WO2011038637A1 - 端到端呼叫的实现方法、端到端呼叫终端及系统 - Google Patents
端到端呼叫的实现方法、端到端呼叫终端及系统 Download PDFInfo
- Publication number
- WO2011038637A1 WO2011038637A1 PCT/CN2010/076951 CN2010076951W WO2011038637A1 WO 2011038637 A1 WO2011038637 A1 WO 2011038637A1 CN 2010076951 W CN2010076951 W CN 2010076951W WO 2011038637 A1 WO2011038637 A1 WO 2011038637A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- call
- message
- identity
- module
- local
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/16—Arrangements for providing special services to substations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/09—Mapping addresses
- H04L61/10—Mapping addresses of different types
- H04L61/106—Mapping addresses of different types across networks, e.g. mapping telephone numbers to data network addresses
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/1066—Session management
- H04L65/1069—Session establishment or de-establishment
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
Definitions
- End-to-end call implementation method end-to-end call terminal and system
- the present invention relates to the field of communications and the Internet, and in particular, to an implementation method of an end-to-end call, an end-to-end calling terminal, and a system.
- the Internet was invented in the 1970s. It is difficult to predict that there will be a large number of mobile terminals and multiple township terminals in the world today. Therefore, the Internet protocol stack at that time was mainly designed for terminals connected in a "fixed" manner.
- the transmitted address is the received address, and the path is reversible, so the IP address with dual attributes of identity and location can work very well. There is no conflict between the identity attribute of the IP address and the location attribute.
- the IP address also represents the identity and location that exactly met the network needs of the time. From the perspective of the network environment at the time, this design scheme is simple and effective, simplifying the hierarchy of the protocol stack.
- the identity attribute of an IP address requires that any two IP addresses be equal.
- the location attribute of the IP address requires that the IP address be assigned based on the network topology (not the organization), and the IP addresses in the same subnet should be in a continuous In the IP address block, the IP address prefix in the network topology can be aggregated, thereby reducing the routing table entries of the router device and ensuring the scalability of the routing system.
- the inherent contradiction between the dual attributes of IP addresses will lead to the following main problems:
- Routing scalability issues There is a basic assumption about the scalability of Internet routing systems:
- the address is assigned according to the topology, or the topology is deployed according to the address, and the two must choose one.
- the identity attribute of an IP address requires that the IP address be assigned based on the organization to which the terminal belongs (rather than the network topology), and this allocation must be stable and cannot be changed frequently; the location attribute of the IP address requires the IP address to be based on the network.
- the topology is allocated to ensure the scalability of the routing system. In this way, the two attributes of the IP address create conflicts, which eventually leads to the scalability problem of the Internet routing system.
- the identity attribute of the IP address requires that the IP address should not change as the location of the terminal changes. This ensures that the communication bound to the identity is not interrupted, and that the terminal can still use its identity after the terminal is moved.
- the communication link is established; the location attribute of the IP address requires the IP address to change as the terminal location changes, so that the IP address can be aggregated in the new network topology, otherwise the network must reserve a separate route for the mobile terminal.
- Information which causes a sharp increase in routing table entries.
- a number of township issues A plurality of townships usually refer to terminals or networks that access the Internet through a network of multiple ISPs (Internet Service Providers).
- ISPs Internet Service Providers
- the advantages of multiple township technologies include increased network reliability, support for traffic load balancing across multiple ISPs, and increased overall available bandwidth.
- the identity attribute of an IP address requires that a plurality of home terminals always display the same identity to other terminals, regardless of whether the multiple township terminals access the Internet through several ISPs; and the location attribute of the IP address requires that multiple township terminals are different.
- the ISP network uses different IP addresses to communicate, so that the IP address of the terminal can be aggregated in the topology of the ISP network.
- IP address includes both the identity information and the location information of the terminal
- the communication peer and the malicious eavesdropper can simultaneously obtain the identity information and the topology location information of the terminal according to the IP address of the terminal.
- the dual attribute problem of IP address is one of the fundamental reasons that plague the Internet to continue to develop. Separating the identity attribute and location attribute of an IP address is a good way to solve the problems faced by the Internet.
- the new network will be designed based on this idea, and propose a network structure of separate mapping of identity information and location information to solve some serious drawbacks of the existing Internet.
- HIP Home Identity Protocol
- Some schemes classify IP addresses, some IPs.
- the identity part of the IP is used as the location identifier, such as LISP (Locator/ID Separation Protocol);
- LISP Licator/ID Separation Protocol
- the patent CN200610001825 of the Northern Jiaotong University Zhang Hongke also proposes a solution to use the IP address as the location identifier of the host, introduced End host ID is resolved as an identity
- the problem of separation of identity and location The above proposals and solutions all propose the implementation of identity and location separation solutions under the existing network architecture from some parts of the problem. Location and identity separation is the core technology of future data communication networks, especially mobile data communication networks.
- End-to-end call technology In the implementation technology of VOIP (voice over Internet Protocol), there are two ways, one is to capture the client-server (client-server) mode technology, that is, the VOIP server exists in the network. Such as media gateway controller, gateway gatekeeper, proxy server, etc. Call routing, call signaling, media control, etc. H.323, SIP (Session Initiation Protocol), softswitch, etc. are all VOIP technologies that capture the Client-Server model. Operators have a wide range of applications because operators can control the call and signaling processes of VOIP and charge for services.
- client-server client-server
- client-server client-server
- H.323, SIP (Session Initiation Protocol), softswitch, etc. are all VOIP technologies that capture the Client-Server model. Operators have a wide range of applications because operators can control the call and signaling processes of VOIP and charge for services.
- Another implementation method of VOIP captures the end-to-end call mode, that is, the server in the network that is not in the central or control position, and the terminal directly and the other terminal complete the entire process of calling and signaling.
- This type of technology has Internet features, namely free and open.
- Skype is a VOIP technology for end-to-end calls. Its emergence has brought a strong shock wave to the traditional telecom industry. Up to now, Skype has registered 250 million global users, and the number of members increased by 155,000 per day. As of March 14, 2005, Skype's global call volume has reached 6 billion minutes. Skype is still rapidly infiltrating into various countries. The latest statistics show that: The number of minutes of calls using Skype technology has accounted for 46.2% of the US VoIP minutes.
- the technical problem to be solved by the present invention is to provide an end-to-end call implementation method, and an end-to-end call terminal and system, to implement an end-to-end call based on a new network, and to simplify an end-to-end call flow and system. .
- the present invention provides an implementation method of an end-to-end call, which is implemented based on a network of an identity location separation architecture (ie, a new network), without the participation of an end-to-end call service server, and the method includes End call establishment process, the end-to-end call establishment process includes: The local end sends the call setup request after receiving the incoming call operation, where the source and destination addresses are the identity of the local end and the opposite end respectively, and the new network forwards the call setup request according to the mapping relationship between the identity identifier and the route identifier.
- an identity location separation architecture ie, a new network
- the peer end receives the call setup request, and replies to the call setup response, where the source and destination addresses are the identity identifiers of the peer end and the local end, respectively, and the new network is based on the identity identifier and the route identifier.
- the mapping relationship forwards the call setup response route to the local end.
- the local end and the opposite end are collectively referred to as a terminal, and the terminal logs in to the new network before the call is established, and the login process includes: the terminal sending an authentication request, where the terminal carries the identity identifier and the password input by the user;
- the access service node (ASN) of the new network sends the authentication request to the authentication server;
- the authentication server authenticates the identity identifier and the password, and returns an authentication response according to the authentication result;
- the ASN responds according to the authentication , Allow or block the terminal to log in.
- the method further includes an end-to-end call release process, where the end-to-end call release process includes: the local end receives the input on-hook signal, and sends a call release message to the opposite end, where the source and destination addresses are respectively The identity of the local end and the peer end, the new network forwards the call release message to the peer end according to the mapping relationship between the identity identifier and the route identifier; or the peer end receives the input on-hook signal, and sends a call release to the local end.
- the message where the source address and the destination address are the identity of the peer end and the local end, respectively, the network of the identity location separation architecture forwards the call release message route to the local end according to the mapping relationship between the identity identifier and the route identifier.
- the present invention further provides an implementation method of an end-to-end call, which is implemented on a new network, and does not require an end-to-end call service server to participate, and the end-to-end call message is transmitted at the local end and the opposite end.
- the process includes: A. The local end generates and sends an end-to-end call message, where the peer end identifier is carried;
- the new network forwards the end-to-end call message route to the end according to the peer identity identifier.
- Peer
- the peer end receives the end-to-end call message, and performs corresponding operations and processes.
- the local end generates the end-to-end call message according to the received user input operation, and when the user input operation is a call, the end-to-end call message is a call.
- step C when the end-to-end call message received by the opposite end is a call setup request, The peer end generates a ringing signal to notify the user; when the end-to-end call message received by the opposite end is a call setup response, the opposite end generates a call setup acknowledgement and sends the call to the local end to establish a call.
- the end-to-end call message is a call release request generated by the local end according to the received on-hook operation of the user input; in step C, after the opposite end receives the call release request, The call is released.
- the end-to-end call message is a state maintenance message that is generated by the local end according to the state maintenance policy and indicates the end-to-end call state of the local end.
- the peer end is configured according to The state maintenance information maintains the state of the local end saved locally.
- the present invention further provides an end-to-end calling system, the system comprising an end-to-end calling terminal and a new network connected to the end-to-end calling terminal, wherein the end-to-end calling terminal , having an end-to-end call function, and configured to: generate and send an end-to-end call message, which carries an identity of the end-to-end call peer; and is also configured to receive the end-to-end call message, and to receive the end-to-end call message, and The incoming call message is processed accordingly; the new network is configured to: receive the end-to-end call message sent by the end-to-end call terminal, and send the end-to-end call message according to the mapping relationship between the identity identifier and the route identifier The route is forwarded to the end-to-end call peer.
- the end-to-end calling terminal includes: an interface module, a package sending module, a receiving parsing module, and an identity management module, where: the interface module is configured to: receive a message or command input by the user, and notify the package sending module And being configured to: notify the user of the received end-to-end call message; the encapsulation sending module is connected to the interface module, and is configured to: from the identity identifier
- the management module obtains the identity of the local end (ie, the AID) and the AID of the peer end, and generates the end-to-end call message, where the source and destination addresses are the AID of the local end and the AID of the opposite end, and are further configured to: send the The end-to-end call message is sent to the interface module, and is configured to: receive and parse the received end-to-end call message, and set the message to: send the end-to-end call message
- the interface module is configured to be connected to the package sending module, and configured to: manage the AID of the local
- the interface module is configured to: when the received input operation is a call, notify the encapsulated sending module to generate an end-to-end call message of the call setup request; and the received end-to-end call message content is call setup
- a ring signal is generated to notify the user
- the encapsulated sending module is notified to generate an end-to-end call message of the call setup response
- the received end-to-end call message is a call setup response
- informing the encapsulated sending module to generate an end-to-end call message for the call setup acknowledgement when the received input operation is a call, notify the encapsulated sending module to generate an end-to-end call message of the call setup request; and the received end-to-end call message content is call setup
- a ring signal is generated to notify the user
- the encapsulated sending module is notified to generate an end-to-end call message of the call setup response
- the received end-to-end call message is a call setup response
- the end-to-end call message is a video packet or a voice packet generated according to the input voice or video information, or a request message generated according to the input command is added as a friend or a request message to invite to join the group.
- the terminal further includes a state maintenance module connected to the package sending module; the receiving and analyzing module is further configured to: send the state maintenance information if the parsed end-to-end call message is state maintenance information
- the state maintenance module is configured to: save the state of the local end and its peer end, generate state maintenance information indicating the current end-to-end call state according to the state maintenance policy, and notify the package sending module to generate a state maintenance message.
- the present invention also provides an end-to-end calling terminal, which implements an end-to-end call through a new network, including: an interface module, a package sending module, and a receiving a parsing module and an identity management module, wherein: the interface module is configured to: receive a message or a command input by the user, and notify the encapsulating and sending module, and further set to: notify the user of the received end-to-end call message;
- the encapsulating and transmitting module is connected to the interface module, and is configured to: obtain the AID of the local end and the AID of the opposite end from the identity management module, and generate the end-to-end call message, where the source and destination addresses are respectively The AID of the local end and the AID of the opposite end are further
- the interface module is configured to: when the received input operation is a call, notify the encapsulated sending module to generate an end-to-end call message of the call setup request; and the received end-to-end call message content is call setup
- a ring signal is generated to notify the user
- the encapsulated sending module is notified to generate an end-to-end call message of the call setup response
- the received end-to-end call message is a call setup response
- informing the encapsulated sending module to generate an end-to-end call message for the call setup acknowledgement when the received input operation is a call, notify the encapsulated sending module to generate an end-to-end call message of the call setup request; and the received end-to-end call message content is call setup
- a ring signal is generated to notify the user
- the encapsulated sending module is notified to generate an end-to-end call message of the call setup response
- the received end-to-end call message is a call setup response
- the end-to-end call message is a video packet or a voice packet generated according to the input voice or video information, or a request message generated according to the input command is added as a friend or a request message to invite to join the group.
- the terminal further includes a state maintenance module connected to the package sending module; the receiving and analyzing module is further configured to: send the state maintenance information if the parsed end-to-end call message is state maintenance information
- the state maintenance module is configured to: save the state of the local end and its peer end, generate state maintenance information indicating the current end-to-end call state according to the state maintenance policy, and notify the package sending module to generate a state maintenance message.
- End-to-end call message and receiving state maintenance information sent by the receiving parsing module and performing state maintenance according to the state maintenance information;
- the peer end of the status maintenance message by the encapsulation sending module is all friends and group members in the active state.
- the end-to-end call implementation method, the end-to-end call terminal and the system of the present invention do not involve an end-to-end call service server, and end-to-end communication is used between the user and the user, thereby avoiding a single point failure of the registration server of the existing system. Reliability risk.
- the end-to-end service is not passed through the server, and the business secret is not leaked by the operator. Therefore, the present invention effectively prevents end-to-end call hacking, and has high reliability and security.
- the terminal can directly use the end-to-end calling service, and it is more convenient to log in to the end-to-end calling system without inputting a username and password.
- FIG. 1 is a block diagram showing the architecture of a new network in accordance with an embodiment of the present invention.
- 2 is a schematic diagram of an implementation method of an end-to-end call according to an embodiment of the present invention.
- FIG. 3 is a schematic flowchart of an end-to-end call setup according to an embodiment of the present invention.
- FIG. 4 is a schematic structural diagram of a module of an end-to-end calling terminal according to an embodiment of the present invention.
- the preferred embodiment of the present invention implements the end-to-end call implementation method, the end-to-end calling terminal, and the system based on the identity location separation architecture (hereinafter referred to as the new network), and does not require a special end-to-end call service server (for example, the registration server in the prior art participates, and after the terminal logs in to the new network, the end-to-end service function can be implemented, and the implementation process and system of the end-to-end call are simplified.
- the new network of the present invention includes but is not limited to the specific implementation of various identity location separation architectures that have been proposed so far, and has the following features:
- the terminal has an identity (AID) indicating the identity and a routing location identifier (RID) indicating the location, wherein the AID is unique and intrinsic, and the routing location identifier is an identifier used to route the data to the terminal, and has a certain Relativity, when the terminal moves, its routing location identifier can change.
- AID identity
- RID routing location identifier
- the new network will be based on the mapping relationship between the identity identifier and the route identifier and according to the specific routing rule.
- the data route sent by the terminal is forwarded to the peer.
- the end-to-end calling system of the present invention logs in and addresses according to the user AID, and the user AID is a network layer identifier, which is similar to the user's mobile phone number, and is universally used and follows the user's mobile, so the network no longer needs end-to-end Calling the service server makes it easier to implement end-to-end calls in the new network.
- the end-to-end calling system of the present invention comprises an end-to-end calling terminal and a new network connected to the end-to-end calling terminal, wherein the end-to-end calling terminal has an end-to-end calling function and is configured to generate and Sending an end-to-end call message, which carries the identity of the end-to-end call peer; is also configured to receive the end-to-end call message, and correspondingly process the received end-to-end call message; And receiving the end-to-end call message sent by the end-to-end call terminal, and forwarding the end-to-end call message route to the end-to-end call peer according to the mapping relationship between the identity identifier and the route identifier.
- the method for implementing the end-to-end call of the present invention does not require the end-to-end call service server to participate.
- the process of transmitting the end-to-end call message at the local end and the opposite end includes: Step 201: The local end generates and sends an end-to-end call message, where the peer end identifier is carried;
- Step 202 The new network forwards the end-to-end call message to the peer end according to the mapping relationship between the identity identifier and the route identifier.
- Step 203 The peer end receives the end-to-end call message, and executes Corresponding operation and processing.
- the local end For the end-to-end call setup, in step 201, the local end generates the end-to-end call message according to the received user input operation, and when the user input operation is a call, the end to The end call message refers to a call setup request; when the user input operation is off-hook, the end-to-end call message refers to a call setup response; in step 203, the peer end receives the end-to-end call message When the call setup request is made, the opposite end generates a ring signal to notify the user; when the end-to-end call message received by the opposite end is a call setup response, the opposite end generates a call setup acknowledgement and sends the call to the Local end, call setup. Specifically, as shown in FIG.
- Step 301 The local end sends the call setup request (INVITE) after receiving the incoming call operation, where the source and destination addresses are the identity of the local end and the opposite end respectively, and the new network maps the relationship between the identity identifier and the route identifier.
- ISVITE call setup request
- the call setup request route is forwarded to the peer end;
- Step 302 The peer end receives the call setup request, generates a ring signal, receives an input off-hook signal, stops ringing, and replies to a call setup response (200 OK)
- the source and destination addresses are the identity identifiers of the peer end and the local end respectively, and the new network forwards the call setup response route to the local end according to the mapping relationship between the identity identifier and the route identifier.
- ACK call setup acknowledgement
- the call setup acknowledgement route is forwarded to the peer, and the call is established.
- the steps 301 to 302 are completed, and the process ends.
- the local end performs step 303 to complete the call setup process.
- the local end and the opposite end may be collectively referred to as a terminal, and the terminal logs in to the network of the identity location separation architecture before the call is established, and the login process includes: Step (a) The terminal sends an authentication request, where the identity identifier and the user input are carried.
- step (b) ASN (Access Service Node) of the new network sends the authentication request to the authentication server;
- Step (d) The ASN allows or blocks the terminal to log in according to the authentication response.
- the end-to-end call message is a call release request generated by the local end according to the received on-hook operation of the user input; in step 203, the opposite end receives the call release After the request, the call is released.
- the end-to-end call message is a state maintenance that is generated by the local end according to the state maintenance policy, indicating the end-to-end call state of the local end.
- the message in step 203, the peer end maintains the state of the local end saved locally according to the state maintenance information.
- the status maintenance policy can be set to periodically send status maintenance messages (such as online heartbeat commands) when the end-to-end call function is turned on and off, when the user actively changes the local status, and when the end-to-end call function is turned on.
- the end-to-end call message referred to in the present invention refers to any message that needs to be sent to the peer end, in addition to the above call setup, call release related message, and the request generated by the input command as a friend or invitation to join the group.
- the message, the response to the request as a friend, the notification of kicking a member out of the group, and the video or voice packet generated according to the input voice or video information during the call are all applicable to the above process.
- the end-to-end calling terminal is as shown in FIG. 4, and the end-to-end calling terminal implements the end-to-end call through the new network, and includes: an interface module 401, a package sending module 402, a receiving parsing module 403, and an identity management module 404.
- the state maintenance module 405 wherein: the interface module 401 is configured to receive a message or a command input by the user, and notify the package sending module 402, and is further configured to notify the user of the received end-to-end call message; the package sending module 402
- the interface module 401 is connected to the interface module 401, and is configured to obtain the identity of the local end (AID) and the AID of the peer end from the identity management module 404, and generate the end-to-end call message, where the source and destination addresses are respectively
- the AID of the local end and the AID of the opposite end are further configured to send the end-to-end call message;
- the receiving parsing module 403 is connected to the interface module 401, and is configured to receive and parse the received end-to-end call message, It is further configured to send the end-to-end call message to the interface module 401; if the parsed end-to-end call message is status maintenance information, it is further configured to maintain the status The information is sent to the state maintenance module 405.
- the identity management module 404 is connected to the package sending module 402 and configured to manage the AID of the local end and its peer end.
- the state maintenance module 405 is connected to the package sending module 402, and is configured to save the state of the local end and the opposite end thereof, and generate state maintenance information indicating the current end-to-end call state according to the state maintenance policy, and notify the package sending module 402 to generate End-to-end call message for status maintenance message; It is configured to receive the state maintenance information sent by the receiving parsing module 403 and perform state maintenance according to the state maintenance information.
- the encapsulating sending module 402 defaults that the peer end of the state maintenance message is all active friends and groups. member.
- the package sending module 402 is notified to generate an end-to-end call message of the call setup request; the end-to-end call received by the interface module 401
- the interface module 401 When the content of the message is a call setup request, the interface module 401 generates a ring signal to notify the user; when the input operation received by the interface module 401 is off-hook, the package sending module 402 is notified to generate a call setup response (200 OK).
- the end-to-end call message is sent; when the end-to-end call message received by the interface module 401 is a call setup response, the encapsulation sending module 402 is notified to generate an end-to-end call message of a call setup acknowledgement (ACK).
- the end-to-end call message may further include a video packet or a voice packet generated based on the input voice or video information, and a request message added as a friend or an invitation to join the group according to the input command.
- the method for implementing the end-to-end call of the present invention the end-to-end calling terminal and the system do not involve end-to-end call Called the service server, the end-to-end communication between the user and the user can avoid the reliability risk of the single-point failure of the registration server of the existing system.
- the end-to-end service is not passed through the server, and the business secret is not leaked by the operator. Therefore, the present invention effectively prevents end-to-end call hacking, and has high reliability and security.
- the terminal can directly use the end-to-end calling service, and it is more convenient to log in to the end-to-end calling system without inputting a username and password.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- General Business, Economics & Management (AREA)
- Multimedia (AREA)
- Telephonic Communication Services (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Description
Claims
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2012531222A JP5518202B2 (ja) | 2009-09-30 | 2010-09-15 | エンドツーエンドコールの実現方法、エンドツーエンドコール端末及びシステム |
US13/395,920 US20120180117A1 (en) | 2009-09-30 | 2010-09-15 | Method for Realizing End-to-End Call, End-to-End Call Terminal and System |
KR1020127008326A KR101368615B1 (ko) | 2009-09-30 | 2010-09-15 | 단대단 콜의 구현 방법, 단대단 콜 터미널 및 시스템 |
EP10819866.4A EP2472984A4 (en) | 2009-09-30 | 2010-09-15 | METHOD FOR ESTABLISHING AN END-TO-END CALL, END-TO-END CALL TERMINAL, AND SYSTEM |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200910204402.2 | 2009-09-30 | ||
CN200910204402.2A CN102035813B (zh) | 2009-09-30 | 2009-09-30 | 端到端呼叫的实现方法、端到端呼叫终端及系统 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2011038637A1 true WO2011038637A1 (zh) | 2011-04-07 |
Family
ID=43825546
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2010/076951 WO2011038637A1 (zh) | 2009-09-30 | 2010-09-15 | 端到端呼叫的实现方法、端到端呼叫终端及系统 |
Country Status (6)
Country | Link |
---|---|
US (1) | US20120180117A1 (zh) |
EP (1) | EP2472984A4 (zh) |
JP (1) | JP5518202B2 (zh) |
KR (1) | KR101368615B1 (zh) |
CN (1) | CN102035813B (zh) |
WO (1) | WO2011038637A1 (zh) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106789966A (zh) * | 2016-12-05 | 2017-05-31 | 广州海格通信集团股份有限公司 | 呼叫业务路由处理方法和系统 |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102130887B (zh) * | 2010-01-20 | 2019-03-12 | 中兴通讯股份有限公司 | 一种在公共设备上接入网络的方法及系统 |
CN102131197B (zh) * | 2010-01-20 | 2015-09-16 | 中兴通讯股份有限公司 | 一种在公共设备上接入网络的方法及系统 |
US8661500B2 (en) * | 2011-05-20 | 2014-02-25 | Nokia Corporation | Method and apparatus for providing end-to-end privacy for distributed computations |
CN102821216A (zh) * | 2011-06-07 | 2012-12-12 | 鸿富锦精密工业(深圳)有限公司 | 终端设备及其交换网络协议语音信令的方法 |
TWI441498B (zh) | 2011-06-07 | 2014-06-11 | Hon Hai Prec Ind Co Ltd | 終端設備及其交換網路協定語音信令的方法 |
US9894031B2 (en) * | 2014-08-27 | 2018-02-13 | Cisco Technology, Inc. | Source-aware technique for facilitating LISP host mobility |
CN105306482B (zh) * | 2015-11-12 | 2018-12-21 | 中国电子科技集团公司第三十研究所 | 一种面向特殊应用的泛搜索寻址的呼叫控制方法 |
CN111404893B (zh) * | 2020-03-06 | 2021-12-21 | 深信服科技股份有限公司 | 一种主机分类方法、装置、设备及计算机存储介质 |
CN111885219B (zh) * | 2020-07-28 | 2023-04-07 | 杭州迪普科技股份有限公司 | 一种基于sip媒体协商的通信方法、装置和nat设备 |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1801764A (zh) * | 2006-01-23 | 2006-07-12 | 北京交通大学 | 一种基于身份与位置分离的互联网接入方法 |
WO2008138853A1 (en) * | 2007-05-11 | 2008-11-20 | Telefonaktiebolaget Lm Ericsson (Publ) | Hip node reachability |
Family Cites Families (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6992995B2 (en) * | 2000-04-17 | 2006-01-31 | Telcordia Technologies, Inc. | Telecommunication enhanced mobile IP architecture for intra-domain mobility |
US7269658B2 (en) * | 2003-10-16 | 2007-09-11 | Lucent Technologies Inc. | Method and system for connecting calls through virtual media gateways |
CN1805342A (zh) * | 2005-01-10 | 2006-07-19 | 华为技术有限公司 | 获取多媒体设备ip地址的方法和多媒体设备 |
JP2006333220A (ja) * | 2005-05-27 | 2006-12-07 | Toshiba Corp | ネットワーク電話システム及びこのネットワーク電話システムのサーバ装置 |
CN1852453A (zh) * | 2005-09-19 | 2006-10-25 | 华为技术有限公司 | 一种一卡多号业务呼出及呼入的方法 |
JP4762662B2 (ja) * | 2005-10-13 | 2011-08-31 | 東日本電信電話株式会社 | Vpn接続システム及びvpn接続方法 |
US20070211705A1 (en) * | 2006-01-08 | 2007-09-13 | Sunstrum Martin T | Server-less telephone system and methods of operation |
EP1850551B8 (de) * | 2006-04-28 | 2016-11-23 | Unify GmbH & Co. KG | Verfahren und Vorrichtungen zum Etablieren einer Kommunikation in einem paketorientierten Netzwerk |
GB2444096B (en) * | 2006-11-22 | 2009-10-14 | Adam Hill | Audio communications system using networking protocols |
US7787418B2 (en) * | 2007-06-08 | 2010-08-31 | Intel Corporation | Apparatus and method to support VoIP calls for mobile subscriber stations |
KR100950336B1 (ko) * | 2007-12-18 | 2010-03-31 | 한국전자통신연구원 | 서비스 연속성을 보장하기 위한 호 제어 방법 |
EP2178265B1 (en) * | 2008-10-17 | 2013-09-04 | Alcatel Lucent | System and method for mobile IP |
US20100246566A1 (en) * | 2009-03-26 | 2010-09-30 | Grasstell Networks Llc | Serverless gateway infrastructure for voice or video |
-
2009
- 2009-09-30 CN CN200910204402.2A patent/CN102035813B/zh active Active
-
2010
- 2010-09-15 WO PCT/CN2010/076951 patent/WO2011038637A1/zh active Application Filing
- 2010-09-15 JP JP2012531222A patent/JP5518202B2/ja active Active
- 2010-09-15 US US13/395,920 patent/US20120180117A1/en not_active Abandoned
- 2010-09-15 EP EP10819866.4A patent/EP2472984A4/en not_active Withdrawn
- 2010-09-15 KR KR1020127008326A patent/KR101368615B1/ko active IP Right Grant
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1801764A (zh) * | 2006-01-23 | 2006-07-12 | 北京交通大学 | 一种基于身份与位置分离的互联网接入方法 |
WO2008138853A1 (en) * | 2007-05-11 | 2008-11-20 | Telefonaktiebolaget Lm Ericsson (Publ) | Hip node reachability |
Non-Patent Citations (2)
Title |
---|
DAVID CLARK ET AL: "FARA: Reorganizing the Addressing Architecture", ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, vol. 33, no. 4, August 2003 (2003-08-01), pages 313 - 321, XP002440664 * |
See also references of EP2472984A4 |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106789966A (zh) * | 2016-12-05 | 2017-05-31 | 广州海格通信集团股份有限公司 | 呼叫业务路由处理方法和系统 |
CN106789966B (zh) * | 2016-12-05 | 2020-08-14 | 广州海格通信集团股份有限公司 | 呼叫业务路由处理方法和系统 |
Also Published As
Publication number | Publication date |
---|---|
US20120180117A1 (en) | 2012-07-12 |
KR20120080188A (ko) | 2012-07-16 |
EP2472984A1 (en) | 2012-07-04 |
CN102035813B (zh) | 2016-01-20 |
KR101368615B1 (ko) | 2014-02-27 |
EP2472984A4 (en) | 2016-11-09 |
JP5518202B2 (ja) | 2014-06-11 |
JP2013506358A (ja) | 2013-02-21 |
CN102035813A (zh) | 2011-04-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2011038637A1 (zh) | 端到端呼叫的实现方法、端到端呼叫终端及系统 | |
CN114866521B (zh) | 会议服务器 | |
EP3292675B1 (en) | Establishing media paths in real time communications | |
US8166533B2 (en) | Method for providing media communication across firewalls | |
EP1650916B1 (en) | The system and method for realize multimedia call crossover the private network | |
US7366894B1 (en) | Method and apparatus for dynamically securing voice and other delay-sensitive network traffic | |
JP5143125B2 (ja) | ドメイン間情報通信のための認証方法、システム、およびその装置 | |
WO2007079679A1 (fr) | Élément réseau d'interfonctionnement, système d'interfonctionnement entre le terminal csi et le terminal ims et procédé associé | |
TW201002018A (en) | Method for predicting port number of NAT apparatus based on two STUN server inquiry results | |
JP2013506358A5 (zh) | ||
CN107612931B (zh) | 多点会话方法及多点会话系统 | |
EP1820318A2 (en) | A method for identifying real-time traffic hop by hop in an internet network | |
JP2017108417A (ja) | ネットワーク通信システムおよび方法 | |
EP2628286B1 (en) | Connection control with b2bua located behind nat gateway | |
JP2008511206A (ja) | 管理されたモバイル・ボイス・オーバー・インターネット・プロトコル(VoIP)オーバーレイ方法およびアーキテクチュア | |
WO2011038639A1 (zh) | 端到端即时通讯的实现方法、端到端即时通讯终端及系统 | |
WO2014114088A1 (zh) | 一种ngn下实现宽带业务功能的方法及业务平台 | |
US10313400B2 (en) | Method of selecting a network resource | |
KR100660123B1 (ko) | Nat 통과를 위한 브이.피.엔 서버 시스템 및 브이.피.엔클라이언트 단말기 | |
US20060230155A1 (en) | System and method for peer-to-peer communications with soft hand over for internet enabled devices | |
CN100525202C (zh) | 一种基于h.323协议的私网终端向网守注册的方法 | |
JP5135257B2 (ja) | ホームゲートウェイ及びセッション制御サーバによって異なる経路の複数のセッションを確立する方法及びシステム | |
WO2012075779A1 (zh) | 一种保证移动节点服务质量的方法及系统 | |
JP5247534B2 (ja) | ホームゲートウェイによって異なる経路の複数のセッションを確立する方法及びシステム | |
Nurmela | Session initiation protocol |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 10819866 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 13395920 Country of ref document: US |
|
REEP | Request for entry into the european phase |
Ref document number: 2010819866 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2010819866 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: 20127008326 Country of ref document: KR Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2012531222 Country of ref document: JP |