Data Element Agreement (UDP), Transmission Control Protocol (TCP) Transport Layer Security (TLS), may be utilized. As such, DDP can efficiently route data packets and manage connections without having to care about the available control and/or transport protocols. In an embodiment of the present invention, the DDP may include reliability (RDDP), which ensures that the reliability level of the delivery data flow utilizes a transmission protocol such as UDP that does not provide reliability, and the use of the fire wall corresponds to the implementation of the application application. An example of a user or a DDP, such as, or a connection module. When this model is -66- 200816753 group. As such, DDP provides a guarantee of successful transmission and relieves the burden of data traffic from application users. In an embodiment of the invention, DDP can be implemented for a plurality of applications (i.e., application users and their corresponding application servers). In an example, DDP can be utilized by a simple application that does not require instant exchange of data. In another example, DD P may be utilized by an application having an instant data exchange requirement. Due to the adjustability of D D P, applications can be added or removed without affecting the power and diversity of DDP. In an embodiment of the invention, the DDP includes a priority message scheduling module that can be configured to schedule and queue data traffic. DDP can use the priority message scheduling module to automate the download and upload of multiple applications required or required by multiple applications. Features and advantages of the present invention will become more apparent from the following description and discussion. Figure 15 is a simplified architectural diagram of the D D P invention in an embodiment of the present invention. In an embodiment of the invention, the DDP 1536 is not subject to hardware and/or software platforms. In one example, DDP 1 5 3 6 can be implemented on a plurality of user devices, including dual mode handsets, PDAs, laptops, etc., but is not limited thereto. In another example, D D P 1 5 3 6 can be implemented with different operating systems such as Linux® systems, Symbian® systems, WindowTM Mobile 5.0 systems, and the like. As a result, the DDP 1536 can be loaded onto different hardware and/or software platforms with minimal modifications. DDP 1 5 3 6 can be built on top of control agreements and transport protocols. In an example, different types of control agreements (eg, s IP 1 5 3 2 and another -67-200816753-control agreement 1 524) and different transport protocol types (eg, UDP 1534, UDP 1528, TCP 1530, TCP 1526, etc.) Use DDP 1536 together. The type of control protocol and/or transport protocol that can be utilized by DDP 1536 to perform the functions of DDP 1536 can be readily adapted by DDP. Thus, if the control agreement and/or transport protocol changes, Bay ij DDP 1536 will be able to utilize itself any combination of available transport and control protocols as needed. It should be noted that the change of the control protocol and/or the transport protocol does not affect the application layer. The application layer includes the voice mobility control application user 1 5 06, the device management application 15〇4, the plan management application 1 502, and the voice. Mail/email transmission application 1 5 08, device image management application 1 5 1 0, instant messaging application 1 5 1 2, etc., but not limited to this. Moreover, in an embodiment, DDP 1 5 3 6 can determine a preferred transport protocol that provides optimal performance and reliability. In this way, the responsibility for identifying the correct transport agreement can be centralized and moved from the complex application to DDP 1 5 3 6 . Because all data traffic between the DDP user and the server is now handled by DDP 1 5 3 6 , DDP 1 5 3 6 can determine the optimal transport protocol for routing data traffic while minimizing data packet loss. In an embodiment, the DDP 1 5 3 6 may include one or more modules, such as a DDP module with secure extension (DDPS module 1 522), a priority message scheduling module 1518, and a reliable DDP module ( The RDDP module 1516), the built-in dialog management module 1 520, and the Divitas data exchange module (DDX module 1514). In one embodiment, the DDPS module 1 52 can provide a security function to the -68-200816753 DDP 1536. In one example, the DDPS module 1522 enables a secure channel to be established between the mobile user of the mobile phone and the mobile server within the enterprise. With Secure Channel, all incoming and outgoing data traffic from multiple applications can be routed through a single secure channel. In some cases, individual authentication must occur before an application user can interact with their corresponding application server. Unlike conventional techniques, authentication processing can be automated. In one embodiment, the DDPS module 1 52 2 2 may include a database that includes authentication data required to establish a connection between the application user and the application server. In an embodiment of the invention, the DDPS module 1 522 can provide encryption/decryption functions, thus enabling the DDP 1 5 3 6 to provide security to applications that require this functionality, in an example, routing from an email server from an application. The program user 1 5 0 8 important email to the email application user on the phone. To ensure the security of the email DDPS module 1 522 can encrypt the data packet before sending the packet to the corresponding application server. In another example, an instant message between two IM users can be sent in a non-secure manner. In this way, DDP 1 5 3 6 can route instant messages without having to use DDPS module 1 5 22 to encrypt the data packets sent between IM users. In an embodiment of the present invention, D D P 1 5 3 6 may include a priority message scheduling module 1 5 1 8 , and the module 1 5 1 8 may be configured into a schedule and queue data package. In other words, the priority message scheduling module 1518 is responsible for managing a plurality of different data packets served by the DDP 1 5 3 6 . In one embodiment, the priority message scheduling module 1 158 can establish policies for processing incoming and outgoing data packets -69-200816753. In one embodiment, the priority message scheduling module 1 158 may have different priority levels depending on the application of the source. In one example, application A (e.g., email) does not require immediate delivery of a chess data packet. However, application B (eg, attendance management) is quite sensitive to time delays and requires immediate delivery of data packets. In an embodiment, the priority message scheduling module 1518 can be any DDP module. In one example, if DDP 1 5 3 6 currently only processes data traffic for an application, DDP 1 5 3 6 does not have to use priority message scheduling module 1518 to process the schedule of the data packets. In an embodiment of the invention, the DDP 1 5 3 6 may include a reliable module (RDDP 15 16 ) that provides assurance of the positioning of one of the plurality of data packets. In one embodiment, to warrant shipment, the RDDP 1516 has a mechanism to retransmit packets that have not successfully reached their destination within a particular time interval. In an embodiment, if the data packet is not received within a preset time interval, the packet is retransmitted. The packet can be retransmitted a certain number of times before the transmission of the notification application packet has failed. With the RDDP 1516, the DDP 1536 provides the assurance that data packets are sent and/or received in the order required by the application. In one embodiment, DDP 1 5 3 6 may include a DDX module 1514 that can be used to transfer large amounts of data (e.g., image files, log files, etc.) between the mobile user and the mobile server. In an embodiment, the DDX module 1 51 includes a mechanism for ensuring data integrity of data transmission between the mobile user and the mobile server. In another embodiment of the present invention, the DDX module 1 51 may include a mechanism for confirming completion of data transfer to the application -70-200816753. In an embodiment of the present invention, DDP 1 5 3 6 can be implemented for a plurality of applications, and the plurality of applications include a voice mobility control application 1 5 06, a device management application 1 504, a plan management application 1 502, and a voice. Mail/email transmission application 1 5 08, device image management application 1 5 1 0, instant messaging application 1 5 1 2, etc., but not limited to this. In an embodiment of the invention, the plurality of applications can be divided into two groups. In the first group, multiple applications (eg, voicemail/email transmission application 158, device image management application 1 5 1 0, instant messaging application 1 5 1 2, etc.) are easy to send larger The file application, so DDP 1 5 3 6 can use DDX module 1514 to convert the file into any other module that can utilize DDP 1 5 3 6 including 1 5 1 6 , 1 5 1 8 , 1 5 2 2 The smaller data packet and the guarantee that the data file has been successfully transferred and the application is notified about the completed transmission. In the second group, the plurality of applications (voice mobility control application 1506, device management application 15 04, planning management application 1 5 02, etc.) are usually applications that are easy to send smaller control messages. Often, the application in the second group tends to control the application. In one example, voice mobility controller 160 can enable mobile users and mobile servers to share an active state that can be sent by a single DDP packet. Figure 16A is a diagram showing an example of how data within a mobile architecture configuration with DDP flows between an application user in a user device and an application server managed by the enterprise in one embodiment. Assume that the user on the user device wants to use the voice mail user 1206 to retrieve the voice mail from the -71 - 200816753 audio mail server 1604. Upon receiving a request from the application user 162, the voicemail server 1604 can initiate a file transfer. Voicemail server 1 604 can send the file along path 1 65 0. When a file is received, the mobile server can prepare an active user to send the file to the user device via a secure channel. In one embodiment, the server DDX module 1 608 within the mobile server can be used to convert the file into a format compatible with the control and transport protocols of the secure channel. In one example, the server D D X module 1680 can convert a dual format file into a format that can be transmitted via the SIP protocol. Furthermore, the servo DDX module 1 608 can divide the file into multiple data packets to ensure the validity of routing the plurality of data packets via the secure channel. After completing the boot process, the server DDX module 1 608 can send the first data packet to the server DDP 1 6 16 . In one embodiment, the server DDP 1616 can include a D DPS module that is required by the application to encrypt the data packet. In one example, a simple data package (e.g., an instant message) can be sent without encryption. In another example, important data packets (e.g., confidential email) can be encrypted before being routed to the requester. From the server DDP 1616, the first data packet can be encapsulated as a SIP notification message (as shown in code example 370 of Figure 16B) and transmitted to the user device via the secure channel via network 1 624. In one example, the first data packet can be transmitted via the secure channel by using the server SIP Control Protocol 1 620 and the Server UDP Transport Protocol 1622. The first user packet is securely received by the mobile user of the user device that can receive the data packet from -72-200816753 via the User UDP Transport Protocol 1 626 and the User SIP Control Protocol 1 628. Within the mobile user, the user D D P 1 6 3 2 can receive the first data packet. User RDDP 1 634 can perform a similar check as performed by server RDDP 1614. Furthermore, the user RD D P 1 6 3 4 can send a SIP notification message with a DDP answer to the server DDX module 1608 via the secure channel along the path 1 6 5 2 . By transmitting a DDP answer, the user RDDP 1634 can send a guarantee from the mobile user to the mobile server that has received the data packet. Similarly, if the server RDDP module 1614 does not receive an RDDP response, then the server RDDP module 1614 will retransmit the data packet until the maximum number of packets has been successfully acknowledged or the retry has been exhausted. In an embodiment, the data packet will be sent and the next data packet will not be sent until a DDP response has been received. In one example, the server D d X module 1680 does not send the second data packet until the D D P response has been received. In another embodiment, the number of fixed data packets can be sent, and no additional packets are sent until a response has been received for one or more of the original data packets. In one example, the server D D X module 1 6 〇 8 can send a group of 10 data packets and wait until at least one response is received before being able to transmit additional data packets. Once the mobile user has sent a DDP reply to the mobile server, the routing data is encapsulated to the user D D X module 1 6 3 6 . In one example, the user DDX module 1 63 6 may retain the data packet before all data packets have been received. In one embodiment, the server DDX module ι 60 8 may send a message indicating that the requested file has been sent and there is no additional -73-200816753 file data packet to be sent. Once all of the funds have been received, the user DDX module 1 63 6 will reorganize the file and notify the voice mail user 1 602 that the voice mail profile can be utilized. As can be seen from Figures 15 and 16, the DDP architecture provides a single secure channel for multiple application users to interact with multiple application servers. By having data traffic through a single secure channel, the DDP architecture can provide control by ensuring that data packets are received, verified to be known, and that there are no data packets received. In the example, the DDP architecture allows large files to be divided into smaller data packets, which can be sent using the guarantee g received by the receiving side. Figure 17 is a diagram showing an example of a telephone flow for establishing a secure channel between a user device and an activity server in an embodiment of the present invention. In one embodiment, registration is initiated in order to establish a secure channel. Assume that the user first starts the user device.

在第一步驟1 724中,首先必須建立SIP註冊。在一 例子中,用戶SIP 1716可經由伺服器UDP 1714發送SIP 註冊請求。可經由伺服器UDP 1712以伺服器SIP 1710接 收SIP註冊請求。 當接收到SIP註冊請求時,伺服器SIP 1710可透過伺 服器UDP 1712和用戶UDP 1714發送SIP註冊回應1726 到用戶SIP 1716。一旦已成功完成SIP註冊,則啓動建立 安全DDP通道的步驟。 在下一步驟1728中,用戶 DDPS模組1718(用戶 -74- 200816753 DDP 1 720的模組)將發送DDPS對話請求到伺服器DDPS 模組 1708。在一例子中,可經由用戶 SIP 1716、用戶 UDP 1714、伺服器 UDP 1712、伺服器 SIP 1710 將 DDPS 對話請求路由到伺服器DDPS模組1 708。 當接收到DDPS對話請求時,在下一步驟1 73 0中, 伺服器DDPS模組1 70 8將透過伺服器SIP 1710、伺服器 UDP 1712、用戶 UDP 1714、及用戶 SIP 1716 發送 DDPS fefg舌回應1730到用戶DDPS f旲組1718。一*旦已建立安全 通道,則使用者必須向行動性伺服器註冊。爲了通知使用 者,用戶DDPS 1718可將DDPS對話回應轉寄到應用程式 用戶1722 。 當接收到通知時,在下一步驟1 7 3 2中,應用程式用 戶1 722發送DDP註冊請求到使用者/裝置管理器1 704。 在一例子中,應用程式用戶1 722可發送註冊資訊到用戶 DDP 1720。用戶DDP 1720可經由已建立的安全通道(即 經由用戶 DDPS模組1718、用戶SIP 1716、用戶UDP 1714、伺服器UDP 1712、伺服器SIP 1710、及伺服器 D D P S模組1 7 0 8 )發送註冊資訊到d D P 1 7 0 6,後者然後 將註冊資訊路由到使用者/裝置管理器1 7 0 4。 當接收到註冊資訊時,在下一步驟1 7 3 2中,使用者 裝置管理器1 704可發送DDP註冊回應到應用程式用戶。 在一例子中,使用者裝置管理器1704發送DDP註冊回應 到伺服器DDP 1706。伺服器DDP 1706經由已建立的安全 通道(即經由伺服器D D P S 1 7 0 8、伺服器S I P 1 7 1 0、伺服 -75- 200816753In a first step 1 724, a SIP registration must first be established. In an example, user SIP 1716 can send a SIP registration request via server UDP 1714. The SIP registration request can be received by the server SIP 1710 via the server UDP 1712. Upon receiving the SIP registration request, the server SIP 1710 can send a SIP registration response 1726 to the user SIP 1716 via the server UDP 1712 and the user UDP 1714. Once the SIP registration has been successfully completed, the steps to establish a secure DDP channel are initiated. In the next step 1728, the user DDPS module 1718 (the user-74-200816753 DDP 1 720 module) will send a DDPS dialog request to the server DDPS module 1708. In one example, the DDPS dialog request can be routed to the server DDPS module 1 708 via the user SIP 1716, user UDP 1714, server UDP 1712, server SIP 1710. When receiving the DDPS dialog request, in the next step 1 73 0, the server DDPS module 1 70 8 will send a DDPS fefg tongue response 1730 through the server SIP 1710, the server UDP 1712, the user UDP 1714, and the user SIP 1716. Go to the user DDPS f旲 group 1718. Once the secure channel has been established, the user must register with the mobile server. To notify the user, the user DDPS 1718 can forward the DDPS dialog response to the application user 1722. Upon receiving the notification, in the next step 1 7 32, the application user 1 722 sends a DDP registration request to the user/device manager 1 704. In an example, application user 1 722 can send registration information to user DDP 1720. User DDP 1720 can send registration via established secure channel (ie via user DDPS module 1718, user SIP 1716, user UDP 1714, server UDP 1712, server SIP 1710, and server DDPS module 1 708) Information to d DP 1 7 0 6, the latter then routes the registration information to the User/Device Manager 1 704. Upon receipt of the registration information, in the next step 1 7 32, the user device manager 1 704 can send a DDP registration response to the application user. In one example, user device manager 1704 sends a DDP registration response to server DDP 1706. The server DDP 1706 is via the established secure channel (ie via the server D D P S 1 7 0 8 , the server S I P 1 7 1 0, the servo -75- 200816753)

器 UDP 1712、用戶 UDP 1714、用戶 SIP 1716、及用戶 DDPS 1718)發送註冊資訊到DDP 1720,後者然後將DDP 註冊回應路由到應用程式用戶1 722的使用者。 在具有DDP的行動性架構配置中,註冊可以是一次 事件。在一例子中,當用戶裝置第一次啓動時,用戶裝置 將向行動性伺服器註冊。因爲在步驟428及430已建立安 全通道,所以用戶裝置的使用者可確保已將發送的敏感性 註冊資訊加密並且經由安全通道。在一實施例中,只要用 戶裝置和行動性伺服器之間的安全通道維持著就不需要再 發生額外的D D P註冊。在一實施例中,用戶裝置上的應 用程式用戶與企業所管理的應用程式伺服器之間的互動現 在可經由單一安全通道加以安全地實施。圖18及19圖示 在一實施例中,DDP如何處理用戶裝置上的應用程式用戶 與企業所管理的應用程式伺服器之間的互動之例子。 圖1 8爲在一實施例中的必須發送大檔案之情況的簡 易電話流程圖。假設用戶裝置需要下載最新的軟體升級之 情況。在一例子中,應用程式用戶1 8 1 4發送軟體升級的 請求1 8 1 6到負責管理伺服器側上的不同軟體影像之影像 管理器1 802。 在第一步驟1 8 1 8中,應用程式用戶1 8 1 4發送新的影 像請求到影像管理器1 8 0 2。在一例子中,首先將新的影像 請求從用戶應用程式1 8 1 4發送到用戶DDP 1 8 1 0。在接收 到新的影像請求之後,DDP 1810可經由安全通道發送請 求到伺服器DDP 1 80 8。在發送到影像管理器1 802之前, -76- 200816753 可將新的影像請求路由到負責決定需要升級哪一軟體的裝 置/使用者管理器1 804。在裝置/使用者管理器1 804已決 定用戶裝置需要哪一軟體升級之後,裝置使用者/管理器 1 8 04可路由新的影像請求到影像管理器18〇2。 當接收到請求時,然後影像管理器1 8 02發送所請求 的軟體升級(如、所請求的資料1 802 )到伺服器DDX模 組1 8 06。在一實施例中,伺服器DDX模組1 8 06可將檔案 轉換成能夠經由用戶裝置和行動性伺服器之間所建立的安 全通道加以發送之格式。在一實施例中,伺服器DDX模 組1 806將大檔案分成複數資料封包以便經由安全通道運 輸。 在下一步驟1 822中,伺服器DDX模組1 806可透過 伺服器DDP 1808和用戶DDP1810發送DDX檔案轉移開 始到用戶DDX模組1 8 12。在一實施例中,DDX檔案轉移 開始意指即將發送檔案的伺服器DDX與用戶DDX之間的 通知。DDX檔案轉移開始可包括有關諸如檔案名稱、檔案 大小、發送的資料封包數量、請求檔案的應用程式等進來 檔案之基本資訊。 在下一步驟1824中,用戶DDP 1810可發送DDX開 始回應到伺服器 DDX 1 806。在一實施例中,DDP內的 RDDP模組可發送DDX開始回應。 在下一步驟1 826中,伺服器DDX模組1 8 06可發送 第一 DDX資料封包到用戶DDX模組1812。如圖16所說 明一般,首先將DDX資料訊息發送到伺服器DDP 1801 -77- 200816753 在一實施例中,將DDX資料訊息封裝成SIP通知訊息, 且透過SIP控制協定和UDP運輸協定經由安全通道發 送。在用戶裝置上,可由用戶DDP 18 10接收DDX資料訊 息,然後用戶 DDP 18 10可路由 DDX資料訊息到用戶 DDX 模組 1812。 在下一步驟1828中,當接收到DDX資料訊息時,將 由用戶DDP 1810發送DDP應答。在一實施例中,用戶 DDP 1810內的RDDP模組將發送DDP應答以通知伺服器 DDX模組1 806已成功接收到進來的DDX資料訊息。 步驟1 826及1 828是反覆步驟,可以重複直到伺服器 和用戶DDX模組之間已交換所有DDX資料封包和應答。 一旦已發送最後的DDX資料訊息和DDX應答,則在 下一步驟1 8 3 0中,伺服器DDX模組1 806將發送DDX檔 案轉移結束到應用程式用戶1 8 1 4以通知應用程式用戶已 發送所有DDX資料訊息。在一例子中,可從伺服器DDX 模組1 8 06發送DDX檔案轉移結束到伺服器DDP 1 8 08到 用戶裝置。The UDP 1712, user UDP 1714, user SIP 1716, and user DDPS 1718) send registration information to the DDP 1720, which then routes the DDP registration response to the user of the application user 1 722. In an active architecture configuration with DDP, registration can be an event. In one example, when the user device is first activated, the user device will register with the mobile server. Because the secure channel has been established at steps 428 and 430, the user of the user device can ensure that the transmitted sensitive registration information has been encrypted and passed through the secure channel. In one embodiment, no additional D D P registration is required as long as the secure channel between the user device and the mobile server is maintained. In one embodiment, the interaction between the application user on the user device and the application server managed by the enterprise can now be safely implemented via a single secure channel. Figures 18 and 19 illustrate an example of how DDP handles interaction between an application user on a user device and an application server managed by the enterprise in one embodiment. Figure 18 is a flow chart of a simple telephone in the case where a large file must be transmitted in an embodiment. Assume that the user device needs to download the latest software upgrade. In one example, the application user 1 8 1 4 sends a software upgrade request 1 8 1 6 to the image manager 1 802 responsible for managing different software images on the server side. In a first step 1 8 1 8 , the application user 1 8 1 4 sends a new image request to the image manager 1 8 0 2 . In one example, a new image request is first sent from the user application 1 8 1 4 to the user DDP 1 8 1 0. After receiving a new image request, the DDP 1810 can send a request to the server DDP 1 80 8 via the secure channel. Before being sent to Image Manager 1 802, -76-200816753 can route new image requests to Device/User Manager 1 804 which is responsible for deciding which software to upgrade. After the device/user manager 1 804 has determined which software upgrade the user device requires, the device user/manager 108 04 can route a new image request to the image manager 18〇2. Upon receiving the request, the image manager 108 is then sent the requested software upgrade (e.g., requested data 1 802) to the server DDX module 1 806. In one embodiment, the server DDX module 108 can convert the file into a format that can be transmitted via a secure channel established between the user device and the mobile server. In one embodiment, the server DDX module 1 806 divides the large file into multiple data packets for transport via a secure channel. In the next step 1 822, the server DDX module 1 806 can send a DDX file transfer to the user DDX module 1 8 12 via the server DDP 1808 and the user DDP 1810. In one embodiment, the DDX file transfer start means a notification between the server DDX that is about to send the file and the user DDX. The DDX file transfer start can include basic information about incoming files such as file name, file size, number of data packets sent, application requesting files, and so on. In the next step 1824, the user DDP 1810 may send a DDX start response to the server DDX 1 806. In an embodiment, the RDDP module within the DDP can send a DDX to start responding. In the next step 1 826, the server DDX module 1 8 06 can send the first DDX data packet to the user DDX module 1812. As shown in FIG. 16, the DDX data message is first sent to the server DDP 1801 -77 - 200816753. In one embodiment, the DDX data message is encapsulated into a SIP notification message, and the secure channel is transmitted through the SIP control protocol and the UDP transport protocol. send. On the user device, the DDX information can be received by the user DDP 18 10, and then the user DDP 18 10 can route the DDX data message to the user DDX module 1812. In the next step 1828, when the DDX data message is received, the DDP answer will be sent by the user DDP 1810. In one embodiment, the RDDP module within the user DDP 1810 will send a DDP response to inform the server that the DDX module 1 806 has successfully received the incoming DDX data message. Steps 1 826 and 1 828 are repeated steps that can be repeated until all DDX data packets and responses have been exchanged between the server and the user DDX module. Once the last DDX data message and the DDX response have been sent, in the next step 1 8 3 0, the server DDX module 1 806 will send the DDX file transfer to the application user 1 8 1 4 to notify the application user that the message has been sent. All DDX data messages. In one example, the DDX file transfer end can be sent from the server DDX module 1 8 06 to the server DDP 1 8 08 to the user device.

可由用戶DDP 1810接收到DDX檔案轉移結束。在一 實施例中,在下一步驟1832中,用戶DDP 1810的RDDP 可發送DDP應答到影像管理器1 802。 同時,用戶DDP 1810可路由DDX檔案轉移結束到用 戶DDX模組1 8 1 2,後者將通知應用程式用戶1 8 1 4。 如同圖1 8可明白一般,不必爲了請求軟體升級而建 立新的安全通道。取而代之的是,在不必建立新的安全通 -78- 200816753 道之下,由應用程式伺服器接收和處理軟體升級的請求。 也可看出,圖1 8圖示如何利用DDP的架構以安全且可靠 的方式發送資料流量,讓發送者和請求者確保已成功接收 所請求檔案的所有資料封包。 圖1 9爲本發明的實施例中之可發送諸如控制應用程 式所發送者等小控制訊息的情況之簡易電話流程圖。在圖 19中,可在沒有DDX模組之下發生應用程式用戶與應用 程式伺服器之間的互動。 假設用戶裝置的使用者想要共用他或她的使用者出席 (如、可利用、忙碌、只有電話等)之情況。 在第一步驟1914中,用戶裝置上的用戶出席管理器 1 9 1 0可將出席偏好設定發送到伺服器出席管理器1 902。 在一例子中,用戶出席管理器1910可將出席偏好設定 (當作單一 DDP資料封包)發送到用戶DDP 1 90 8,然後 後者經由安全通道將出席偏好設定發送到伺服器 DDP 1 906 ° 當接收到出席偏好設定時,在下一步驟1 9 1 8中,伺 服器DDP 1906可發送DDP應答。在一實施例中,DDP內 的RDDP模組可發送DDP應答。同時,伺服器DDP 1906 將經由裝置/適用者管理器1 904通知伺服器出席管理器 1 902有關出席偏好設定。 假設同一使用者想要發現另一使用者的出席狀態之另 一情況。 在第一步驟1 922中,用戶出席管理器1910可將出席 -79- 200816753 詢問1 920發送到用戶DDP 1 908,後者可經由已建立 通道發送出席詢問到伺服器DDP 1 906。當接收到出 問時,伺服器DDP 1 906將經由裝置/使用者管理器 轉寄詢問到伺服器出席管理器1 902,後者可執行所請 詢問以檢索所請求的資訊。 在下一步驟1928中,伺服器出席管理器1902可 席回應(如、所請求的狀態資料)發送到用戶出席管 1910。在一例子中,可經由裝置/使用者管理器1904 席回應從伺服器出協管理器1 902發送到伺服器 1 906。然後,經由安全通道將出席回應發送到用戶 1908,而用戶DDP 1908然後將出席回應路由到用戶 管理器1 9 1 0。 如上述,圖1 8及1 9圖示如何將DDP用於管理 裝置上的複數資料應用程式與企業所管理的複數應用 伺服器之間的互動之不同的例子。具有DDP的行動 構配置建立各個應用程式用戶和應用程式伺服器可彼 動之單一通道。再者,可利用 DDP的架構以安全和 的方式發送資料流量,使發送者和請求者確保已成功 所請求檔案的所有資料封包。 因爲具有DDP的行動性架構配置現在可以是控 中心’所以具有DDP的行動性架構配置現在可協調 手機的使用者事先已個別管理的各種活動。在一例子 圖1 8圖示如何利用DDP管理用戶裝置上之使用者 驗’包括軟體升級、裝置組態、及使用者資訊管理等 安全 席詢 1904 求的 將出 理器 將出 DDP DDP 出席 用戶 程式 性架 此互 可靠 接收 制的 用戶 中, 的經 ,但 -80- 200816753 並不侷限於此。在另一例子中,DDP可藉由讓使用者能夠 共用其狀態以管理使用者的出席(如見圖1 9 )’如此使系 統能夠管理進來的流量和讓其他人能夠看見他或她的狀 態。在另一例子中,DDP可藉由讓使用者從一資料網路漫 遊到另一資料網路以管理行動性,卻不必擔心對話管理。 如從本發明的實施例可明白一般,具有DDP的行動 性架構配置藉由提供用戶裝置上的多個應用程式能夠與企 業伺服器上的複數應用程式通訊之單一安全通道以減少安 全風險。DDP是能夠不管硬體及/或軟體限制仍可有利地 實施之多樣性協定。再者,DDP是可被控制以利用複數控 制及/或運輸協定的適應性協定。 E. Divitas協定代理器(DPP ) 若行動性手機上的應用程式之用戶直接存取企業資 源,則需要爲多個協定打開企業防火牆。根據本發明的一 或多個實施例所構思之方法讓以手機爲基的企業應用程式 能夠以安全方式使用現存的VoIP相關連接。 藉由想出分散式協定代理器以實施本發明。分散式協 定代理器可被分成兩部分。一部分連同VoIP用戶一起駐 在行動性手機上。另一部分連同VoIP伺服器一起駐在企 業內。 如圖7 A - D所示,以手機爲基的V ο IP用戶充作手機上 所執行的不同應用程式之伺服器。此組件使用現存的 V 〇 IP相關連接(如、S IP )以發送應用程式負載橫越到企 -81 - 200816753 業。伺服器側代理組件負責拆卸負載且連接到實 伺服器。用戶和伺服器側代理組件進一步再細分 組件。各個子組件負責代理一協定。 圖7 A圖示根據本發明的一或多個實施例之 且每一主機包括兩網路介面。經由兩獨立網路 徑,一路徑來自介面 C 0到 S 0,而另一路徑來 S1。在SCTP中,這兩路徑將結合。The end of the DDX file transfer can be received by the user DDP 1810. In an embodiment, in a next step 1832, the RDDP of the user DDP 1810 may send a DDP response to the image manager 1 802. At the same time, the user DDP 1810 can route the DDX file transfer to the user DDX module 1 8 1 2, which will notify the application user 1 8 1 4 . As you can see in Figure 18, you don't have to create a new secure channel to request a software upgrade. Instead, the application server receives and processes requests for software upgrades without having to establish a new Secure Channel -78-200816753. It can also be seen that Figure 18 illustrates how the DDP architecture can be used to send data traffic in a secure and reliable manner, allowing the sender and requester to ensure that all data packets for the requested file have been successfully received. Figure 19 is a simplified telephone flow diagram of a case in which a small control message such as a sender of a control application can be transmitted in an embodiment of the present invention. In Figure 19, the interaction between the application user and the application server can occur without the DDX module. It is assumed that the user of the user device wants to share his or her user's presence (eg, available, busy, only phone, etc.). In a first step 1914, the User Attendance Manager 1 9 1 0 on the user device can send the presence preference settings to the server presence manager 1 902. In an example, the user presence manager 1910 can send the presence preference (as a single DDP data packet) to the user DDP 1 90 8, then the latter sends the presence preference setting to the server DDP 1 906 ° via the secure channel when receiving To attend the preference setting, in the next step 1 9 18, the server DDP 1906 can send a DDP answer. In one embodiment, the RDDP module within the DDP can send a DDP response. At the same time, the server DDP 1906 will notify the server attendance manager 1 902 via the device/applicator manager 1 904 regarding attendance preference settings. Suppose another situation in which the same user wants to find the presence status of another user. In a first step 1 922, the user presence manager 1910 can send the presence -79-200816753 query 1 920 to the user DDP 1 908, which can send the presence query to the server DDP 1 906 via the established channel. Upon receiving the challenge, the server DDP 1 906 will forward the query via the device/user manager to the server presence manager 1 902, which can perform the requested query to retrieve the requested information. In the next step 1928, the server presence manager 1902 responds (e.g., the requested status profile) to the user attendance tube 1910. In an example, it may be sent from the server out-of-service manager 1 902 to the server 1 906 via the device/user manager 1904. The presence response is then sent to the user 1908 via the secure channel, and the user DDP 1908 then routes the presence response to the user manager 1 910. As described above, Figures 18 and 19 illustrate examples of how DDP can be used to manage the interaction between a complex data application on a device and a plurality of application servers managed by the enterprise. The DDP-enabled configuration creates a single channel through which individual application users and application servers can interact. Furthermore, the DDP architecture can be used to send data traffic in a secure and secure manner, enabling the sender and requester to ensure that all data packets for the requested file have been successfully successful. Because the mobility architecture with DDP can now be a control center, the mobile architecture with DDP now coordinates the various activities that the users of the phone have previously managed individually. In an example, FIG. 18 illustrates how to use the DDP to manage user authentication on the user device, including software upgrades, device configuration, and user information management, etc., and the processor will present the DDP DDP to the user. The program is a user of this mutual reliable receiving system, but -80-200816753 is not limited to this. In another example, DDP can manage the presence of the user by allowing the user to share their status (see Figure 119). This enables the system to manage incoming traffic and allow others to see his or her status. . In another example, DDP can manage mobility by allowing users to navigate from one data network to another without having to worry about dialog management. As can be appreciated from embodiments of the present invention, a mobile architecture configuration with DDP reduces the security risk by providing a single secure channel through which multiple applications on the user device can communicate with multiple applications on the enterprise server. A DDP is a diversity agreement that can be advantageously implemented regardless of hardware and/or software limitations. Furthermore, DDP is an adaptive protocol that can be controlled to utilize complex numerical control and/or transportation protocols. E. Divitas Protocol Agent (DPP) If the user of the application on the mobile phone directly accesses the enterprise resources, the enterprise firewall needs to be opened for multiple agreements. The method conceived in accordance with one or more embodiments of the present invention enables a mobile-based enterprise application to use existing VoIP-related connections in a secure manner. The invention is implemented by conceiving a decentralized protocol agent. The decentralized protocol agent can be divided into two parts. Some of them are stationed on mobile phones along with VoIP users. The other part is stationed in the enterprise along with the VoIP server. As shown in Figure 7 A - D, the mobile phone-based V ο IP user acts as a server for different applications executed on the mobile phone. This component uses existing V 〇 IP-related connections (eg, S IP ) to send application load across the enterprise -81 - 200816753 industry. The server side proxy component is responsible for removing the load and connecting to the real server. The user and server side proxy components further subdivide the components. Each subcomponent is responsible for proxying an agreement. Figure 7A illustrates one or more embodiments in accordance with the present invention and each host includes two network interfaces. Via two separate network paths, one path comes from interface C 0 to S 0 and the other path comes to S1. In SCTP, these two paths will be combined.

Divitas”薄弱用戶“使用內建的動力監視結合 當偵測到路徑故障時,協定透過另一路徑發送流 程式不必知道失敗接管復原已發生。 失敗接管亦可用於維持網路應用程式連接性 假設包括無線 802.1 1介面和乙太介面的膝上型 膝上型電腦在其埠接站時,較高速度的乙太介面 但是當連接中斷(離開埠接站)時,連接應被失 無線介面。當回到埠接站時,應偵測到乙太連接 介面重新開始通訊。這是提供高可利用性和可靠 而有力的機構。 根據本發明的一或多個實施例,實施多起始 提供比使用TCP者的可利用性更高之應用程式。 主機室具有一個以上的網路介面之主機,因此具 多起始處主機之一個以上的IP位址。在TCP中 指兩端點的通道(在此例中,兩主機的介面 座)。 圖7B-D圖示根據本發明的一或多個實施例 際的企業 成多個子 網路架構 提供兩路 自 C 1到 的路徑; 量。應用 。例如, 電腦。當 較適合, 敗接管到 且透過此 性之一強 處計畫以 多起始處 有可定址 ,連接蒽 之間的插 之薄弱用 -82- 200816753 互連同伺服器上的薄弱用戶之配對如何在手機和伺服器之 間有效建立用以運輸狀態資訊之效率佳的運輸機構。電子 郵件應用程式的例子(如、SMTP )被圖示作使用 SIP-NOTIFY方法以在不知道SMTP應用程式之下隧穿應用程 式層封包。如此具有用戶上的表示層封包應用程式不必爲 了提供對話持續性而改變之優點。 有利的是,行動性應用程式使用上述方法,企業可達 成更安全和容易管理的企業行動性。此方法亦使VoIP販 售商能夠擴展其行動性解決方案到不同的企業應用程式。 參考下面的圖式和討論可更加明白本發明的特徵和優 點。 圖20爲手機上的各個應用程式個別連接到企業內的 對應應用程式伺服器之架構配置的習知技術例子圖。手機 2000可包括複數應用程式用戶,該複數應用程式用戶包括 Di vi t as用戶2002、CRM (客戶關係管理)應用程式用戶 2 006、及郵件應用程式用戶2 008,但並不侷限於此。應用 程式用戶可彼此獨立或透過應用程式協定介面(API )彼 此互動。在一例子中,應用程式用戶2006及2008可分別 透過 API 2010 及 API 2012 與 Divitas 用戶 2002 互動。 手機2000中的應用程式用戶可與企業2090內的應用 程式伺服器互動。企業2090可包括複數應用程式伺服 器,該複數應用程式伺服器包括Divitas伺服器2022、 CRM應用程式伺服器2026、及郵件應用程式伺服器 2 028,但並不侷限於此。應用程式伺服器可彼此獨立或透 -83- 200816753 過API彼此互動。在一例子中,應用程式伺服器2026及 2028可分別透過API 2030及API 2032與Divitas伺服器 2022互動。需注意的是,API的目的係使應用程式能夠彼 此互動。然而,因爲各個應用程式彼此獨立,所以透過 API的互動是隨意的。 假設手機2000上的股票經紀人可透過Divitas用戶 2 0 02與其用戶通訊的情況。儘管與其用戶交談,但是股票 經紀人想要隨手可得到其用戶的投資組合。在此例中,股 票經紀人必須建立兩種不同的對話。股票經紀人可建立第 一對話以使自己能夠透過Divitas用戶2002與其用戶交 談。爲了提及投資組合,股票經紀人可藉由利用CRM應 用程式用戶2006與位在企業2090內的防火牆2040下之 CRM應用程式伺服器2026互動以建立第二對話。 在典型安全插座層(SSL)虛擬私有網路(VPN)環 境中,就已建立的各個通道而言,網路管理者必須建立不 同組態。爲了建立兩種不同對話,必須建立兩種分開的安 全通道。在一例子中,已將新的郵件應用程式用戶添加到 手機。爲了與位在企業的防火牆內之郵件應用程式伺服器 通訊,網路管理者必須建立新的安全通道。如此,在典型 SSL VPN環境中,使用者必須建立多個對話,其需要多個 開始通訊指令且使企業更容易遭受安全風險。SSL VPN環 境不僅對使用者不方便,而且此環境類型也需要更多的人 力資源以管理企業的網路環境安全。 爲了最小化所建立的安全通道數目,可使用網際網路 -84 - 200816753 協定(IP )安全閘道器取代SSL。在1P安全VPN環境 中,手機上的一或多個應用程式用戶可藉由橫貫過IP安 全用戶2014與IP安全閘道器2030透過一安全通道與應 用程式伺服器互動。爲了建立安全通道’使用者首先必須 提供認證資料(如、使用者名稱、密碼等)。一旦已建立 安全通道,則使用者亦擔負有每次利用不同的應用程式用 戶時之認證責任。換言之,可將各個應用程式用戶組配成 透過不同的IP位址與其對應的應用程式伺服器通訊。 在一例子中,CRM應用程式用戶2006想要與應用程 式伺服器2026互動。若未曾建立安全通道2084,則使用 者首先必須提供認證資料。一旦已建立安全通道2 0 8 4,則 爲了使CRM應用程式用戶2006能夠與CRM應用程式伺 服器2026互動,使用者必須提供額外的認證資料。 此外’每一次中斷對話時都必須發生新的安全通道和 重新認證。在一例子中,若使用者在對話時是移動的,則 若連接不見,使用者會遭遇從對話中突然中斷的風險。例 如,透過Wi-Fi網路連接的使用者會橫貫到Wi-Fi網路 外。對話會中斷,使用者必須建立另一對話,諸如蜂巢式 連接等。結果’使用者受到建立新的對話之不便的干擾並 且也會受挫於有限的行動性。 提供習知技術圖2 1說明應用程式用戶如何與應用程 式伺服器互動。圖21爲使應用程式用戶能夠在ip安全 VPN環境中與應用程式伺服器通訊之方法的習知技術流程 圖。圖21討論有關圖20。 -85- 200816753 假設手機2 0 〇 〇的使用者想要利用郵件應用程式用戶 2 0 0 8發送電子郵件之情況。 在第一步驟2102中,將電子郵件資料流量發送到應 用程式伺服器。在一例子中,郵件應用程式用戶2008可 發送電子郵件資料封包到企業2090內的郵件應用程式伺 服器2 0 2 8。 在下一步驟2104中,由可檢查以決定如何路由流量 之IP Security Client (IP安全用戶)2014接收電子資料 里。換曰之’ IP安全用戶2014可分析各個封包以決定 封包是否是企業2090想要的封包。IP安全用戶2014可藉 由分析位在封包內的IP位址和埠號碼以辨識封包的接收 者。 若電子郵件資料流量的接收者不是企業2 0 9 0內的複 數應用程式伺脂器之一,則在下一步驟2106中,IP安全 用戶2 0 1 4可丟棄流量或可引導電子郵件流量到不位在企 業2 090內的伺服器。如何處理不是企業2090內的應用程 式伺服器想要的電子郵件流量視如何將IP安全用戶20 i 4 組配成處理非企業資料流量而定。 若IP安全用戶2014決定資料流量是位在企業2090 內的應用程式伺服器想要的,則在下一步驟2 1 0 8中,在 轉寄資料封包之前,IP安全用戶2014可將各個資料封包 加密。加密各個資料封包的處理需要手機2000具有足夠 的CPU處理功率。另外,在IP安全VPN環境中加密各個 資料封包的要求會產生諸如網路電話(VoIP )通信對話等 - 86- 200816753 語音通信情況中的潛在因素問題。換言之,語音通訊對話 期間k的語音品質嚴重惡化,導致不佳的語音通訊經驗 (如、背景中的回音、無法聽見的談話等)。 在下一步驟 2110 中,IP Security Client (IP 安全用 戶)2014可沿著安全通道2084發送經加密流量到想要的 應用程式伺服器。如上述,在每次利用新的應用程式時安 全通道必須建立安全通道。在一例子中,IP安全用戶 2014可經由網路205 0及防火牆2040發送經加密流量到企 業 2090 的 IP Security Gateway ( IP 安全閘道器)2030。 在下一步驟21 12中,IP安全閘道器203 0執行檢查以 決定如何路由流量。與IP安全用戶2014類似,IP安全閘 道器203 0分析各個封包以決定封包是否是企業2090想要 的。 若偶而接收到資料封包不是經加密IP安全封包,則 在下一步驟2114中,IP安全閘道器2030丟棄該封包。 若資料封包是經加密IP安全封包,則在下一步驟 21 16中,IP安全閘道器203 0可將流量解密。 一旦已解密封包,則IP安全閘道器203 0分析封包以 辨識接收的應用程式伺服器之IP位址和埠號碼。在下一 步驟21 1 8中,IP安全閘道器203 0將資料封包轉寄到適當 的應用程式伺服器(如、郵件應用程式伺服器202 8 )。 步驟2 1 02到2 1 1 8所說明的方法是連續處理且爲應用 程式用戶所接收的各個封包加以執行。 習知技術有幾點不利點。在一例子中,必須爲添加到 -87- 200816753 使用者的手機之每一個新的應用程式用戶執行不同的組 態。當添加新的應用程式用戶時,各種不同的應用程式用 戶和其對應的應用程式伺服器之管理導致更複雜的建立關 係網路環境,如此維持代價變得很高。再者,使用者必須 負起執行多個認證的責任,如此需要使用者記住複數認證 資料。另外,由於需要加密資料流量,導致硬體成本增加 (如、手機必須具有足夠的CPU處理功率)和潛在因素 增多,所以在IP安全VPN環境內操作所得到的益處減 少。此外,使用者會受挫於所提供的有限行動性,每一次 對g舌中斷,使用者就必須重新建立連接和重新認證。 在本發明的一觀點中,本發明人在本文實現統合多個 認證及/或多個安全通道的習知技術架構配置以建立單一 開始通信指令的環境。 換言之,本發明人實現藉由將各個應用程式組配成經 由單一應用程式(如、Divitas用戶)和單一伺服器 (如、Divitas伺服器)引導其資料流量,來自複數應用 程式的資料流量可透過單一安全通道被發送而不需要使用 者執行多個認證。此外,在不必犧牲行動性之下也可大幅 降低對話損失。 根據本發明的實施例,藉由實施Divitas協定代理伺 服器(DPP )以提供行動性架構配置。在一實施例中, DPP包括用戶DPP和伺服器DPP。 在本發明的實施例中,手機可包括行動性用戶(如、 Divitas用戶,其可包括用戶Dpp以管理手機和行動性伺 -88- 200816753 服器(如、Divitas伺服器)之間的連接性。在本發 實施例中,行動性伺服器可包括伺服器DPP以管理行 伺服器和手機之間的連接性。在本發明的實施例中’ 和伺服器DPP可包括複數子用戶/伺服器DPP以管理 的協定類型(如、SIP、SMTP等)。 在本發明的實施例中,DPP能夠從各個應用程式 與其對應的應用程式伺服器互動建立單一安全通道。 各個應用程式正經由共同DPP路由其資料流量,所以 現在可管理手機和行動性伺服器之間的連接性。連接 訊可包括透過諸如SIP (對話啓動協定)等控制協定 手機和行動性伺服器之間的安全通道。連接性資訊可 於決定何時和如何連接手機。此外,連接性資訊亦可 何時執行從一網路到另一網路的傳訊(如、從Wi-Fi 到蜂巢式網路),藉以能夠在不同網路之間無縫變換 參考下面的圖式和討論可更加明白本發明的特徵 點。 圖2 2爲本發明的實施例中之行動性架構配置的 方塊圖。在行動性架構配置2 2 0 0中,手機2 2 0 2與 2216內的Divitas伺服器2218 (如、行動性伺服器 動。手機2202可包括Divitas用戶2204(如、行動 戶)和複數應用程式用戶(2206及2208)。在本發 實施例中,Divitas用戶2204可包括用戶DPP以管理 和行動性伺服器之間的連接性。 不像習知技術一般,應用程式用戶2 2 0 6和應用 明的 動性 用戶 不同 用戶 因爲 DPP 性資 建立 被用 包括 網路 ) 和優 簡易 企業 )互 性用 明的 手機 程式 -89- 200816753 用戶2208不被組配成直接與它們的對應應用程式伺服器 (222 0及2222 )互動。在一實施例中,取而代之的是, 用於各個應用程式用戶的各種不同組態可被簡化成引導所 有資料流量到與Divitas用戶2204相關聯的單一區域IP 主機2210 (如、127.0.0· 1的IP位址)。換言之,來自應 用程式用戶2206及2208的資料流量現在可被組配成透過 API 2212 及 2214 被路由到 Divitas 用戶 2204。從 Divitas 用戶2204,然後,可經由企業內2216的Divitas伺服器 2218透過網路2224 (如、網際網路)路由所有資料流 量。在本發明的實施例中,Divitas伺服器2218可包括伺 服器DPP以管理手機和行動性伺服器之間的連接性。一旦 D i v i t a s伺服器2 2 1 8已接收到資料流量,貝[J D i v i t a s伺服 器2218可透過API ( 2232及2234 )適當路由流量到對應 的應用程式伺服器(2220及2222)。 假設手機2202的使用者想要藉由利用應用程式用戶 2206發送電子郵件之情況。因爲應用程式用戶2206已被 組配成發送所有資料流量到區域欲主機22 1 0,所以來自應 用程式用戶2206的資料流量透過 API 2212被發送到與 Divitas用戶2204相關聯的區域IP主機2210。 當接收來自應用程式用戶2206的流量時,Divitas用 戶 2204可使用 Divitas資料交換(DDX)將流量封裝在 SIP Notify Message內。如本文所討論一般,DDX意指用 以在手機和伺服器之間傳送資料封包的協定。在封裝資料 封包時,DDX添加新的標記,該標記添加有關發送資料流 -90- 200816753 量的應用程式用戶之資訊。 不像習知技術一般,並不加密所有的資料封包。取而 代之的是,資料封包是否被加密視應用程式用戶所指定的 偏好而定。在本發明的實施例中,新添加的DDX被加 密。一旦資料封包已經封裝在SIP Notify Message內,則 已封裝的資料封包現在沿著包括橫貫經過網路2224之安 全通道2250被轉寄到由Divitas伺服器2218接收。需注 意的是,若由一或多個安全模組(如、防火牆2 2 2 6 )保護 企業,則資料封包亦必須橫貫經過一或多個安全模組。 一旦已由 Divitas伺服器2218接收資料封包,則 Divitas伺服器22 18可利用DDX標記檢索應用程式伺服 器的位置。在一例子中,DDX標記可包括辨識號碼(如、 MAC位址、埠位址),其可指出企業內哪一個應用程式伺 服器(如、應用程式伺服器2220 )是想要的資料封包接收 者。 在一實施例中,行動性架構配置可管理手機和行動性 伺服器之間的連接性。在一實施例中,行動性架構配置可 利用諸如SIP等一般手機利用的控制協定。 在行動性架構配置中,爲了建立安全通道,使用者只 必須執行一次人工認證。換言之’一旦已在手機和行動性 伺服器之間建立安全通道,則不必在每一次應用程式用戶 ( 2206及2208)想要與應用程式伺服器( 2220及2222) 互動時都必須建立另一安全通道。 在一貫施例中’行動性架構配置亦可包括資料庫,此 -91 - 200816753 資料庫包括用於各個應用程式用戶的認證資料。如此,每 一次利用不同的應用程式用戶時,在一實施例中,行動性 架構配置可利用儲存在資料庫中之應用程式特有的認證資 料以自動認證使用者。從使用者的觀點看來,行動性架構 配置實質上是單一開始通信指令環境。 有利的是’行動性架構配置大體上使時間和努力有效 率’網路管理者必須花費在組配各個應用程式用戶。網路 管理者只要藉由組配各個應用程式用戶與區域主機互動就 可大體上消除此處理,藉以取代每一次添加新的應用程式 用戶到手機時都必須建立新的安全通道。另外,利用單一 開始通信指令,網路管理者能夠大體上減少與管理安全相 關聯的時間和成本。 行動性架構配置可被實施當作豐富或薄弱用戶。圖2 3 爲本發明的實施例中之當作豐富用戶的行動性架構配置之 方塊圖。如本文所討論一般,豐富用戶意指用戶DPP和伺 服器DPP不僅管理各種不同的應用程式而且也提供支援給 至少一或多個應用程式用戶功能(如、語音應用程式用 戶、即時訊息應用程式用戶、電子郵件應用程式用戶等) 之行動性架構配置。 假設例如手機23 02的使用者想要利用郵件應用程式 用戶 2310(如、Microsoft®Outlook等)檢索來自位在企 業 2318 內的郵件應用程式伺服器 2326 (如、Divitas "weak users" use built-in power monitoring integration When a path failure is detected, the protocol sends the stream through another path without knowing that a failed takeover recovery has occurred. Failed takeovers can also be used to maintain network application connectivity. Assume that a laptop with a wireless 802.1 1 interface and an Ethernet interface has a higher speed Ethernet interface when it is connected to the station but when the connection is interrupted (leave 埠When the station is connected, the connection should be lost. When returning to the docking station, the Ethernet interface should be detected to restart communication. This is a highly available and reliable organization. In accordance with one or more embodiments of the present invention, implementing multiple starts provides an application that is more usable than using TCP. The host room has more than one host of the network interface, and therefore has more than one IP address of the host at the beginning. In TCP, the channel at both ends (in this case, the interface of the two hosts). 7B-D illustrate an enterprise in a plurality of sub-network architectures providing two paths from C1 to a quantity in accordance with one or more embodiments of the present invention; Application. For example, a computer. When it is more suitable, the receiver can reach and pass through one of the strongest plans to have addressable at the beginning, and the weak connection between the ports is used to match the weak users on the server. An efficient transportation mechanism for transporting status information between the mobile phone and the server. Examples of e-mail applications (eg, SMTP) are illustrated using the SIP-NOTIFY method to tunnel application layer packets without knowing the SMTP application. The presence of the presentation layer encapsulation application on the user does not have to be changed to provide continuity of conversation. Advantageously, mobile applications use the above approach to achieve enterprise security that is safer and easier to manage. This approach also enables VoIP vendors to extend their mobility solutions to different enterprise applications. Features and advantages of the present invention will become more apparent from the following description and discussion. Figure 20 is a diagram showing an example of a conventional technique in which the respective applications on the mobile phone are individually connected to the corresponding application server in the enterprise. The mobile phone 2000 may include a plurality of application users including Divi t as User 2002, CRM (Customer Relationship Management) application user 2 006, and mail application user 2 008, but is not limited thereto. Application users can interact with each other independently or through the Application Agreement Interface (API). In one example, application users 2006 and 2008 can interact with Divitas User 2002 via API 2010 and API 2012, respectively. Application users in Mobile Phone 2000 can interact with application servers within Enterprise 2090. The enterprise 2090 can include a plurality of application servers including, but not limited to, a Divitas server 2022, a CRM application server 2026, and a mail application server 2 028. The application server can interact with each other independently or through the -83-200816753 API. In one example, application servers 2026 and 2028 can interact with Divitas server 2022 via API 2030 and API 2032, respectively. It should be noted that the purpose of the API is to enable applications to interact with each other. However, because the applications are independent of each other, the interaction through the API is arbitrary. Assume that a stockbroker on mobile phone 2000 can communicate with its users via Divitas user 2 0 02. Despite talking to their users, stockbrokers want to get their users' portfolios at their fingertips. In this case, the stock broker must establish two different conversations. Stockbrokers can establish a first dialogue to enable them to talk to their users through Divitas users 2002. To mention the portfolio, the stockbroker can establish a second conversation by utilizing the CRM application user 2006 to interact with the CRM application server 2026 under the firewall 2040 within the enterprise 2090. In a typical Secure Sockets Layer (SSL) virtual private network (VPN) environment, network managers must establish different configurations for each established channel. In order to establish two different conversations, two separate security channels must be established. In one example, a new mail application user has been added to the phone. In order to communicate with a mail application server located within the corporate firewall, the network administrator must establish a new secure channel. Thus, in a typical SSL VPN environment, a user must establish multiple sessions that require multiple start communication commands and make the business more vulnerable to security risks. The SSL VPN environment is not only inconvenient for users, but this type of environment also requires more human resources to manage the security of the enterprise's network environment. To minimize the number of secure channels established, the Internet-84 - 200816753 Protocol (IP) Security Gateway can be used instead of SSL. In a 1P secure VPN environment, one or more application users on the handset can interact with the application server through a secure channel across the IP security user 2014 and the IP security gateway 2030. In order to establish a secure channel, the user must first provide authentication information (eg, username, password, etc.). Once a secure channel has been established, the user is also responsible for the certification each time a different application user is utilized. In other words, each application user can be configured to communicate with its corresponding application server via a different IP address. In one example, the CRM application user 2006 wants to interact with the application server 2026. If Secure Channel 2084 has not been established, the user must first provide authentication information. Once the secure channel 2 0 8 4 has been established, in order for the CRM application user 2006 to interact with the CRM application server 2026, the user must provide additional authentication material. In addition, new security channels and re-authentication must occur every time the conversation is interrupted. In an example, if the user is moving during the conversation, if the connection is not visible, the user is at risk of a sudden interruption from the conversation. For example, users connected via a Wi-Fi network will traverse the Wi-Fi network. The conversation will be interrupted and the user must establish another conversation, such as a cellular connection. As a result, the user is disturbed by the inconvenience of establishing a new conversation and is also frustrated by limited mobility. Providing conventional techniques Figure 2 1 illustrates how an application user interacts with an application server. Figure 21 is a flow diagram of a prior art process for enabling an application user to communicate with an application server in an ip secure VPN environment. Figure 21 discusses Figure 20. -85- 200816753 Suppose the user of the mobile phone 2 0 〇 想要 wants to use the mail application user to send an email. In a first step 2102, the email material traffic is sent to the application server. In one example, the mail application user 2008 can send an email message packet to the mail application server 2 0 2 8 in the enterprise 2090. In the next step 2104, the IP Security Client (IP Security Client) 2014, which can check to determine how to route traffic, receives the electronic material. The IP Security User 2014 can analyze each packet to determine if the packet is a packet that the enterprise 2090 wants. The IP Security User 2014 can identify the recipient of the packet by analyzing the IP address and the 埠 number located in the packet. If the recipient of the email data traffic is not one of the plurality of application server sinks in the enterprise 2000, then in the next step 2106, the IP security user 2 0 1 4 may discard traffic or bootable email traffic to no The server is located in the enterprise 2 090. How to handle e-mail traffic that is not the application server in enterprise 2090 depends on how the IP security user 20 i 4 group is configured to handle non-enterprise data traffic. If IP Security User 2014 determines that the data traffic is what the application server in Enterprise 2090 wants, then in the next step 2 1 0 8 , IP Security User 2014 can encrypt each data packet before forwarding the data packet. . Encrypting the processing of individual data packets requires that the mobile phone 2000 have sufficient CPU processing power. In addition, the requirement to encrypt individual data packets in an IP-secured VPN environment can create potential problems in voice communication situations such as voice over Internet Protocol (VoIP) communication sessions. In other words, the speech quality during the voice communication session is severely degraded, resulting in poor voice communication experience (eg, echoes in the background, inaudible conversations, etc.). In the next step 2110, the IP Security Client 2014 can send the encrypted traffic along the secure channel 2084 to the desired application server. As mentioned above, the secure channel must establish a secure channel each time a new application is utilized. In one example, IP Security User 2014 can send encrypted traffic to Enterprise 2090's IP Security Gateway 2030 via network 2050 and firewall 2040. In the next step 21 12, the IP security gateway 203 0 performs a check to decide how to route the traffic. Similar to IP Security User 2014, IP Security Gateway 2030 analyzes each packet to determine if the packet is what Enterprise 2090 wants. If the received data packet is occasionally not an encrypted IP security packet, then in a next step 2114, the IP security gateway 2030 discards the packet. If the data packet is an encrypted IP security packet, then in a next step 21 16 the IP security gateway 2030 may decrypt the traffic. Once the packet has been unsealed, the IP Security Gateway 203 0 analyzes the packet to identify the IP address and port number of the received application server. In the next step 21 18, the IP security gateway 2030 forwards the data packet to the appropriate application server (e.g., mail application server 202 8). The method described in step 2 1 02 to 2 1 1 8 is continuous processing and is performed for each packet received by the application user. There are several disadvantages to the prior art. In one example, each new application user added to the -87-200816753 user's mobile phone must be configured differently. When new application users are added, the management of various application users and their corresponding application servers leads to a more complex setup network environment, which is costly to maintain. Furthermore, the user must be responsible for performing multiple certifications, thus requiring the user to remember the multiple authentication materials. In addition, the benefits of operating in an IP-secured VPN environment are reduced due to the need to encrypt data traffic, resulting in increased hardware costs (eg, the handset must have sufficient CPU processing power) and potential factors. In addition, the user will be frustrated by the limited mobility provided, and each time the g tongue is interrupted, the user must re-establish the connection and re-authenticate. In one aspect of the present invention, the inventors herein implement a prior art architecture configuration that integrates multiple authentications and/or multiple secure channels to create an environment in which a single communication command is initiated. In other words, the inventors have realized that data traffic from multiple applications can be transmitted by grouping applications into a single application (eg, Divitas user) and a single server (eg, Divitas server) to direct their data traffic. A single secure channel is sent without requiring the user to perform multiple authentications. In addition, the loss of dialogue can be significantly reduced without sacrificing mobility. In accordance with an embodiment of the present invention, an Active Architecture configuration is provided by implementing a Divitas Protocol Proxy Servant (DPP). In an embodiment, the DPP includes a user DPP and a server DPP. In an embodiment of the invention, the handset may include an active user (eg, a Divitas user, which may include the user Dpp to manage connectivity between the handset and the mobile server (eg, Divitas server). In the present embodiment, the mobility server may include a server DPP to manage connectivity between the line server and the handset. In an embodiment of the invention 'and the server DPP may include a plurality of sub-users/servers DPP is managed by the type of agreement (eg, SIP, SMTP, etc.) In an embodiment of the invention, DPP is able to interact with each application and its corresponding application server to establish a single secure channel. Each application is routing via a common DPP. Its data flow, so it can now manage the connectivity between the mobile phone and the mobile server. The connection can include a secure channel between the control protocol mobile phone and the mobile server such as SIP (Dialog Start Protocol). Decide when and how to connect your phone. In addition, when connectivity information can be sent from one network to another (eg, from Wi-Fi) To the cellular network, the feature points of the present invention can be more clearly understood by referring to the following drawings and discussions between different networks. FIG. 2 is a configuration of a mobile architecture in an embodiment of the present invention. Block diagram. In the mobile architecture configuration 2200, the Divitas server 2218 in the mobile phone 2 2 2 2 and 2216 (eg, mobile server. The mobile phone 2202 can include Divitas user 2204 (eg, mobile) and Multiple application users (2206 and 2208). In the present embodiment, Divitas user 2204 may include user DPP to manage connectivity between the mobile server and the mobile server. Unlike conventional techniques, application users 2 2 0 6 and the user of the application of the dynamic user, because the DPP resource is used to be used, including the network) and the simple and easy enterprise, the interoperability of the mobile phone program-89-200816753 users 2208 are not grouped directly with their corresponding applications. The program server (222 0 and 2222 ) interacts. In one embodiment, instead, various different configurations for individual application users can be simplified to direct all data traffic to a single regional IP host 2210 associated with Divitas User 2204 (eg, 127.0.0. 1 IP address). In other words, data traffic from application users 2206 and 2208 can now be combined to be routed to Divitas User 2204 via APIs 2212 and 2214. From Divitas User 2204, all data traffic can then be routed through the network 2224 (e.g., the Internet) via the intranet 2216 Divitas Server 2218. In an embodiment of the invention, the Divitas server 2218 may include a server DPP to manage connectivity between the handset and the mobile server. Once the D 2 server has received the data traffic, the J2 server can properly route traffic to the corresponding application servers (2220 and 2222) via APIs (2232 and 2234). Assume that the user of the handset 2202 wants to send an email by utilizing the application user 2206. Since the application user 2206 has been configured to send all data traffic to the zone to host 22 1 0, the data traffic from the application user 2206 is sent via the API 2212 to the zone IP host 2210 associated with the Divitas user 2204. When receiving traffic from application user 2206, Divitas User 2204 can use Divitas Data Exchange (DDX) to encapsulate traffic within the SIP Notify Message. As discussed herein, DDX refers to the protocol used to transfer data packets between a handset and a server. When encapsulating a data packet, DDX adds a new tag that adds information about the application user who sent the data stream -90-200816753. Unlike conventional techniques, all data packets are not encrypted. Instead, the data packet is encrypted depending on the preferences specified by the application user. In an embodiment of the invention, the newly added DDX is encrypted. Once the data packet has been encapsulated within the SIP Notify Message, the encapsulated data packet is now forwarded to the Divitas server 2218 along the security channel 2250 including the traversing network 2224. It should be noted that if the enterprise is protected by one or more security modules (eg, firewall 2 2 2 6), the data packet must also traverse one or more security modules. Once the data packet has been received by the Divitas server 2218, the Divitas server 22 18 can utilize the DDX tag to retrieve the location of the application server. In an example, the DDX tag can include an identification number (eg, MAC address, 埠 address) that indicates which application server (eg, application server 2220) in the enterprise is the desired data packet reception. By. In an embodiment, the mobility architecture configuration manages connectivity between the handset and the mobile server. In an embodiment, the mobile architecture configuration may utilize control protocols utilized by general handsets such as SIP. In a mobile architecture configuration, in order to establish a secure channel, the user must only perform a manual authentication. In other words, once a secure channel has been established between the mobile phone and the mobile server, there is no need to create another security every time the application user (2206 and 2208) wants to interact with the application server (2220 and 2222). aisle. In the usual case, the mobile architecture configuration can also include a database. This -91 - 200816753 database includes certification materials for each application user. Thus, each time a different application user is utilized, in one embodiment, the mobility architecture configuration can utilize the application specific credentials stored in the database to automatically authenticate the user. From the user's point of view, the mobility architecture configuration is essentially a single start communication command environment. Advantageously, the 'actual architecture configuration is generally time and effort efficient' network administrators must spend on assembling individual application users. Network administrators can largely eliminate this process by assembling individual application users to interact with the regional host, instead of adding a new application each time a user has to establish a new secure channel to the phone. In addition, with a single start communication command, network managers can substantially reduce the time and cost associated with managing security. The mobile architecture configuration can be implemented as a rich or weak user. Figure 2 is a block diagram of an active architecture configuration as a rich user in an embodiment of the present invention. As discussed in this article, rich users mean that user DPP and server DPP not only manage a variety of different applications but also provide support to at least one or more application user functions (eg, voice application users, instant messaging application users). Mobile architecture configuration for email applications, email applications, etc.) Assume, for example, that the user of the mobile phone 23 02 wants to retrieve the mail application server 2326 from the enterprise 2318 using the mail application user 2310 (eg, Microsoft® Outlook, etc.) (eg,

Micro so ft® Exchange伺服器等)之電子郵件的情況。將連 同圖24 —且討論圖23。圖24爲本發明的實施例中之圖解 -92- 200816753 利用行動性架構配置的方法之例子的簡易流程圖。 在第一步驟2 4 0 2中,應用程式用戶發送資料流量到 D i v i t a s用戶的區域主機。在行動性架構配置中,應用程 式用戶2310已被配置成經由位在Divitas用戶23 04內的 區域主機2308路由其資料流量。在一例子中’應用程式 用戶2310可透過TCP-IP發送SMTP (簡單郵遞傳輸協 定)資料封包 2312到 Divitas用戶 2304。可由位在 Divitas用戶2304中的SMTP代理用戶2306 (如、子用戶 DPP)接收SMTP資料封包2312。 在一實施例中,用戶DPP可包括複數子用戶DPP。用 於處理資料流量的代理用戶類型可視應用程式用戶類型而 定。在本發明的實施例中,資料封包包括應用程式用戶特 有的埠號碼。在一例子中,SMTP資料封包2312包括下面 的資料一127.0.0.1 /25。在此例中,號碼127.0.0.1是區域 主機2 3 0 8特有的IP位址,且號碼25表示在此例中與 SMTP代理用戶23 06相關聯的埠號碼。 在下一步驟2404中,資料流量可被封裝當作具有 DDX標記的SIP Notify Message。換言之,當接收資料封 包2312時,Divitas用戶23 04 將SMTP資料封包23 3 0重 新格式化成透過諸如SIP等手機的控制協定可傳輸之SIP 資料封包2330 (諸如SIP Notify Message等)。在本發明 的實施例中,SIP資料封包 23 3 0包括具有 DDX標頭 23 3 0a和SIP標頭23 3 0b之原始資料封包(如、資料封包 23 12 )。如上述,DDX標頭包括應用程式伺服器特有的特 -93- 200816753 有識別號碼。在本發明的實施例’依據包括在SMTp資料 封包中的埠號碼可產生特有識別號碼。在本發明的實施例 中,額外的標記可包括在格式化資料封包中以辨識如何運 輸格式化資料封包。在例子中,運輸協定標記23 3 〇c可以 是UDP-IP運輸標記。 在本發明的實施例中,可將SIP資料封包23 3 0的一 或多個部分加密。在一實施例中’即使資料封包的剩餘部 分不被加密,仍將DDX部分加密。 在下一步驟2406中,Divitas用戶可發送資料封包到 Divitas伺服器。一旦已將資料封包2312重新格式化成 SIP資料封包23 3 0 (如、被封裝當作SIP Notify Message (通知訊息)),則可透過安全通道23 5 0經由網路2314 及/或防火牆23 16發送SIP資料封包23 3 0到Divitas伺服 器 2320 。 在下一步驟2408中,Divitas伺服器可檢查以決定進 來的資料封包是否是SIP Notify Message。若進來的資料 封包不是SIP Notify Message,則在下一步驟2410中,可 丟棄資料封包。 然而,若進來的資料封包是 SIP Notify Message,則 在下一步驟2412中,Divitas伺服器可藉由檢查DDX標 記以檢查預期的代理伺服器。在一實施例中,Divitas伺 服器必須解密DDX封包以讀取儲存在DDX封包中的資 訊。在一例子中,依據DDX標記中的特有辨識號碼, Divitas伺服器23 20知道路由資料封包23 3 0到SMTP代理 -94 - 200816753 伺服器2 3 2 2。在本發明的實施例中,伺服器D P P可包括 複數子伺服器D P P。在本發明的實施例中,處理進來流量 的代理伺服器類型是資料流量類型而定。 在下一步驟2 4 1 4中,可將資料封包路由到代理伺服 器。因爲SIP資料封包2330是SMTP資料封包,所以由 位在Divitas伺服器2320內部的SMTP代理伺服器23 22 處理格式化資料封包(如、子伺服器DPP )。 在下一步驟2416中,將資料封包路由到預期的應用 程式伺服器。在本發明的實施例中,SMTP代理伺服器 23 22可將SIP資料封包23 3 0轉換成接受應用程式伺服器 可接受的格式。在一例子中,可將SIP資料封包23 3 0從 SIP Notify Message轉換成SMTP資料封包2328。另外可 將DDX部分丟棄。另外,可將傳送協定從UDP-IP改成 TCP-IP,後者更有利於透過API 2332部署電子郵件資料 流量到各自的應用程式伺服器(如、郵件應用程式伺服器 2326 )。 圖24所說明的方法步驟不圖示資料封包的加密及/或 解密。在一實施例中,可在不加密之下發送資料封包。加 密的要求是隨意的,可視使用者的要求而定。在一實施例 中,可將部分或整個資料封包加密。在一實施例中,可將 DDX部分加密,而保持資料封包的剩下部分不加密。隨意 的加密使欲利用的處理功率變少且減少通常與經加密資料 封包相關聯的潛在因素。 如從圖2 3及2 4可看出一般,豐富行動性架構配置可 - 95- 200816753 充作使手機的應用程式用戶能夠在單一開始通信指令環境 內與應用程式伺服器戶動之行動性管理器。另外,豐富的 行動性架構配置可包括用以將來自各種應用程式的資料封 包轉換成能夠由已建立的安全通道所特有之控制協定和運 輸協定來運輸的資料封包。 在本發明的實施例中,如圖2 5所示,行動性架構配 置可被實施作薄弱用戶。在薄弱行動性架構配置中,用戶 DPP和伺服器DPP可只被利用當作行動性管理器(如、管 理應用程式的連接性),及不提供支援給至少一或更多應 用程式功能。 假設例如手機2 5 00的使用者想要打電話給朋友的情 況。使用者可利用電話應用程式用戶 2508 (如、VoIP 等)打電話。在此例中假設已在Divitas用戶25 02和位在 企業25 3 0內的Divitas伺服器2518之間建立安全通道 2550 〇 爲了建立電信對話,電話應用程式用戶2 5 0 8可發送 資料封包2512 (如、SIP/UD-IP)到Divitas用戶2502內 的區域主機2510。如上述,複數代理用戶可駐在Divitas 用戶2502內以支援各種不同的應用程式用戶。在一例子 中,SIP代理用戶2504可位在Divitas用戶2502內以處 理來自電話應用程式用戶2508的資料封包。 在接收資料封包2512時,SIP代理用戶25 04可分析 資料封包以決定如何路由封包。如上述,可發送到 Divitas用戶的資料封包可包括應用程式伺服器特有的埠 -96- 200816753 號碼(如、5060等)。利用此資訊,Divitas用戶2502可 經由網路2 5 1 4和防火牆2 5 2 8路由資料封包2 5 1 2到 Divitas伺服器25 1 8。在一實施例中,若資料封包已經在 Divitas用戶可路由的格式,則不必轉換資料封包。在一 例子中,資料封包2512示在SIP/UDP-IP格式,此格式是 Divitas用戶25 02可用來路由其資料流量之格式。 在一貫施例中’複數代理伺服器可駐在D i v i t a s伺服 器內。在例子中,SIP代理伺服器253 2可駐在Divitas伺 服器2518內,以管理從電話應用程式用戶2508進來的資 料流量。因爲已從電話應用程式用戶2 5 0 8發送資料封包 2 5 1 2,所以由S IP代理伺服器2 5 3 2處理資料封包。當接 收資料封包2512時,SIP代理伺服器25 3 2可透過電話閘 道器2520 (如、PSTN、GSM、CDMA等)沿著路徑2522 轉寄資料封包25 1 2到目的地電信裝置(如、電話等)。 一旦已在手機25 00和目的地電信裝置之間建立電信對 話,則由電話應用程式用戶發送的其他資料封包2 5 3 0 (如、RTP資料封包等)可經由安全通道2 5 5 0沿著路徑 2 560發送到Divitas伺服器25 1 8,而不必經過Divitas用 戶 25 02。 在薄弱行動性架構配置中,藉由Divitas用戶的幫助 建立電信交談的目的係使應用程式用戶能夠利用Divitas 用戶的行動性功能。換言之,已在Divitas用戶和Divitas 伺服器之間建立控制中心以監視應用程式用戶的連接性。 藉由建立此關係,當情況發生時,Divitas用戶和Divitas -97- 200816753 伺服器能夠共用其連接性狀態,並且能夠無縫地處理漫 遊。 在例子中,上述情況中的使用者目前可經由W i _ F i網 路連接。在電話交談期間,使用者可漫遊到Wi-Fi網路 外。在習知技術中,連接可能中斷而使用者必須重撥。然 而,在行動性架構配置中,使用者的手機之連接性狀態已 被監視,並且Divitas用戶和Divitas伺服器可在使用者未 察覺變化之下,執行無縫網路交換(如、從Wi_Fi到蜂巢 式網路)。 有利地是,已投入大量金錢到複數應用程式和只需要 行動性管理器之企業可實施薄弱行動性架構配置。如此, 企業能夠利用行動性架構配置的行動性管理器性能而不必 重新建構其電信基礎建設。 如從本發明的實施例可明白一般,具有DPP的行動性 架構配置提供能夠使電信基礎建設流暢之行動性管理器。 換言之,行動性架構配置提供單一開始通訊指令的環境。 在例子中可利用單一安全通道達成相同功能以取代企業的 多個安全通道。利用單一開始通訊指令的環境,可大幅降 低管理電信基礎建設的成本和精力。另外,行動性架構配 置能夠監視且無縫地處理連接性,而不會負面地影響使用 者的電信經驗。 F.結論 儘管已利用幾個較佳實施例說明本發明,但是可有落 -98- 200816753 在本發明的範圍內之修改、變更、及同等物。亦應注意的 是,有許多實施本發明的方法和設備之其他方式。而且’ 可在其他應用中發現本發明的實施例之效用。爲了方便’ 本文提供抽象槪念,由於字數限制,因此僅爲了閱讀方便 而並非用於限制申請專利範圍的範疇。因此,下面附錄的 申請專利範圍應解釋作包括落在本發明的真正精神和範疇 之所有此種修改、變更、及同等物。 【圖式簡單說明】 經由例子圖解說明本發明,但是並非限制,在附圖的 圖式中,相同參照號碼意指類似元件,其中: 圖1爲根據本發明的一或多個實施例之系統網路圖。 圖2A-C爲根據本發明的一或多個實施例之行動性伺 服器圖。 圖3爲根據本發明的一或多個實施例之行動性配備用 戶圖。 圖4爲根據本發明的一或多個實施例之以編碼/解碼 器爲基的回音消除器之方塊圖。 圖5 A爲根據本發明的一或多個實施例之語音跳動緩 衝計畫圖。 圖5 B爲根據本發明的一或多個實施例之語音跳動緩 衝計畫圖。 圖6A爲根據本發明的一或多個實施例之DDP架構的 槪要圖。 -99- 200816753 圖6 B爲根據本發明的一或多個實施例之D D P訊息交 換圖。 圖7A爲每一主機包括兩網路介面且根據本發明的一 或多個實施例所製造之網路架構圖。 圖7B爲根據本發明的一或多個實施例所製造之網路 架構圖。 圖7 C爲根據本發明的一或多個實施例所製造之網路 架構圖。 圖7D爲根據本發明的一或多個實施例所製造之網路 架構圖。 圖8A爲包括回音消除濾波器之示範性習知技術通訊 裝置的方塊圖。 圖8B爲用於例如圖8A所示的示範性習知技術通訊裝 置作爲消除回音之示範性習知技術方法的流程圖。 圖9 A爲根據本發明的一或多個實施例之在未依賴濾 波器之下取消回音的通訊裝置(或系統或配置)之方塊 圖。 圖9B爲根據本發明的一或多個實施例之用於圖9A所 示的通訊裝置(或系統或配置)之ID碼產生器的方塊 圖。 圖9C爲根據本發明的一或多個實施例之例如圖9A所 示的通訊裝置(或系統或配置)之用以消除回音的方法之 流程圖。 圖1 0 A爲具有適應性跳動緩衝計畫的第一示範性習知 -100 - 200816753 技術封包語音通訊系統(第一習知技術配置)之方塊圖。 圖1 0B爲用於例如圖1 0A的例子中所示之第一習知技 術配置的習知技術跳動緩衝計畫之發送器側處理的流程 圖。 圖1 0C爲習知技術延遲計算處理的流程圖。 圖1 0D爲習知技術封包實施控制處理的流程圖。 圖1 0E爲當打開發送器側語音活動偵測器(VAD )時 的封包實施控制中之所接收封包流程的槪要表示圖。 圖1 〇F爲關掉發送器側VAD時的封包實施控制中之 所接收封包流程的槪要表示圖。 圖1 1 A爲包括適應性緩衝器溢位控制之第二習知技術 封包語音通訊系統(第二習知技術配置)的接收器側裝置 之方塊圖。 圖1 1 B爲用於例如圖1 1 A之例子所示的接收器側裝置 之無腎偵測處理的流程圖。 圖1 1 C爲用於例如圖1 1 A之例子所示的接收器側裝置 之緩衝器溢位控制處理的流程圖。 圖1 2 A爲根據本發明的一或多個實施例之具有適應性 跳動處理封包語音通訊系統的接收器側裝置之方塊圖。 圖1 2B爲根據本發明的一或多個實施例之用於例如圖 1 2 A之例子所示的接收側裝置之適應性跳動處理所利用的 延遲插入控制處理圖。 圖1 3爲根據本發明的一或多個實施例之具有適應性 跳動處理的封包語音通訊系統之接收器側裝置的方塊圖。 -101 - 200816753 圖1 4爲在應用程式用戶與應用程式伺服器之間建立 連接的電話流程之習知技術例子圖。 圖15爲本發明的實施例之DDP發明的簡易架構圖。 圖1 6A爲實施例中之具有DDP的行動性架構配置內 之資料如何在位於用戶裝置內的應用程式用戶與企業所管 理之應用程式伺服器之間流動的例子圖。 圖1 6B爲實施例中之封裝式SIP通知訊息的碼例子 圖。 圖1 7爲實施例中之圖解如何在用戶裝置與行動性伺 服器之間建立安全通道的電話流程之例子圖。 圖1 8爲實施例中之圖解必須發送大的檔案之情況的 簡易電話流程圖。 圖1 9爲本發明的實施例中之圖解可發送諸如由控制 應用程式所發送者等小的控制訊息之情況的簡易電話流程 圖。 圖20爲將手機上的各個應用程式個別連接到企業內 的對應應用程式伺服器之架構配置的習知技術例子圖。 圖21爲使應用程式用戶能夠在IP安全VPN環境中與 應用伺服器通訊之方法的習知技術流程圖。 圖22爲本發明的實施例中之行動性架構配置的簡易 方塊圖。 圖23爲本發明的實施例中之行動架構配置當作重負 載用戶端的方塊圖。 圖24爲本發明的實施例中之利用行動性架構配置的 -102- 200816753 方法之例子的簡易流程圖。 圖2 5爲本發明的實施例中之行動性架構配置被實施 當作輕負載用戶端之圖。 【主要元件符號說明】 1 〇 〇 :系統網路 102 :行動配備 1 1 〇 :蜂巢式網路 1 1 2 :基地收發站 1 1 4 : B T S交換中心 1 1 6 :行動交換中心 120 :媒體閘道器 122 :公用交換電話網路 124 :習知公用和專用電話 130:專用分支交換機 1 3 2 :路由器 1 3 6 :電話 1 3 7 :電話 1 3 8 :網際網路協定廣域網路 1 4 0 :路由器 142 :防火牆 144 :網際網路 1 5 0 :行動性伺服器 1 6 0 :存取點 - 103- 200816753 1 8 0 :存取點 800 :習知技術通訊裝置 802 :信號接收器 806 :揚聲器 8 0 8 :回音路徑 810 :麥克風 8 1 2 :緩衝器 8 1 4 :濾波器 8 1 4 :回音消除器 8 1 6 :總和函數 900 :通訊裝置 9 0 4 :信號接收器 906 :背景雜訊去除器 9 0 8 :回音路徑 9 1 0 :辨識碼注入器 914 :揚聲器 916 :麥克風 922 :辨識碼產生器 924 :辨識碼偵測器 926 :緩衝器 92 8 :延遲器 9 3 0 :總和函數 93 2 :信號發送器 1 0 0 0 :速度緩衝器 -104 200816753 1001 : 1 002 : 1 003 : 1 004 : 1 005 : 1 006 : 1 007 : 1 008 : 1 009 : 1 080 : 1 080a 1 082 : 1 084 : 1 086 : 1 086a 1 08 8 : 1 090 : 1091 : 1 092 : 1 092a 1 094 : 1 096 : 1 098 : 1100: 語音活動偵測器 發送器 網路 封包緩衝器 封包實施控制器 延遲插入控制器 延遲資訊模組 跳動計算機 實施延遲計算機 語音封包 :封包 無聲描述符 無聲 語音封包 =封包 無聲 無聲描述符 發送器側裝置 接收器側裝置 :語音封包 無聲封包 語音封包 無聲封包 接收器側裝置 -105 200816753 1102 :封包緩衝器 1104 :封包實施控制器 1108 :延遲插入控制器 1 η 〇 :跳動計算機 1 η 4 :緩衝器溢位控制器 1 1 1 6 :無聲偵測器 1 1 1 8 :解碼器 1 1 8 0 :附加組件 1 199 :鏈路 1 200 :接收器側裝置 1 202 :封包緩衝器 1 204 :跳動計算機 1 2 0 6 :實施延遲計算機 1 208 :封包實施控制器 1 2 1 0 :解碼器 1 2 1 2 :無聲偵測器 1 2 1 4 :延遲插入控制器 1 2 1 6 :延遲資訊模組 1299 :鏈路 1 3 00 :接收側裝置 1 3 02 :封包緩衝器 1 3 04 :跳動計算機 1 3 06 :補償計算機 1 3 08 :封包實施控制器 -106- 200816753 1 3 1 0 :解碼器 1 3 1 2 :視頻偵測器 1 3 1 4 :補償控制器 1 3 1 6 :鏈路補償資訊模組 1399 :鏈路 1 402 :應用程式伺服器 1 404 :應用程式用戶 1 406 :軟體下載 1 4 2 4 :通知 1 5 02 :企畫管理應用程式 1 5 04 :裝置管理應用程式 1 5 06 :語音行動性控制應用程式用戶 1 5 0 8 :語音郵件/電子郵件傳輸應用程式 1 5 1 0 :裝置影像管理應用程式 1 5 1 2 :即時訊息應用程式 1 5 1 4 :戴維他資料交換模組 1 5 1 6 :可靠戴維他描述協定模組 1 5 1 8 :優先權訊息排程模組 1 5 20 :內建對話管理模組 1 5 22 :具有安全延伸的戴維他描述協定模組 1 524 :控制協定 1 5 2 6 :傳輸控制協定 1 5 2 8 :使用者資料元協定 1 5 3 0 :傳輸控制協定 -107- 200816753 1 5 3 2 :對話啓動協定 1 5 3 4 :使用者資料元協定 1 5 3 6 :戴維他描述協定 1 602 :語音郵件用戶 1 604 :語音郵件伺服器 1 608 :伺服器戴維他資料交換模組 1 6 1 4 :伺服器可靠戴維他描述協定模組 1 6 1 6 :伺服器戴維他描述協定 1 620 :伺服器對話啓動協定控制協定 1 622 :伺服器使用者資料元協定傳輸協定 1624:網路 1 626 :用戶使用者資料元協定傳輸協定 1 628 :用戶對話啓動協定控制協定 1 63 2 :用戶戴維他描述協定 1 634 :用戶可靠戴維他描述協定 1 63 6 :用戶戴維他資料交換模組 1 6 5 0 :路徑 1 652:路徑 1 700 :企業伺服器 1 702 :用戶裝置 1 704 :使用者/裝置管理器 1 706 :戴維他描述協定 1 708 :分散式資料處理系統 1 7 1 0 :對話啓動協定 -108- 200816753 1 7 1 2 :使用者資料元協定 1 7 1 4 :使用者資料元協定 1 7 1 6 :對話啓動協定 1 7 1 8 :分散式資料處理系統 1 720 :戴維他描述協定 1722:應用程式用戶 1 802 :影像管理器 1 804 :裝置/使用者管理器 1 8 06 :伺服器戴維他資料交換模組 1 8 0 8 :伺服器戴維他描述協定 1 8 1 0 :用戶戴維他描述協定 1 8 1 2 :用戶戴維他資料交換模組 1 8 1 4 :應用程式用戶 1 8 1 6 :請求 1 902 :伺服器出席管理器 1 904 :裝置/使用者管理器 1 906 :伺服器戴維他描述協定 1 9 0 8 :用戶戴維他描述協定 1910:用戶出席管理器 1 9 2 0 :出席詢問 2 0 0 0 :手機 2002 :戴維他用戶 2006 :客戶關係管理應用程式用戶 2008 :郵件應用程式用戶 -109- 200816753 2010 :應用程式協定介面 20 12 :應用程式協定介面 2014 :網際網路協定安全用戶 2022 :戴維他伺服器 2026 :客戶關係管理應用程式用戶 2028 :郵件應用程式伺服器 203 0 :網際網路協定安全閘道器 203 0 :應用程式協定介面 203 2 :應用程式協定介面 2040 :防火牆 2 0 5 0 :網路 2084:安全通道 2 0 9 0 :企業 2200 :行動性架構配置 2 2 0 2 :手機 2204 :戴維他用戶 2206 :應用程式用戶 2208 :應用程式用戶 2210 :區域網際網路協定主機 2212 :應用程式協定介面 22 14 :應用程式協定介面 2216 :企業 2218 :戴維他伺服器 2220 :應用程式伺服器 -110- 200816753 2222 :應用程式伺服器 2224 :網路 2226 :防火牆 2232 :應用程式協定介面 2234 :應用程式協定介面 2250 :安全通道 2 3 0 2 :手機 23 04 :戴維他用戶 2 3 06 :簡單郵遞傳輸協定代理用戶 2 3 0 8 :區域主機 2310 :郵件應用程式用戶 23 12 :簡單郵遞傳輸協定資料封包 2 3 1 4 :網路 2 3 1 6 :防火牆 23 1 8 :企業 2320 :戴維他伺服器 2 3 22 :簡單郵遞傳輸協定代理伺服器 23 26 :郵件應用程式伺服器 2 3 2 8 :簡單郵遞傳輸協定資料封包 2 3 3 0 :對話啓動協定資料封包 23 3 0a :戴維他資料交換標頭 23 3 0b :對話啓動協定標頭 23 3 0c :運輸協定標記 23 3 2 :應用程式協定介面 -111 - 200816753 23 5 0 :安全通道 2500 :手機 25 02 :戴維他用戶 2504 :對話啓動協定代理用戶 25 0 8 :電話應用程式用戶 2 5 1 0 :區域主機 2512 :資料封包 2 5 1 4 :網路 2518 :戴維他伺服器 2520 :電話閘道器 2522 :路徑 2 5 2 8 :防火牆 2530 :企業 25 3 2 :對話啓動協定代理伺服器 25 5 0 :安全通道 2552:應用程式協定介面 2 5 6 0 :路徑 25 62 :即時協定 X :信號 y ’ :信號 y 1 :信號 z :信號 -112-The case of emails such as Micro so ft® Exchange servers. Figure 24 - and Figure 23 will be discussed. Figure 24 is a simplified flow diagram of an example of a method for configuring with an active architecture in the embodiment of the present invention -92-200816753. In the first step 2402, the application user sends the data traffic to the regional host of the user. In the mobile architecture configuration, the application user 2310 has been configured to route its data traffic via the regional host 2308 located within the Divitas user 23 04 . In one example, the application user 2310 can send an SMTP (Simple Mail Transfer Protocol) data packet 2312 to Divitas User 2304 over TCP-IP. The SMTP data packet 2312 can be received by an SMTP proxy user 2306 (e.g., sub-user DPP) located in the Divitas user 2304. In an embodiment, the user DPP may include a plurality of sub-user DPPs. The type of proxy user used to process data traffic depends on the type of application user. In an embodiment of the invention, the data packet includes a UI number unique to the application user. In one example, the SMTP data packet 2312 includes the following information one 127.0.0.1 /25. In this example, the number 127.0.0.1 is the IP address unique to the regional host 2 308, and the number 25 indicates the 埠 number associated with the SMTP proxy user 236 in this example. In the next step 2404, the data traffic can be encapsulated as a SIP Notify Message with a DDX tag. In other words, when receiving the data packet 2312, the Divitas user 23 04 reformats the SMTP data packet 23 3 0 into a SIP data packet 2330 (such as SIP Notify Message, etc.) that can be transmitted via a control protocol such as a SIP handset. In an embodiment of the invention, the SIP data packet 23 3 0 includes a source data packet (e.g., data packet 23 12 ) having a DDX header 23 3 0a and a SIP header 23 3 0b. As mentioned above, the DDX header includes an application server-specific special-93-200816753 with an identification number. In the embodiment of the present invention, a unique identification number can be generated based on the 埠 number included in the SMTp data packet. In an embodiment of the invention, additional indicia may be included in the formatted data packet to identify how the formatted data packet is to be transported. In the example, the transport agreement mark 23 3 〇c may be a UDP-IP transport mark. In an embodiment of the invention, one or more portions of the SIP data packet 23 30 may be encrypted. In one embodiment, the DDX portion is encrypted even if the remainder of the data packet is not encrypted. In the next step 2406, the Divitas user can send a data packet to the Divitas server. Once the data packet 2312 has been reformatted into a SIP data packet 23 3 0 (eg, encapsulated as a SIP Notify Message), it can be sent over the secure channel 23 50 via the network 2314 and/or the firewall 23 16 SIP data packet 23 3 0 to Divitas server 2320. In the next step 2408, the Divitas server can check to determine if the incoming data packet is a SIP Notify Message. If the incoming data packet is not a SIP Notify Message, then in the next step 2410, the data packet may be discarded. However, if the incoming data packet is a SIP Notify Message, then in the next step 2412, the Divitas server can check the expected proxy server by checking the DDX flag. In one embodiment, the Divitas server must decrypt the DDX packet to read the information stored in the DDX packet. In one example, based on the unique identification number in the DDX tag, the Divitas server 23 20 knows the routing data packet 23 3 0 to the SMTP proxy -94 - 200816753 server 2 3 2 2 . In an embodiment of the invention, the server D P P may comprise a complex sub-server D P P . In an embodiment of the invention, the type of proxy server that handles incoming traffic is dependent on the type of data traffic. In the next step 2 4 1 4, the data packet can be routed to the proxy server. Since the SIP data packet 2330 is an SMTP data packet, the formatted data packet (e.g., sub-server DPP) is processed by the SMTP proxy server 23 22 located inside the Divitas server 2320. In the next step 2416, the data packet is routed to the intended application server. In an embodiment of the invention, the SMTP proxy server 23 22 can convert the SIP data packet 23 30 into a format acceptable to the application server. In one example, SIP data packet 23 3 0 can be converted from SIP Notify Message to SMTP data packet 2328. In addition, the DDX part can be discarded. In addition, the transport protocol can be changed from UDP-IP to TCP-IP, which is more conducive to deploying email data traffic to the respective application server (eg, mail application server 2326) via API 2332. The method steps illustrated in Figure 24 do not illustrate the encryption and/or decryption of data packets. In an embodiment, the data packet can be sent without encryption. The requirements for encryption are arbitrary and can be determined by the user's requirements. In an embodiment, some or all of the data packets may be encrypted. In one embodiment, the DDX portion may be encrypted while leaving the remainder of the data packet unencrypted. Random encryption reduces the processing power to be utilized and reduces the underlying factors typically associated with encrypted data packets. As can be seen from Figure 2 3 and 2 4, the rich mobile architecture configuration can be used to enable mobile phone application users to move with the application server in a single start communication command environment. Device. In addition, a rich mobility architecture configuration can include data packets from various applications to be converted into data packets that can be transported by control protocols and transport protocols specific to established secure channels. In an embodiment of the invention, as shown in Figure 25, the mobility architecture configuration can be implemented as a weak user. In a weakly mobile architecture configuration, the user DPP and the server DPP can only be utilized as an mobility manager (e.g., to manage application connectivity) and not to provide support to at least one or more application functions. Assume, for example, that a user of the mobile phone 2 500 wants to call a friend. Users can make calls using the phone application user 2508 (eg, VoIP, etc.). In this example, it is assumed that a secure channel 2550 has been established between the Divitas user 25 02 and the Divitas server 2518 located within the enterprise 25 3 〇. To establish a telecommunications conversation, the telephony application user 2 0 0 8 can send a data packet 2512 ( For example, SIP/UD-IP) to the regional host 2510 within the Divitas user 2502. As noted above, multiple proxy users can reside within Divitas User 2502 to support a variety of different application users. In one example, SIP proxy user 2504 can be located within Divitas user 2502 to process data packets from telephony application user 2508. Upon receiving the data packet 2512, the SIP proxy user 25 04 can analyze the data packet to determine how to route the packet. As mentioned above, the data packets that can be sent to Divitas users can include the application server-specific 埠-96-200816753 number (eg, 5060, etc.). Using this information, the Divitas user 2502 can route data packets 2 5 1 2 to the Divitas server 25 1 8 via the network 2 5 1 4 and the firewall 2 5 2 8 . In an embodiment, if the data packet is already in a format routable by the Divitas user, then the data packet does not have to be converted. In one example, data packet 2512 is shown in the SIP/UDP-IP format, which is a format that Divitas user 25 02 can use to route its data traffic. In a consistent embodiment, the 'multiple proxy server' can reside in the D i v i t a s server. In an example, SIP proxy server 253 2 can reside within Divitas server 2518 to manage the incoming traffic from telephone application user 2508. Since the data packet 2 5 1 2 has been sent from the phone application user 2 5 0 2, the data packet is processed by the SIP proxy server 2 5 3 2 . When receiving the data packet 2512, the SIP proxy server 253 can forward the data packet 25 1 2 to the destination telecommunications device along the path 2522 via the telephone gateway 2520 (eg, PSTN, GSM, CDMA, etc.) (eg, Telephone, etc.). Once a telecommunications conversation has been established between the handset 25 00 and the destination telecommunications device, other data packets sent by the telephony application user 2 5 3 0 (eg, RTP data packets, etc.) may be routed along the secure channel 2 5 5 0 Path 2 560 is sent to the Divitas server 25 1 8 without having to go through the Divitas user 25 02. In a weakly mobile architecture configuration, the purpose of establishing a telecommunications conversation with the help of Divitas users is to enable application users to take advantage of the mobility features of Divitas users. In other words, a control center has been established between the Divitas user and the Divitas server to monitor the connectivity of the application user. By establishing this relationship, when the situation occurs, Divitas users and Divitas -97-200816753 servers can share their connectivity status and be able to handle roaming seamlessly. In the example, the user in the above case can currently be connected via the Wij_F i network. During a phone conversation, users can roam outside the Wi-Fi network. In the prior art, the connection may be interrupted and the user must redial. However, in a mobile architecture configuration, the connectivity status of the user's handset has been monitored, and Divitas users and Divitas servers can perform seamless network exchanges (eg, from Wi_Fi to the user without noticeable changes). Honeycomb network). Advantageously, companies that have invested a large amount of money into multiple applications and only need an mobility manager can implement a weakly mobile architecture configuration. In this way, organizations can leverage the mobility manager-configured mobility manager performance without having to re-engineer their telecommunications infrastructure. As can be appreciated from the embodiments of the present invention, an active architecture configuration with DPP provides an mobility manager that enables a smooth telecommunications infrastructure. In other words, the mobile architecture configuration provides a single environment for starting communication commands. In the example, a single secure channel can be used to achieve the same function to replace multiple secure channels of the enterprise. Using an environment that starts with a single communication command can significantly reduce the cost and effort of managing a telecommunications infrastructure. In addition, the mobility architecture can monitor and seamlessly handle connectivity without negatively impacting the user's telecommunications experience. F. CONCLUSION Although the invention has been described in terms of several preferred embodiments, modifications, variations, and equivalents are possible within the scope of the invention. It should also be noted that there are many other ways of implementing the methods and apparatus of the present invention. Moreover, the utility of the embodiments of the present invention can be found in other applications. For the sake of convenience, this article provides abstract commemoration, which is limited to the convenience of reading and is not intended to limit the scope of patent application. Accordingly, the scope of the appended claims should be construed as including all such modifications, alterations, and equivalents of the true spirit and scope of the invention. BRIEF DESCRIPTION OF THE DRAWINGS The present invention is illustrated by way of example only, and not by way of limitation Network map. 2A-C are diagrams of actuating servos in accordance with one or more embodiments of the present invention. 3 is a mobile device user diagram in accordance with one or more embodiments of the present invention. 4 is a block diagram of an encoder/decoder based echo canceller in accordance with one or more embodiments of the present invention. Figure 5A is a diagram of a speech jitter buffer in accordance with one or more embodiments of the present invention. Figure 5B is a diagram of a speech jitter buffer in accordance with one or more embodiments of the present invention. Figure 6A is a schematic diagram of a DDP architecture in accordance with one or more embodiments of the present invention. -99-200816753 Figure 6B is a D D P message exchange diagram in accordance with one or more embodiments of the present invention. 7A is a network architecture diagram of each host including two network interfaces and fabricated in accordance with one or more embodiments of the present invention. Figure 7B is a diagram of a network architecture made in accordance with one or more embodiments of the present invention. Figure 7C is a diagram of a network architecture made in accordance with one or more embodiments of the present invention. Figure 7D is a diagram of a network architecture made in accordance with one or more embodiments of the present invention. Figure 8A is a block diagram of an exemplary prior art communication device including an echo cancellation filter. Figure 8B is a flow diagram of an exemplary conventional technique communication device for use in, for example, the exemplary prior art communication device illustrated in Figure 8A. Figure 9A is a block diagram of a communication device (or system or configuration) that cancels echoes without relying on a filter, in accordance with one or more embodiments of the present invention. Figure 9B is a block diagram of an ID code generator for the communication device (or system or configuration) of Figure 9A, in accordance with one or more embodiments of the present invention. Figure 9C is a flow diagram of a method for canceling echoes, such as the communication device (or system or configuration) of Figure 9A, in accordance with one or more embodiments of the present invention. FIG. 10A is a block diagram of a first exemplary conventional method with an adaptive jitter buffering scheme -100 - 200816753 technical packet voice communication system (first prior art configuration). Figure 10B is a flow diagram of transmitter side processing for a conventional technique bounce buffering scheme for a first prior art configuration, such as the one shown in the example of Figure 10A. FIG. 1C is a flow chart of a conventional technique delay calculation process. Figure 10D is a flow chart of a conventional technology packet implementation control process. Fig. 10E is a schematic diagram showing the flow of the received packet in the packet implementation control when the transmitter side voice activity detector (VAD) is turned on. Fig. 1 〇F is a schematic diagram showing the flow of the received packet in the packet implementation control when the VAD on the transmitter side is turned off. Figure 11 A is a block diagram of a receiver-side device that includes adaptive buffer overflow control, a packet voice communication system (second prior art configuration). Fig. 1 1 B is a flow chart for the kidneyless detection process of the receiver side device shown in the example of Fig. 1 1 A. Fig. 1 1 C is a flowchart of a buffer overflow control process for the receiver side device shown in the example of Fig. 1 1 A. Figure 1 2A is a block diagram of a receiver side device having an adaptive jitter processing packet voice communication system in accordance with one or more embodiments of the present invention. Fig. 1B is a diagram of a delay insertion control process utilized for adaptive bounce processing of a receiving side device such as the one shown in the example of Fig. 1 2A according to one or more embodiments of the present invention. Figure 13 is a block diagram of a receiver side device of a packet voice communication system with adaptive jitter processing in accordance with one or more embodiments of the present invention. -101 - 200816753 Figure 14 is a diagram showing an example of a conventional technique for establishing a connection between an application user and an application server. Figure 15 is a simplified block diagram of the DDP invention of the embodiment of the present invention. Figure 1A is a diagram showing an example of how data within a mobile architecture configuration with DDP flows between an application user located within a user device and an application server managed by the enterprise. Fig. 16B is a diagram showing an example of a code of a packaged SIP notification message in the embodiment. Figure 17 is a diagram of an example of a telephone flow illustrating how to establish a secure channel between a user device and a mobile server in an embodiment. Figure 18 is a simplified telephone flow diagram showing the case where a large file must be transmitted in the embodiment. Figure 19 is a simplified telephone flow diagram illustrating the manner in which small control messages, such as those sent by a control application, can be sent in an embodiment of the present invention. Figure 20 is a diagram showing an example of a conventional technique for individually connecting individual applications on a mobile phone to a corresponding application server within the enterprise. 21 is a flow diagram of a prior art technique for enabling an application user to communicate with an application server in an IP secure VPN environment. Figure 22 is a simplified block diagram showing the configuration of an active architecture in an embodiment of the present invention. Figure 23 is a block diagram showing the configuration of the mobile architecture in the embodiment of the present invention as a heavy load client. Figure 24 is a simplified flow diagram of an example of a method of -102-200816753 utilizing an active architecture configuration in an embodiment of the present invention. Figure 25 is a diagram of a mobile architecture configuration implemented as a lightly loaded client in an embodiment of the present invention. [Main component symbol description] 1 〇〇: System network 102: Mobile equipment 1 1 〇: Honeycomb network 1 1 2: Base transceiver station 1 1 4 : BTS switching center 1 1 6 : Mobile switching center 120: Media gate Router 122: Public Switched Telephone Network 124: Conventional Public and Private Telephone 130: Private Branch Switch 1 3 2: Router 1 3 6: Telephone 1 3 7: Telephone 1 3 8: Internet Protocol Wide Area Network 1 4 0 : Router 142: Firewall 144: Internet 1 5 0: Mobility Server 1 6 0: Access Point - 103- 200816753 1 8 0: Access Point 800: Conventional Technology Communication Device 802: Signal Receiver 806: Speaker 8 0 8 : Echo path 810: Microphone 8 1 2 : Buffer 8 1 4 : Filter 8 1 4 : Echo canceller 8 1 6 : Sum function 900 : Communication device 9 0 4 : Signal receiver 906 : Background miscellaneous Remover 9 0 8 : Echo path 9 1 0 : ID injector 914 : Speaker 916 : Microphone 922 : ID generator 924 : ID detector 926 : Buffer 92 8 : Delay 9 3 0 : Sum Function 93 2 : Signal Transmitter 1 0 0 0 : Speed Buffer - 104 200816753 1001 : 1 002 : 1 003 : 1 004 : 1 005 : 1 006 : 1 007 : 1 008 : 1 009 : 1 080 : 1 080a 1 082 : 1 084 : 1 086 : 1 086a 1 08 8 : 1 090 : 1091 : 1 092 : 1 092a 1 094 : 1 096 : 1 098 : 1100: voice activity detector transmitter network packet buffer packet implementation controller delay insertion controller delay information module jitter computer implementation delay computer voice packet: packet silent descriptor silent voice packet = Packet Silent Silence Descriptor Transmitter Side Device Receiver Side Device: Voice Packet Silent Packet Voice Packet Silent Packet Receiver Side Device -105 200816753 1102: Packet Buffer 1104: Packet Implementation Controller 1108: Delay Insertion Controller 1 η 〇: Bounce computer 1 η 4 : Buffer overflow controller 1 1 1 6 : Silent detector 1 1 1 8 : Decoder 1 1 8 0 : Add-on 1 199 : Link 1 200 : Receiver-side device 1 202 : Packet buffer 1 204: Bounce computer 1 2 0 6 : Implement delay computer 1 208 : Packet implementation controller 1 2 1 0 : Decoder 1 2 1 2 : Silent detector 1 2 1 4 : Delay insertion controller 1 2 1 6: Delay information module 1299: link 1 3 00: receiving side device 1 3 02 : packet buffer 1 3 04 : jitter computer 1 3 06 : compensation computer 1 3 08 : packet implementation controller -106- 200816753 1 3 1 0 : Decoder 1 3 1 2 : Video Detector 1 3 1 4 : Compensation Controller 1 3 1 6 : Link Compensation Information Module 1399 : Link 1 402 : Application Server 1 404 : Application User 1 406 : Software download 1 4 2 4 : Notification 1 5 02 : Planning management application 1 5 04 : Device management application 1 5 06 : Voice mobility control application user 1 5 0 8 : Voicemail/Email transmission Application 1 5 1 0 : Device Image Management Application 1 5 1 2 : Instant Messaging Application 1 5 1 4 : David Data Exchange Module 1 5 1 6 : Reliable David describes the protocol module 1 5 1 8 : Priority Message Scheduling Module 1 5 20 : Built-in Dialogue Management Module 1 5 22 : Davida Description Protocol Module with Security Extension 1 524 : Control Protocol 1 5 2 6 : Transmission Control Protocol 1 5 2 8 : User Data Meta- Agreement 1 5 3 0 : Transmission Control Protocol-107- 200816753 1 5 3 2: Dialogue Startup Agreement 1 5 3 4: Data Element Agreement 1 5 3 6 : David He describes Agreement 1 602: Voice Mail User 1 604: Voice Mail Server 1 608: Server David Data Exchange Module 1 6 1 4 : Server Reliable David Description Protocol Module 1 6 1 6: Server Davies Description Protocol 1 620: Server Session Initiation Protocol Control Protocol 1 622: Server User Data Meta-Conference Transfer Protocol 1624: Network 1 626: User User Data Element Agreement Transfer Agreement 1 628: User Dialogue Startup Agreement Control Agreement 1 63 2: User David describes his agreement 1 634: User Reliable David describes the agreement 1 63 6 : User David Data Exchange Module 1 6 5 0 : Path 1 652: Path 1 700: Enterprise Server 1 702: User Device 1 704: User/Device Manager 1 706: Davida Description Protocol 1 708: Decentralized Data Processing System 1 7 1 0: Session Initiation Protocol - 108 - 200816753 1 7 1 2 : User Information Meta- Agreement 1 7 1 4 : User Data Meta-Contract 1 7 1 6 : Dialogue Initiation Agreement 1 7 1 8: Decentralized Data Processing System 1 720: Davide describes the Agreement 1722: Application User 1 802: Image Manager 1 804 : Device / User Manager 1 8 06 : Server Davis Data Exchange Module 1 8 0 8 : Server David describes the agreement 1 8 1 0 : User David describes the agreement 1 8 1 2 : User wears Vita Data Exchange Module 1 8 1 4 : Application User 1 8 1 6 : Request 1 902: Server Attendance Manager 1 904: Device/User Manager 1 906: Server Davide Description Protocol 1 9 0 8: User Davide describes the agreement 1910: User Attendance Manager 1 9 2 0: Attendance Enquiry 2 0 0 0: Mobile 2002: David User 2006: Customer Relationship Management Application User 2008: Mail Application User-109- 200816753 2010 : Application Protocol Interface 20 12 : Application Protocol Interface 2014 : Internet Protocol Security User 2022 : David Server 2026 : Customer Relationship Management Application User 2028 : Mail Application Server 203 0 : Internet Protocol Security Gateway 203 0 : Application Protocol Interface 203 2 : Application Protocol Interface 2040 : Firewall 2 0 5 0 : Network 2084: Secure Channel 2 0 9 0 : Enterprise 2200: Mobile Architecture Configuration 2 2 0 2 : Mobile 2204: David User 2206: Application User 2208: Application User 2210: Regional Internet Protocol Host 2212: Application Agreement Interface 22 14: Application Agreement Interface 2216: Enterprise 2218: David Server 2220: Application Server - 110- 200816753 2222 : Application Server 2224 : Network 2226 : Firewall 2232 : Application Protocol Interface 2234 : Application Protocol Interface 2250 : Secure Channel 2 3 0 2 : Mobile 23 04 : David User 2 3 06 : Simple Mail Transfer Protocol Agent User 2 3 0 8: Zone Host 2310: Mail Application User 23 12: Simple Mail Transfer Protocol Data Packet 2 3 1 4: Network 2 3 1 6: Firewall 23 1 8: Enterprise 2320: David Server 2 3 22: Simple Mail Transfer Protocol Proxy Server 23 26: Mail Application Server 2 3 2 8: Simple Mail Transfer Protocol Data Packet 2 3 3 0: Dialogue Start Protocol Data Packet 23 3 0a: David Data Exchange Header 23 3 0b : dialog start protocol header 23 3 0c : transport agreement mark 23 3 2 : application protocol interface -111 - 200816753 23 5 0 : secure channel 2500: mobile phone 25 02 : David user 2504: Dialogue Startup Protocol Proxy User 25 0 8: Phone Application User 2 5 1 0: Zone Host 2512: Data Packet 2 5 1 4: Network 2518: David Server 2520: Telephone Gateway 2522: Path 2 5 2 8: Firewall 2530: Enterprise 25 3 2: Session Initiation Protocol Proxy Server 25 5 0: Secure Channel 2552: Application Protocol Interface 2 5 6 0: Path 25 62: Immediate Protocol X: Signal y ': Signal y 1 : Signal z: Signal -112-

Claims (1)

200816753 十、申請專利範圍 1 · 一種行動性架構配置,用以管理手機的電信行動 性,該行動性架構配置包含: DiVitas協定代理伺服器(DPP ),該DPP被組配成 管S該手機的行動性用戶與企業內的行動性伺服器之間的 連接性,其中該DPP包括 用戶DPP,被組配成管理該手機的該行動性用戶 之該連接性,該用戶DPP接收來自複數應用程式用戶的複 數用戶連接性請求,及 伺服器DPP,被組配成管理該行動性伺服器的該 連接性’該伺服器DPP接收來自複數應用程式伺服器的複 數伺服器連接性請求, 其中該用戶DPP和該伺服器DPP被組配成彼此 互動,以建立安全通道。 2 ·根據申請專利範圍第1項之行動性架構配置,其中 該用戶DPP被組配成包括複數子用戶DPP,各個該複數子 用戶DPP被組配成處理複數協定的一協定。 3 ·根據申請專利範圍第1項之行動性架構配置,其中 該伺服器DPP被組配成包括複數子伺服器DPP,各個該複 數子伺服器DPP被組配成處理複數協定的一協定。 4 ·根據申請專利範圍第1項之行動性架構配置,其中 該複數應用程式用戶的第一應用程式用戶透過應用程式協 定介面(API )發送一組資料封包到該用戶DPP,該組資 料封包被組配成包括區域主機位址和ί阜號碼,該區域主機 -113- 200816753 位址與該行動性用戶相關聯,及該埠號碼與該第一應用程 式用戶相關聯。 5 ·根據申請專利範圍第4項之行動性架構配置,其中 DiVitas資料交換(DDX)標記被組配成被附加於該組資 料封包,該DDX標記包括與該第一應用程式用戶相關聯 的特有辨識。 6. 根據申請專利範圍第5項之行動性架構配置,其中 該DDX標記被加密。 7. 根據申請專利範圍第6項之行動性架構配置,其中 該用戶DPP將具有該DDX標記的該組資料封包格式化成 能夠經由該安全通道傳輸至該行動性伺服器的該伺服器 DPP之格式。 8 .根據申請專利範圍第7項之行動性架構配置,其中 該伺服器DPP被組配成將該DDX標記解密,且利用該特 有辨識發送該組資料封包到該第一應用程式伺服器。 9 .根據申請專利範圍第1項之行動性架構配置,其中 該行動性用戶被組配成包括資料庫,該資料庫被用於儲存 各個該複數應用程式用戶的認證資料。 10.—種管理用於手機的電信行動性之方法,包含: 利用 DiVitas協定代理伺服器(DPP )管理該手機的 行動性用戶與企業內的行動性伺服器之間的連接性,其中 該DPP包括 用戶DPP,被組配成管理該手機的連接性,該用 戶DPP接收來自複數應用程式用戶的複數用戶連接性請 -114- 200816753 求,及 伺服器DPP,被組配成管理該行動性伺服器的連 接性,該伺服器DPP接收來自複數應用程式伺服器的複數 伺服器連接性請求;及 利用該用戶D P P和該伺服器D P P建立該手機與該行 動性伺服器之間的安全通道,以使該複數應用程式用戶能 夠與該複數應用程式伺服器互動。 11 ·根據申請專利範圍第1 〇項之方法,另外包括 透過應用程式協定介面(API)發送來自該複數應用 程式用戶的第一應用程式用戶之一組資料封包到該行動性 用戶的該用戶DPP; 將DiVitas資料交換(DDX)標記附加於該組資料封 包,該DDX標記被組配成包括有關該第一應用程式用戶 的資料, 經由該安全通道發送具有該DDX標記的該組資料封 包到該行動性伺服器的該伺服器DPP ; 分析該DDX標記,以辨識該複數應用程式伺服器的 第一應用程式伺服器,該第一應用程式伺服器與該第一應 用程式用戶相關聯;及 發送該組資料封包到該第一應用程式伺服器。 1 2 ·根據申請專利範圍第1 〇項之方法,其中該用戶 DPP被組配成包括複數子用戶 DPP,各個該複數子用戶 DPP被組配成處理複數協定的一協定。 1 3 .根據申請專利範圍第1 〇項之方法,其中該伺服器 -115- 200816753 DPP被組配成包括複數子伺服器DPP,各個該複數子伺服 器DPP被組配成處理複數協定的一協定。 1 4 .根據申請專利範圍第1 1項之方法,其中該組資料 封包被組配成包括區域主機位址和埠號碼,該區域主機位 址與該行動性用戶相關聯,及該埠號碼與該第一應用程式 用戶相關聯。 1 5 .根據申請專利範圍第1 1項之方法,其中該用戶 DPP將該組資料封包格式化,使該組資料封包能夠經由該 安全通道發送,該安全通道係透過控制協定所建立。 1 6 .根據申請專利範圍第1 5項之方法,其中該控制協 定是對話啓動協定(SIP)。 17. 根據申請專利範圍第1 1項之方法,其中該DDX標 記被組配成包括特有辨識。 18. 根據申請專利範圍第17項之方法,其中由該用戶 DPP加密該DDX標記。 19. 根據申請專利範圍第18項之方法,其中該伺服器 DPP被組配成將該DDX標記解密。 2 0.根據申請專利範圍第10項之方法,其中該行動性 用戶被組配成包括資料庫,該資料庫被用於儲存各個該複 數應用程式用戶的認證資料。 2 1 . —種製造的物品,包含內建有電腦可讀碼之程式 儲存媒體,該電腦可讀碼被組配成管理行動性架構配置內 的手機之電信行動性,該電腦可讀碼包含 用以藉由利用DiVitas協定代理伺服器(DPP ),在 -116- 200816753 該手機的行動性用戶與位在企業內的行動性伺服器之間建 立安全通道之碼,該DPP包括 用戶DPP,被組配成管理該手機的連接性,該用 戶DPP接收來自複數應用程式用戶的複數用戶連接性請 求,及 伺服器DPP,被組配成管理該行動性伺服器的連 接性,該伺服器DPP接收來自複數應用程式伺服器的複數 伺服器連接性請求;及 用以利用該用戶DPP和該伺服器DPP,在該手機與該 行動性伺服器之間建立安全通道,以使該複數應用程式用 戶能夠與該複數應用程式伺服器互動之碼。 22 _根據申請專利範圍第21項之製造的物品,另外包 括 用以透過應用程式協定介面(API)發送來自該複數 應用程式用戶的第一應用程式用戶之一組資料封包到該行 動性用戶的該用戶DPP之碼; 用以將DiVitas資料交換(DDX)標記附加於該組資 料封包之碼,該DDX標記被組配成包括有關該第一應用 程式用戶的資料, 用以經由該安全通道發送具有該DDX標記的該組資 料封包到該行動性伺服器的該伺服器D P P之碼; 用以分析該DDX標記,以辨識該複數應用程式伺服 器的第一應用程式伺服器之碼,該第一應用程式伺服器與 該第一應用程式用戶相關聯;及 -117- 200816753 用以發送該組資料封包到該第一應用程 碼。 23. 根據申請專利範圍第21項之製造的物 用戶DPP被組配成包括複數子用戶DPP,各個 戶DPP被組配成處理複數協定的一協定。 24. 根據申請專利範圍第21項之製造的物 伺服器DPP被組配成包括複數子伺服器DPP, 子伺服器DPP被組配成處理複數協定的一協定 25. 根據申請專利範圍第22項之製造的物 組資料封包被組配成包括區域主機位址和埠號 主機位址與該行動性用戶相關聯,及該埠號碼 用程式用戶相關聯。 26. 根據申請專利範圍第22項之製造的物 用戶DPP將該組資料封包格式化,使該組資料 由該安全通道發送,該安全通道係透過控制協; 27. 根據申請專利範圍第22項之製造的物 DDX標記被組配成包括特有辨識,及由該用戶 該DDX標記。 28·根據申請專利範圍第27項之製造的物 伺服器DPP被組配成將該DDX標記解密。 29·根據申請專利範圍第21項之製造的物 行動性架構配置被組配成包括資料庫,該資料 存各個該複數應用程式用戶的認證資料。 式伺服器之 品,其中該 該複數子用 品,其中該 各個該複數 〇 品,其中該 碼,該區域 與該第一應 品’其中該 封包能夠經 定所建立。 品,其中該 1 DPP力口密 品’其中g亥 品,其中該 庫被用於儲 -118-200816753 X. Patent Application Scope 1 · An operational architecture configuration for managing the telecommunications mobility of a mobile phone. The mobile architecture configuration includes: DiVitas Protocol Proxy Server (DPP), which is configured as a tube S. Connectivity between an active user and an active server within the enterprise, wherein the DPP includes a user DPP that is configured to manage the connectivity of the mobile user of the mobile phone, the user DPP receiving from a plurality of application users a plurality of user connectivity requests, and a server DPP, configured to manage the connectivity of the mobility server. The server DPP receives a plurality of server connectivity requests from a plurality of application servers, wherein the user DPP And the server DPP are grouped to interact with each other to establish a secure channel. 2. The mobility architecture configuration according to claim 1 of the scope of the patent application, wherein the user DPP is configured to include a plurality of sub-user DPPs, each of the plurality of sub-user DPPs being configured to process an agreement of a plurality of agreements. 3. The mobility architecture configuration according to claim 1 of the scope of the patent application, wherein the server DPP is configured to include a plurality of sub-servers DPP, each of the plurality of sub-servers DPP being configured to process an agreement of a plurality of protocols. 4: According to the mobile architecture configuration of claim 1, wherein the first application user of the plurality of application users sends a set of data packets to the user DPP through an application protocol interface (API), the data packet is The grouping is comprised of a regional host address and a number, the host-113-200816753 address is associated with the mobile user, and the number is associated with the first application user. 5. The mobility architecture configuration according to item 4 of the scope of the patent application, wherein a DiVitas Data Exchange (DDX) tag is configured to be attached to the group of data packets, the DDX tag including a unique feature associated with the first application user Identification. 6. The mobility architecture configuration according to item 5 of the scope of the patent application, wherein the DDX tag is encrypted. 7. The mobility architecture configuration of claim 6 wherein the user DPP formats the set of data packets having the DDX tag into a format of the server DPP that can be transmitted to the mobility server via the secure channel. . 8. The mobility architecture configuration of claim 7, wherein the server DPP is configured to decrypt the DDX tag and use the unique identification to send the group of data packets to the first application server. 9. The mobility architecture configuration of claim 1 wherein the mobile user is configured to include a database for storing authentication data for each of the plurality of application users. 10. A method of managing telecommunications mobility for a mobile phone, comprising: utilizing a DiVitas Protocol Proxy Server (DPP) to manage connectivity between an active user of the handset and an active server within the enterprise, wherein the DPP Including the user DPP, which is configured to manage the connectivity of the mobile phone. The user DPP receives multiple user connectivity requests from multiple application users, and the server DPP is configured to manage the mobile servo. Connectivity of the server, the server DPP receives a plurality of server connectivity requests from the plurality of application servers; and uses the user DPP and the server DPP to establish a secure channel between the mobile phone and the mobile server Enables the plurality of application users to interact with the plurality of application servers. 11. The method of claim 1, further comprising transmitting, by the application protocol interface (API), a group of data packets from the first application user of the plurality of application users to the user DPP of the mobile user Attaching a DiVitas Data Exchange (DDX) tag to the set of data packets, the DDX tag being configured to include information about the first application user, via the secure channel, sending the set of data packets having the DDX tag to the The server DPP of the mobile server; analyzing the DDX tag to identify the first application server of the plurality of application servers, the first application server being associated with the first application user; and transmitting The set of data is encapsulated into the first application server. The method of claim 1, wherein the user DPP is configured to include a plurality of sub-user DPPs, each of the plurality of sub-users DPP being configured to process an agreement of a plurality of agreements. The method of claim 1, wherein the server-115-200816753 DPP is configured to include a plurality of sub-servers DPP, each of the plurality of sub-servers DPP being configured to process one of the complex protocols agreement. 1 4. The method of claim 11, wherein the data packet is configured to include a regional host address and a 埠 number, the host address of the region is associated with the mobile user, and the 埠 number is The first application user is associated. The method of claim 11, wherein the user DPP formats the set of data packets such that the set of data packets can be transmitted via the secure channel, the secure channel being established by a control protocol. 16. The method of claim 15, wherein the control agreement is a Session Initiation Agreement (SIP). 17. The method of claim 11, wherein the DDX mark is grouped to include a unique identification. 18. The method of claim 17, wherein the DDX tag is encrypted by the user DPP. 19. The method of claim 18, wherein the server DPP is configured to decrypt the DDX tag. The method of claim 10, wherein the mobile user is configured to include a database for storing authentication data for each of the plurality of application users. 2 1 . An article of manufacture comprising a program storage medium having a computer readable code embodied therein, the computer readable code being configured to manage telecommunications activity of a mobile phone within an operational architecture configuration, the computer readable code comprising Used to establish a secure channel code between the mobile user of the mobile phone and the mobile server located in the enterprise by using the DiVitas Protocol Proxy Server (DPP), which includes the user DPP. The group is configured to manage the connectivity of the mobile phone, the user DPP receives multiple user connectivity requests from multiple application users, and the server DPP is configured to manage the connectivity of the mobile server, the server DPP receives a plurality of server connectivity requests from the plurality of application servers; and a secure channel between the handset and the mobile server using the user DPP and the server DPP to enable the plurality of application users to The code that interacts with the plural application server. 22 _ The article manufactured according to claim 21 of the patent application, further comprising a packet of a first application user sent from the plurality of application users through the application protocol interface (API) to the mobile user a code of the user DPP; a code for attaching a DiVitas Data Exchange (DDX) tag to the set of data packets, the DDX tag being configured to include information about the first application user for sending via the secure channel The set of data having the DDX tag is encoded by the server DPP of the mobile server; the DDX flag is analyzed to identify the code of the first application server of the plurality of application servers, the first An application server is associated with the first application user; and -117-200816753 is configured to send the set of data packets to the first application code. 23. The manufactured user DPP according to claim 21 of the patent application is organized to include a plurality of sub-user DPPs, each of which is configured to process an agreement for the plural agreement. 24. The server DPP manufactured according to claim 21 of the patent application is assembled to include a plurality of sub-servers DPP, which are grouped into a protocol for processing a plurality of agreements. 25. According to the scope of claim 22 The manufactured packet data packet is assembled to include the regional host address and the nickname host address associated with the mobile user, and the 埠 number is associated with the program user. 26. The user DPP, manufactured according to Article 22 of the scope of the patent application, formats the data packet of the group so that the data is transmitted by the secure channel, and the security channel is transmitted through the control protocol; 27. According to the scope of application 22 The manufactured DDX mark is assembled to include a unique identification, and the DDX mark is used by the user. 28. The object manufactured by the server according to claim 27, the server DPP is assembled to decrypt the DDX mark. 29. The manufactured structure according to claim 21 of the scope of the patent application is configured to include a database for storing the authentication data of each of the plurality of application users. The server of the server, wherein the plurality of sub-products, wherein the plurality of products, the code, the area and the first item 'where the packet can be determined to be established. Product, where the 1 DPP force secret product 'where g Hai products, where the library is used to store -118-
TW096121022A 2006-06-14 2007-06-11 DiVitas protocol proxy and methods therefor TW200816753A (en)

Applications Claiming Priority (12)

Application Number Priority Date Filing Date Title
US80480606P 2006-06-14 2006-06-14
US11/537,990 US7688820B2 (en) 2005-10-03 2006-10-02 Classification for media stream packets in a media gateway
US11/537,994 US20070091907A1 (en) 2005-10-03 2006-10-02 Secured media communication across enterprise gateway
US11/537,985 US7546125B2 (en) 2005-10-03 2006-10-02 Enhancing user experience during handoffs in wireless communication
US11/537,980 US20070091848A1 (en) 2005-10-03 2006-10-02 Reducing data loss during handoffs in wireless communication
US11/538,034 US20070264989A1 (en) 2005-10-03 2006-10-02 Rendezvous calling systems and methods therefor
US11/538,037 US20080119165A1 (en) 2005-10-03 2006-10-02 Call routing via recipient authentication
US11/538,042 US20070094374A1 (en) 2005-10-03 2006-10-02 Enterprise-managed wireless communication
US11/755,710 US20080317241A1 (en) 2006-06-14 2007-05-30 Code-based echo cancellation
US11/755,702 US20080140767A1 (en) 2006-06-14 2007-05-30 Divitas description protocol and methods therefor
US11/755,704 US7480500B1 (en) 2006-06-14 2007-05-30 Divitas protocol proxy and methods therefor
US11/755,727 US20090016333A1 (en) 2006-06-14 2007-05-30 Content-based adaptive jitter handling

Publications (1)

Publication Number Publication Date
TW200816753A true TW200816753A (en) 2008-04-01

Family

ID=40328921

Family Applications (4)

Application Number Title Priority Date Filing Date
TW096121019A TW200814679A (en) 2006-06-14 2007-06-11 Code-based echo cancellation
TW096121021A TW200818813A (en) 2006-06-14 2007-06-11 DiVitas description protocol and methods therefor
TW096121022A TW200816753A (en) 2006-06-14 2007-06-11 DiVitas protocol proxy and methods therefor
TW096121020A TW200820682A (en) 2006-06-14 2007-06-11 Content-based adaptive jitter handling

Family Applications Before (2)

Application Number Title Priority Date Filing Date
TW096121019A TW200814679A (en) 2006-06-14 2007-06-11 Code-based echo cancellation
TW096121021A TW200818813A (en) 2006-06-14 2007-06-11 DiVitas description protocol and methods therefor

Family Applications After (1)

Application Number Title Priority Date Filing Date
TW096121020A TW200820682A (en) 2006-06-14 2007-06-11 Content-based adaptive jitter handling

Country Status (2)

Country Link
KR (1) KR20090085018A (en)
TW (4) TW200814679A (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI491226B (en) * 2013-04-02 2015-07-01 Hon Hai Prec Ind Co Ltd Video playing device and controlling method
KR101503009B1 (en) * 2013-04-03 2015-03-18 주식회사 시큐아이 Method and apparatus for identifying application based on data size
KR102610823B1 (en) * 2017-11-27 2023-12-07 삼성전자주식회사 Communication system and method for network address translation
CN115334024A (en) * 2022-08-01 2022-11-11 鼎捷软件股份有限公司 Instant response system and instant response method

Also Published As

Publication number Publication date
TW200818813A (en) 2008-04-16
TW200820682A (en) 2008-05-01
TW200814679A (en) 2008-03-16
KR20090085018A (en) 2009-08-06

Similar Documents

Publication Publication Date Title
US20080140767A1 (en) Divitas description protocol and methods therefor
US7480500B1 (en) Divitas protocol proxy and methods therefor
US20090016333A1 (en) Content-based adaptive jitter handling
US20080317241A1 (en) Code-based echo cancellation
US9900356B2 (en) Method and apparatus for transferring active communication session streams between devices
US20090147772A1 (en) Systems and methods for providing presence information in communication
US20070091907A1 (en) Secured media communication across enterprise gateway
US9059971B2 (en) Systems and methods for secure voice communications
US8885807B2 (en) Systems and methods for facilitating conference calls using security keys
WO2010075126A2 (en) Systems and methods for enabling communication features utilizing various bearer media
CA2694103A1 (en) Multi-point to multi-point intercom system
US20070121604A1 (en) Lightweight Voice Over Internet Protocol Phone
JP2007142786A (en) Handover server, and mobile communication terminal communcable thereof
US8934478B2 (en) Managing telephony services using multiple users within a telephony control point in a home network
TW200816753A (en) DiVitas protocol proxy and methods therefor
EP2055018A2 (en) Code-based echo cancellation
US8335209B2 (en) Group paging synchronization for VoIP system
EP2033408A2 (en) Divitas protocol proxy and methods therefor
US20220239782A1 (en) Packet telephony terminal apparatus and operating method thereof
EP2033384A2 (en) Content-based adaptive jitter handling
WO2007147036A2 (en) Divitas description protocol and methods therefor
Tekin VoIP over wireless networks