WO2024001753A1 - 一种网络穿透系统的启动方法及报文收发方法、通信设备 - Google Patents

一种网络穿透系统的启动方法及报文收发方法、通信设备 Download PDF

Info

Publication number
WO2024001753A1
WO2024001753A1 PCT/CN2023/099827 CN2023099827W WO2024001753A1 WO 2024001753 A1 WO2024001753 A1 WO 2024001753A1 CN 2023099827 W CN2023099827 W CN 2023099827W WO 2024001753 A1 WO2024001753 A1 WO 2024001753A1
Authority
WO
WIPO (PCT)
Prior art keywords
control module
message
network
messages
module
Prior art date
Application number
PCT/CN2023/099827
Other languages
English (en)
French (fr)
Inventor
刘蛟
周春旭
刘纪文
Original Assignee
中移(杭州)信息技术有限公司
中国移动通信集团有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中移(杭州)信息技术有限公司, 中国移动通信集团有限公司 filed Critical 中移(杭州)信息技术有限公司
Publication of WO2024001753A1 publication Critical patent/WO2024001753A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/10Active monitoring, e.g. heartbeat, ping or trace-route
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/09Mapping addresses
    • H04L61/25Mapping addresses of the same type
    • H04L61/2503Translation of Internet protocol [IP] addresses
    • H04L61/256NAT traversal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/09Mapping addresses
    • H04L61/25Mapping addresses of the same type
    • H04L61/2503Translation of Internet protocol [IP] addresses
    • H04L61/2592Translation of Internet protocol [IP] addresses using tunnelling or encapsulation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/16Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
    • H04L69/164Adaptation or special uses of UDP protocol

Definitions

  • the invention relates to the field of terminals and personal home services, and in particular to a method for starting a network penetration system, a method for sending and receiving messages, and communication equipment.
  • the communication devices When communicating between communication devices for specific functions, the communication devices need to be in the same local area network.
  • Features include screen projection, remote control, file sharing, etc.
  • these communication devices are often not on the same local area network, which renders these specific functions unavailable.
  • a server in order to enable communication for specific functions between communication devices that are not in the same local area network, a server can be built in the cloud and the messages of communication devices in different network environments can be forwarded through the server, thereby enabling communication devices in different network environments. communication for specific functions.
  • the server and the application software are strongly associated, that is to say, specific functions are only used within the same application software, which will result in the inability to communicate between different application software for specific functions.
  • embodiments of the present application provide a method for starting a network penetration system, a method for sending and receiving messages, communication equipment, chips, and computer-readable storage media.
  • inventions of the present application provide a method for starting a network penetration system.
  • the network penetration system includes an application control module, a traffic tunnel module and a network control module; the method includes:
  • the network control module is started through the traffic tunnel module
  • the networking control module After the networking control module is successfully started, it connects to the cloud server through the networking control module, accepts the allocation information sent by the cloud server, configures routing information based on the allocation information, and sends the routing information to the Traffic tunnel module;
  • the routing information is sent to the system network layer through the traffic tunnel module to complete the startup of the network penetration system, where the routing information is used by the system network layer to intercept messages that comply with the rules.
  • embodiments of the present application provide a message sending method based on a network penetration system, including:
  • the intercepted message is encoded through the network control module, and the encoded message is sent to the cloud server.
  • the cloud server is used to forward the encoded message to the message receiving end.
  • embodiments of the present application provide a message receiving method based on a network penetration system, including:
  • the intercepted messages are parsed through the networking control module, and the parsed message contents are sent to the traffic tunnel module;
  • the application data is sent to the application layer for processing through the application control module.
  • embodiments of the present application provide a network penetration system, including an application control module, a traffic tunnel module and a network control module;
  • the application control module is configured to activate the traffic tunnel module
  • the traffic tunnel module is configured to activate the networking control module
  • the networking control module is configured to connect to the cloud server, receive distribution information sent by the cloud server, configure routing information based on the distribution information, and send the routing information to the traffic tunnel module;
  • the traffic tunnel module is also configured to send the routing information to the system network layer to complete the startup of the network penetration system, where the routing information is used by the system network layer to intercept messages that comply with the rules.
  • inventions of the present application provide a communication device, including a system network layer and a network penetration system.
  • the network penetration system includes an application control module, a traffic tunnel module and a networking control module; wherein,
  • the system network layer is configured to receive messages sent by the application layer, intercept messages that comply with the rules based on routing information, and send the intercepted messages to the traffic tunnel module;
  • the traffic tunnel module is configured to send intercepted messages to the network control module
  • the networking control module is configured to encode the intercepted message and send the encoded message to the cloud server.
  • the cloud server is used to forward the encoded message to the message receiving end.
  • the communication device has a system network layer and a network penetration system.
  • the network penetration system includes an application control module, a traffic tunnel module and a networking control module; wherein,
  • the system network layer is configured to receive messages sent by the cloud server, intercept messages that comply with the rules based on routing information, and send the intercepted messages to the network control module;
  • the networking control module is configured to parse the intercepted messages and send the parsed message contents to the traffic tunnel module;
  • the traffic tunnel module is configured to parse the message content and send the parsed application data to the application control module;
  • the application control module is configured to send the application data to the application layer for processing.
  • embodiments of the present application provide a communication device, including: a processor and a memory, the memory is used to store a computer program, the processor is used to call and run the computer program stored in the memory, and execute any of the above.
  • a communication device including: a processor and a memory, the memory is used to store a computer program, the processor is used to call and run the computer program stored in the memory, and execute any of the above.
  • embodiments of the present application provide a chip, including: a processor, configured to call and run a computer program from a memory, so that a device equipped with the chip executes any of the above methods.
  • embodiments of the present application provide a computer-readable storage medium for storing a computer program, and the computer program causes the computer to execute any of the above methods.
  • the network penetration system includes an application control module, a traffic tunnel module and a network control module. Through these three modules, they cooperate with each other to complete the network penetration function and can intercept all messages that comply with routing rules and By forwarding intercepted messages, communication for specific functions can be realized between communication devices that are not in the same LAN.
  • the network penetration function implemented by the network penetration system can be applied to any form of application software. (That is, the network penetration system does not depend on the type of application software), so it can realize communication between different application software for specific functions.
  • Figure 1 is a schematic flowchart 1 of the startup method of the network penetration system provided by the embodiment of the present application;
  • FIG. 2 is a schematic flowchart 1 of the message sending method of the network penetration system provided by the embodiment of the present application;
  • FIG. 3 is a schematic flowchart 1 of the message receiving method of the network penetration system provided by the embodiment of the present application;
  • FIG. 4 is a schematic flowchart 2 of the startup method of the network penetration system provided by the embodiment of the present application.
  • FIG. 5 is a schematic flowchart 2 of the message sending method of the network penetration system provided by the embodiment of the present application.
  • Figure 6 is a schematic flow chart 2 of the message receiving method of the network penetration system provided by the embodiment of the present application.
  • Figure 7 is a schematic structural diagram of the network penetration system provided by the embodiment of the present application.
  • Figure 8 is a schematic structural diagram of a communication device provided by an embodiment of the present application.
  • Figure 9 is a schematic structural diagram 2 of a communication device provided by an embodiment of the present application.
  • Figure 10 is a schematic structural diagram of a chip according to an embodiment of the present application.
  • the technical solution of the embodiment of the present application provides a method for starting a network penetration system and a method and device for sending and receiving messages to realize virtual networking of devices in different network environments, thereby achieving functions such as remote screen sharing, control, and screen projection.
  • the technical solutions of the embodiments of the present application are applied to communication devices.
  • the communication devices may be mobile phones, tablet computers, notebooks, desktops, all-in-one machines, smart home devices (such as televisions, printers), etc.
  • the operating system of the communication device may be, but is not limited to, an IOS system.
  • the technical solution of the embodiment of the present application introduces a network penetration system based on the operating system of the communication device.
  • the network penetration system includes an application control module, a traffic tunnel module and a networking control module.
  • Figure 1 is a schematic flowchart 1 of a method for starting a network penetration system provided by an embodiment of the present application. As shown in Figure 1, the method for starting a network penetration system includes the following steps:
  • Step 101 The application control module starts the traffic tunnel module
  • the calling instruction of the application layer is obtained; in response to the calling instruction, the management (Manager) class of the application control module is called to start the traffic tunnel module.
  • the traffic tunnel module starts the interception function and the User Datagram Protocol (UDP) function; wherein the interception function is used to forward intercepted reports.
  • UDP User Datagram Protocol
  • the UDP functionality is used to pass UDP sessions.
  • Step 102 After the traffic tunnel module is successfully started, start the network control module through the traffic tunnel module.
  • the method before starting the networking control module through the flow control module, the method further includes: outputting first prompt information, and the first prompt information is used to prompt the user whether to agree to start.
  • the network penetration system if the first operation for the first prompt information is obtained, the step of starting the network control module by the traffic tunnel module is executed, and the first operation is to agree to start the network penetration. If a second operation is obtained for the first prompt information, it is determined that starting the network penetration system fails, and the second operation is an operation that does not agree to start the network penetration system.
  • the type of the first prompt information may be a voice type, a text type, a picture type, etc.
  • the embodiment of the present application does not limit the type of the first prompt information.
  • Step 103 After the networking control module is successfully started, connect to the cloud server through the networking control module, accept the allocation information sent by the cloud server, configure routing information based on the allocation information, and send the routing information. to the traffic tunnel module.
  • connecting to the cloud server through the networking control module can be implemented in the following ways:
  • Send heartbeat messages to multiple candidate cloud servers through the network control module receive response messages sent by the multiple candidate cloud servers; determine the multiple candidate cloud servers based on the delay of the response messages of the multiple candidate cloud servers.
  • Priority order of candidate cloud servers select one cloud server from the plurality of candidate cloud servers for connection based on the priority order and/or network status of the plurality of candidate cloud servers.
  • the candidate cloud server with a higher priority has a higher probability of being selected
  • the candidate cloud server with a better network status has a higher probability of being selected.
  • the network status can be network delay.
  • the allocation information includes: the IP address of the target device and the key information used by the target device, where the target device refers to the device where the network penetration system is located.
  • the networking control module and the cloud server before receiving the allocation information sent by the cloud server, it is determined whether the networking control module and the cloud server are connected successfully; if the connection is successful, the receiving the allocation information sent by the cloud server is performed. The step of allocating information; if the connection fails, it is determined that starting the network penetration system fails.
  • a heartbeat message is sent to the cloud server through the networking control module.
  • the heartbeat message is used to keep alive the relationship between the networking control module and the cloud server. Connection.
  • a heartbeat message is sent to the cloud server through the networking control module; wherein the conditions for the timer to be reset include at least one of the following:
  • the first condition is that the networking control module sends a message to the cloud server or receives a message sent by the server;
  • the second condition is that the timer reaches a preset time.
  • the preset time may be 10 seconds, for example.
  • the network control module when the network control module does not send a message to the cloud server or receive a message from the server, after the timer reaches 10s, the network control module sends a heartbeat message to the cloud server and resets it to 10s. , and then, after the timer reaches 10s again, the network control module sends a heartbeat message to the cloud server and resets it to 0s, and so on.
  • the network control module when the network control module sends a message to the cloud server or receives a message from the server, the timer is reset to 0s. After the timer reaches 10s, the network control module sends a heartbeat message to the cloud server. , and reset to 0s.
  • N is an integer greater than or equal to 2; otherwise, the network penetration system is maintained in the online state.
  • the value of N can be 2, or 3, or 4, etc.
  • Step 104 Send the routing information to the system network layer through the traffic tunnel module to complete the startup of the network penetration system, where the routing information is used by the system network layer to intercept messages that comply with the rules.
  • FIG. 2 is a schematic flowchart 1 of a message sending method based on a network penetration system provided by an embodiment of the present application. As shown in Figure 2, the message sending method based on a network penetration system includes the following steps:
  • Step 201 Receive the packets sent by the application layer through the system network layer, intercept the packets that comply with the rules according to the routing information, and send the intercepted packets to the traffic tunnel module.
  • the routing information includes an intercepted routing table; accordingly, determine whether the destination address of the message is in the intercepted routing table; if it is, intercept the message; if not, send it through the system network layer the message.
  • Step 202 Send the intercepted message to the network control module through the traffic tunnel module.
  • the network control module encodes the intercepted messages according to a specific message format; wherein the specific message format includes one or more of the following information: message identification, target address Hash value, abnormal message flag, number of messages, heartbeat packet record information, protocol version number, message type, local network flag, IP address assigned by the local network, and message content.
  • the specific message format includes one or more of the following information: message identification, target address Hash value, abnormal message flag, number of messages, heartbeat packet record information, protocol version number, message type, local network flag, IP address assigned by the local network, and message content.
  • Step 203 Encode the intercepted message through the network control module, and send the encoded message to the cloud server.
  • the cloud server is used to forward the encoded message to the message receiving end.
  • the encoded packets are encrypted using key information by the networking control module; the encoded packets are encrypted through the UDP session.
  • the encoded and encrypted message is sent to the cloud server. Then, the encoded message is forwarded to the message receiving end through the cloud server.
  • FIG 3 is a schematic flowchart 1 of a packet receiving method based on a network penetration system provided by an embodiment of the present application. As shown in Figure 3, the packet receiving method based on a network penetration system includes the following steps:
  • Step 301 Receive the packets sent by the cloud server through the system network layer, intercept the packets that comply with the rules according to the routing information, and send the intercepted packets to the network control module.
  • the routing information includes an intercepted routing table; determine whether the destination address of the message is in the intercepted routing table; if it is, intercept the message; if not, send the message to the corresponding application. for processing.
  • Step 302 Use the networking control module to parse the intercepted message, and send the parsed message content to the traffic tunnel module.
  • the network control module parses the intercepted messages according to a specific message format; wherein the specific message format includes one or more of the following information: message identification, target address Hash value, abnormal message flag, number of messages, heartbeat packet record information, protocol version number, message type, local network flag, IP address assigned by the local network, and message content.
  • the specific message format includes one or more of the following information: message identification, target address Hash value, abnormal message flag, number of messages, heartbeat packet record information, protocol version number, message type, local network flag, IP address assigned by the local network, and message content.
  • Step 303 Parse the message content through the traffic tunnel module, and send the parsed application data to the application control module.
  • the key information is used by the networking control module to parse the intercepted message. Decrypt; and parse the decrypted message through the networking control module.
  • Step 304 Send the application data to the application layer for processing through the application control module.
  • FIG. 4 is a schematic flowchart 2 of the startup method of the network penetration system provided by the embodiment of the present application. As shown in Figure 4, the startup method of the network penetration system includes the following steps:
  • Step 401 The Manager class of the application control module starts the traffic tunnel module.
  • Step 402 The system asks the user whether he agrees to the authorization. If he does not agree, the network penetration system fails to start and the process ends. End; if agreed, proceed to step 403.
  • the method before starting the networking control module through the traffic tunnel module, the method further includes: outputting first prompt information, the first prompt information being used to prompt the user whether to agree to start the network. penetration system;
  • the first operation for the first prompt information If the first operation for the first prompt information is obtained, then execute the step of starting the network control module by the traffic tunnel module, and the first operation is the operation of agreeing to start the network penetration system;
  • Step 403 The traffic tunnel module starts the interception function and the UDP function.
  • the interception function is also used to forward intercepted messages
  • the UDP function is also used to provide a UDP session.
  • Step 404 The traffic tunnel module will call the system method PTP to obtain the interception function with system permissions, and the UDP session will cooperate to forward the intercepted messages. If the UDP function fails to start, the system fails to start and the process ends. If successful, proceed to step 405.
  • Step 405 The networking control module connects to the cloud server.
  • Step 406 Determine whether the network control module and the cloud server are successfully connected; if the connection fails, the system startup fails and the process ends. If the connection is successful, proceed to step 407.
  • Step 407 The networking control module receives the allocation information sent by the cloud server, configures routing information based on the allocation information, and sends the routing information to the traffic tunnel module; wherein the allocation information includes the target device The IP address and key information used by the target device, as well as routing configuration information.
  • the networking control module When the networking control module successfully connects to the cloud server, it sends a heartbeat message to the cloud server through the networking control module.
  • the heartbeat message is used to keep alive the relationship between the networking control module and the cloud server. Connection.
  • Send heartbeat messages to multiple candidate cloud servers through the network control module receive response messages sent by the multiple candidate cloud servers; determine the multiple candidate cloud servers based on the delay of the response messages of the multiple candidate cloud servers.
  • Priority order of candidate cloud servers select one cloud server from the plurality of candidate cloud servers for connection based on the priority order and/or network status of the plurality of candidate cloud servers.
  • the following settings can be made for the system, and the policies are as follows:
  • cloud servers are deployed in different environments. For example, some are deployed directly on the company's intranet, and local connections are also optimized.
  • the system When connecting for the first time, the system will send heartbeats to all cloud servers at the same time, locally record cache return delays and information, select the current optimal line for connection, broadcast messages, etc. If the network conditions change, such as the current server is disconnected and the WIFI intranet is switched to 4G/5G, the cache information will be queried to select the suboptimal link for connection; if all servers cannot be connected, the system will be notified to go offline.
  • Step 408 Send the routing information to the system network layer through the traffic tunnel module, and the system network layer starts intercepting traffic packets according to the configured system router information.
  • the routing information is used by the system network layer to intercept packets that comply with rules.
  • Step 409 The network penetration system is started.
  • FIG. 5 is a schematic flowchart 2 of the message sending method of the network penetration system provided by the embodiment of the present application. As shown in Figure 5, the message sending method of the network penetration system includes the following steps:
  • Step 501 When the application layer has a network to send a request, it will first organize the message according to its own business requirements and send it to the target address.
  • Step 502 The system network layer receives the message sent by the application layer
  • Step 503 The system network layer will judge the received message and check whether the target address in the message is in the intercepted routing table. If not, it will be sent directly by the system network layer and the process ends; if it is, the intercepted routing table will be sent. The message is sent to the traffic tunnel module and step 504 is entered.
  • Step 504 The traffic tunnel module sends the intercepted packets to the network control module;
  • Step 505 The network control module encodes the intercepted message and sends the encoded message to the cloud server;
  • the networking control module encodes intercepted messages according to a specific message format. Please refer to the following table for the specific coded message format:
  • Sections 4-9 contain message-related information. For large amounts of business data, it can be split and sent, and finally the receiving end performs merge processing. Cloud servers can also perform traffic control and split forwarding.
  • Step 506 The encoded message is encrypted with a key and sent to the cloud server through a UDP session. After parsing, the cloud server is responsible for forwarding it to the device with the corresponding IP. The device can parse the message and use it. The process ends.
  • FIG. 6 is a schematic flow chart 2 of a packet receiving method of a network penetration system provided by an embodiment of the present application. As shown in Figure 6, the packet sending method of a network penetration system includes the following steps:
  • Step 601 The system network layer receives the message sent by the cloud server.
  • Step 602 The system network layer processes the received message.
  • Step 603 The system network layer determines whether the destination address of the received message is in the intercepted routing table. If not, the message is sent to the corresponding application layer for processing; if it is, the message that meets the rules is intercepted according to the routing information, and the intercepted message is sent to the networking control module.
  • Step 604 The network control module parses the intercepted message and sends the parsed message content to the traffic tunnel module;
  • the network control module parses intercepted messages according to a specific message format; wherein the specific message format includes one or more of the following information: message identification, The hash value of the destination address, abnormal message flag, number of messages, heartbeat packet record information, protocol version number, message type, local network flag, IP address assigned by the local network, and message content.
  • Step 605 The traffic tunnel module sends the parsed message to the corresponding application layer for processing, and the process ends.
  • FIG. 7 is a schematic structural diagram of a network penetration system provided by an embodiment of the present application.
  • the network penetration system includes: an application control module 701, a traffic tunnel module 702 and a network control module 703; three The modules cooperate with each other to complete the network penetration system, and the entire system is an independent process running in the operating system. middle,
  • the application control module 701 is mainly responsible for receiving application layer instructions, controlling opening/closing of the traffic tunnel, monitoring the status of the traffic tunnel, and sending and receiving data of the traffic tunnel and the business layer.
  • the traffic tunnel module 702 is mainly responsible for establishing system-level processes, UDP forwarding channels, setting interception routing information and rules, and passing data sent and received by interception devices on specific routes to the network control for processing.
  • the networking control module 703 is configured to connect to the cloud server, cache and dynamically switch connection nodes, configure assigned IP, public key, device unique identifier and other information, and assemble and parse the data sent by the traffic tunnel according to rules.
  • FIG 8 is a schematic structural diagram of a communication device provided by an embodiment of the present application.
  • the communication device has a system network layer and a network penetration system.
  • the network penetration system includes an application control module, Traffic tunnel module and network control module; among them, the three modules cooperate with each other to complete the network penetration system, and the entire system is an independent process running in the operating system.
  • the application control module is mainly responsible for receiving application layer instructions, controlling opening/closing of the traffic tunnel, monitoring the status of the traffic tunnel, and sending and receiving data of the traffic tunnel and the business layer.
  • the traffic tunnel module is mainly responsible for establishing system-level processes, UDP forwarding channels, setting interception routing information and rules, and passing data sent and received by interception devices on specific routes to the network control for processing.
  • the networking control module is configured to connect to the cloud server, cache and dynamically switch connection nodes, configure assigned IP, public key, device unique identifier and other information, and assemble and parse the data sent by the traffic tunnel according to rules.
  • the starting method of the network penetration system includes: the application control module is configured to start the traffic tunnel module; the traffic tunnel module is configured to start the network control module ;
  • the networking control module is configured to connect to the cloud server, receive distribution information sent by the cloud server, configure routing information based on the distribution information, and send the routing information to the traffic tunnel module; the traffic tunnel The module is also configured to send the routing information to the system network layer to complete the startup of the network penetration system, wherein the routing information is used by the system network layer to intercept messages that comply with the rules.
  • the message sending method of the network penetration system includes: the system network layer receives the message sent by the application layer, intercepts the message that conforms to the rules according to the routing information, and sends the intercepted message to The message is sent to the traffic tunnel module; the traffic tunnel module sends the intercepted message to the network control module; the network control module encodes the intercepted message and sends the encoded message to the cloud server , the cloud server is used to forward the encoded message to the message receiving end.
  • the message receiving method of the network penetration system includes: the system network layer receives the message sent by the cloud server, intercepts the message that conforms to the rules according to the routing information, and sends the intercepted message to The message is sent to the networking control module; the network control module parses the intercepted message and sends the parsed message content to the traffic tunnel module; the traffic tunnel module parses the message content, The parsed application data is sent to the application control module; the application control module sends the application data to the application layer for processing.
  • the system network layer intercepts data packets according to the routing information and sends the data packets to the traffic tunnel module.
  • the traffic tunnel module sends the intercepted traffic packets to the networking control module.
  • the network control module encodes the intercepted messages according to a specific message format; wherein the specific message format includes one or more of the following information: message identification, hash value of the target address, exception report Message flag, number of messages, heartbeat packet record information, protocol version number, message type, local network flag, IP address assigned by the local network, and message content.
  • the networking control module sends the encoded message to the cloud server, and the cloud server is used to forward the encoded message to the message receiving end.
  • the application layer when the application layer has a network to send a request, it will first organize the message according to its own business needs and send it to the target address. After receiving the send request, the system network layer checks whether the target address is in the intercepted routing table. If not, it is sent directly by the system network layer and the process ends. If so, the traffic tunnel module will first send the report The text is intercepted and then delivered as a whole to the networking control module for encoding. The encoded message is encrypted with a public key and sent to the cloud server through a UDP session. After parsing, the cloud server is responsible for forwarding it to the device with the corresponding IP. The device can parse the message and use it, and the process ends.
  • a network message when a network message is received, it is first handed over to the system network layer for processing.
  • the system network layer determines whether the target IP needs to be intercepted based on the configured routing information. If not, it will be handed over to the corresponding application for processing. For example, instant messaging messages and Weibo messages will be processed by the respective applications. If so, the networking control module obtains the intercepted message and parses the message according to the format, which is the same as the format of the sent message. The parsed real message is then handed over to the traffic tunnel module.
  • the traffic tunnel module receives the parsed message from the network control module, and then parses it into the business information required by the application control module and delivers it to the application layer.
  • the application layer processes business information to achieve functions such as remote control and screen projection, and the process ends.
  • Figure 9 is a schematic structural diagram 2 of a communication device provided by an embodiment of the present application.
  • the communication device 900 shown in Figure 9 includes a processor 901.
  • the processor 901 can call and run a computer program from the memory to implement the embodiment of the present application. Methods.
  • the communication device 900 may further include a memory 902.
  • the processor 901 can call and run the computer program from the memory 902 to implement the method in the embodiment of the present application.
  • the memory 902 may be a separate device independent of the processor 901 , or may be integrated into the processor 901 .
  • the communication device 900 can also include a transceiver 903.
  • the processor 901 can control the transceiver 903 to communicate with other devices. Specifically, it can send information or data to other devices, or receive other devices. Information or data sent by the device.
  • the transceiver 903 may include a transmitter and a receiver.
  • the transceiver 1330 may further include an antenna, and the number of antennas may be one or more.
  • the communication device 900 may specifically be the network penetration system of the embodiment of the present application, and the communication device 900 may implement the corresponding processes implemented by the network penetration system in each method of the embodiment of the present application. For the sake of brevity, no further details will be given here. .
  • Figure 10 is a schematic structural diagram of a chip according to an embodiment of the present application.
  • the chip 1000 shown in Figure 10 includes a processor 1001.
  • the processor 1001 can call and run a computer program from the memory to implement the method in the embodiment of the present application.
  • the chip 1000 may also include a memory 1002 .
  • the processor 1001 can call and run the computer program from the memory 1002 to implement the method in the embodiment of the present application.
  • the memory 1002 may be a separate device independent of the processor 1001, or may be integrated into the processor 1001.
  • the chip 1000 may also include an input interface 1003.
  • the processor 1001 can control the input interface 1003 to communicate with other devices or chips. Specifically, it can obtain information or data sent by other devices or chips.
  • the chip 1000 may also include an output interface 1004.
  • the processor 1001 can control the output interface 1004 to communicate with other devices or chips. Specifically, it can output information or data to other devices or chips.
  • This chip can be applied to the network penetration system in the embodiment of the present application, and the chip can implement the corresponding processes implemented by the network penetration system in each method of the embodiment of the present application. For the sake of simplicity, details will not be described here.
  • chips mentioned in the embodiments of this application may also be called system-on-chip, system-on-a-chip, system-on-chip or system-on-chip, etc.
  • the processor in the embodiment of the present application may be an integrated circuit chip and has signal processing capabilities. During the implementation process, each step of the above method embodiment can be completed through an integrated logic circuit of hardware in the processor or instructions in the form of software.
  • the above-mentioned processor may be a general-purpose processor, a digital signal processor (Digital Signal Processor) Processor, DSP), application specific integrated circuit (Application Specific Integrated Circuit, ASIC), off-the-shelf programmable gate array (Field Programmable Gate Array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components.
  • DSP digital signal processor
  • ASIC Application Specific Integrated Circuit
  • FPGA Field Programmable Gate Array
  • Each method, step and logical block diagram disclosed in the embodiment of this application can be implemented or executed.
  • a general-purpose processor may be a microprocessor or the processor may be any conventional processor, etc.
  • the steps of the method disclosed in conjunction with the embodiments of the present application can be directly implemented by a hardware decoding processor, or executed by a combination of hardware and software modules in the decoding processor.
  • the software module can be located in random access memory, flash memory, read-only memory, programmable read-only memory or electrically erasable programmable memory, registers and other mature storage media in this field.
  • the storage medium is located in the memory, and the processor reads the information in the memory and completes the steps of the above method in combination with its hardware.
  • non-volatile memory can be read-only memory (Read-Only Memory, ROM), programmable read-only memory (Programmable ROM, PROM), erasable programmable read-only memory (Erasable PROM, EPROM), electrically removable memory. Erase programmable read-only memory (Electrically EPROM, EEPROM) or flash memory. Volatile memory may be Random Access Memory (RAM), which is used as an external cache.
  • RAM Random Access Memory
  • RAM static random access memory
  • DRAM dynamic random access memory
  • DRAM synchronous dynamic random access memory
  • SDRAM double data rate synchronous dynamic random access memory
  • Double Data Rate SDRAM DDR SDRAM
  • enhanced SDRAM ESDRAM
  • Synchlink DRAM SLDRAM
  • Direct Rambus RAM Direct Rambus RAM
  • the memory in the embodiment of the present application can also be a static random access memory (static RAM, SRAM), a dynamic random access memory (dynamic RAM, DRAM), Synchronous dynamic random access memory (synchronous DRAM, SDRAM), double data rate synchronous dynamic random access memory (double data rate SDRAM, DDR SDRAM), enhanced synchronous dynamic random access memory (enhanced SDRAM, ESDRAM), synchronous connection Dynamic random access memory (synch link DRAM, SLDRAM) and direct memory bus random access memory (Direct Rambus RAM, DR RAM) and so on. That is, memories in embodiments of the present application are intended to include, but are not limited to, these and any other suitable types of memories.
  • Embodiments of the present application also provide a computer-readable storage medium for storing computer programs.
  • the computer-readable storage medium can be applied to the startup method or the message sending and receiving method or device of the network penetration system in the embodiment of the present application, and the computer program causes the computer to execute the network penetration system in each method of the embodiment of the present application.
  • the corresponding process of implementation will not be repeated here for the sake of brevity.
  • each module in the network penetration system shown in Figure 7 can be understood with reference to the related descriptions of the startup method and the message sending and receiving method of the foregoing system.
  • the functions of each module in the network penetration system shown in Figure 7 can be implemented through programs running on the processor, or through specific logic circuits.
  • the disclosed methods and smart devices can be implemented in other ways.
  • the device embodiments described above are only illustrative.
  • the division of modules is only a logical function division.
  • the coupling, direct coupling, or communication connection between the components shown or discussed may be through some interfaces, and the indirect coupling or communication connection of devices or modules may be electrical, mechanical, or other forms. of.
  • the modules described above as separate components may or may not be physically separated.
  • the components shown as modules may or may not be physical modules, that is, they may be located in one place or distributed to multiple network modules; Some or all of the modules can be selected according to actual needs to achieve the purpose of the solution of this embodiment.
  • each functional module in each embodiment of the present invention can be all integrated into a second processing module, or each module can be separately used as a module, or two or more modules can be integrated into one module;
  • the above integrated modules can be implemented in the form of hardware or in the form of hardware plus software function modules.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Cardiology (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Security & Cryptography (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

本申请公开了一种网络穿透系统的启动方法及报文收发方法、通信设备,所述网络穿透系统主要有三个组成部分:应用控制、流量隧道、组网控制。所述三个组成部分相互协作,共同完成网络穿透系统,并且整个系统是独立运行在操作系统层的进程,可以实现拦截所有符合路由规则的应用流量并转发,最终达到跨网络的虚拟局域网效果。

Description

一种网络穿透系统的启动方法及报文收发方法、通信设备
相关申请的交叉引用
本申请基于申请号为202210743954.6、申请日为2022年06月27日的中国专利申请提出,并要求该中国专利申请的优先权,该中国专利申请的全部内容在此引入本申请作为参考。
技术领域
本发明涉及终端领域、个人家庭业务领域,尤其涉及一种网络穿透系统的启动方法及报文收发方法、通信设备。
背景技术
通信设备之间进行针对特定功能的通信时,需要通信设备位于同一局域网内才可以实现,特征功能例如有投屏、远程控制、文件共享等。然而,这些通信设备常常不在同一局域网内,这将导致这些特定功能无法使用。
目前,为了使不在同一局域网内的通信设备之间可以实现针对特定功能的通信,可以通过云端搭建服务器,通过服务器转发不同网络环境下的通信设备的报文,从而实现不同网络环境下的通信设备之间进行针对特定功能的通信。然而,服务器与应用软件是强关联的,也就是说,特定功能仅限于同一应用软件内部使用,这将导致不同应用软件之间无法进行针对特定功能的通信。
发明内容
为解决上述技术问题,本申请实施例提供了一种网络穿透系统的启动方法及报文收发方法、通信设备、芯片、计算机可读存储介质。
一方面,本申请实施例提供一种网络穿透系统的启动方法,所述网络穿透系统包括应用控制模块、流量隧道模块和组网控制模块;所述方法包括:
通过所述应用控制模块启动所述流量隧道模块;
所述流量隧道模块启动成功后,通过所述流量隧道模块启动所述组网控制模块;
所述组网控制模块启动成功后,通过所述组网控制模块连接云服务器,并接受所述云服务器发送的分配信息,基于所述分配信息配置路由信息,将所述路由信息发送给所述流量隧道模块;
通过所述流量隧道模块将所述路由信息发送给系统网络层,完成所述网络穿透系统的启动,其中,所述路由信息用于所述系统网络层拦截符合规则的报文。
再一方面,本申请实施例提供一种基于网络穿透系统的报文发送方法,包括:
通过系统网络层接收应用层发送的报文,根据路由信息拦截符合规则的报文,将拦截的报文发送给组网控制模块;
通过所述组网控制模块对拦截的报文进行编码,并将编码后的报文发送给云服务器,所述云服务器用于将编码后的报文转发后报文接收端。
再一方面,本申请实施例提供一种基于网络穿透系统的报文接收方法,包括:
通过系统网络层接收云服务器发送的报文,根据路由信息拦截符合规则的报文,将拦截的报文发送给组网控制模块;
通过所述组网控制模块对拦截的报文进行解析,将解析得到的报文内容发送给流量隧道模块;
通过所述流量隧道模块对所述报文内容进行解析,将解析得到的应用数据发送给应用控制模块;
通过所述应用控制模块将应用数据发送给应用层进行处理。
再一方面,本申请实施例提供一种网络穿透系统,包括应用控制模块、流量隧道模块和组网控制模块;
所述应用控制模块,配置为启动所述流量隧道模块;
所述流量隧道模块,配置为启动所述组网控制模块;
所述组网控制模块,配置为连接云服务器,并接收所述云服务器发送的分配信息,基于所述分配信息配置路由信息,将所述路由信息发送给所述流量隧道模块;
所述流量隧道模块,还配置为将所述路由信息发送给系统网络层,完成所述网络穿透系统的启动,其中,所述路由信息用于所述系统网络层拦截符合规则的报文。
再一方面,本申请实施例提供一种通信设备,包括系统网络层和网络穿透系统,所述网络穿透系统包括应用控制模块、流量隧道模块和组网控制模块;其中,
所述系统网络层,配置为接收应用层发送的报文,根据路由信息拦截符合规则的报文,将拦截的报文发送给流量隧道模块;
所述流量隧道模块,配置为将拦截的报文发送给组网控制模块;
所述组网控制模块,配置为对拦截的报文进行编码,并将编码后的报文发送给云服务器,所述云服务器用于将编码后的报文转发给报文接收端。
再一方面,本申请实施例提供一种通信设备,所述通信设备具有系统网络层和网络穿透系统,所述网络穿透系统包括应用控制模块、流量隧道模块和组网控制模块;其中,
所述系统网络层,配置为接收云服务器发送的报文,根据路由信息拦截符合规则的报文,将拦截的报文发送给组网控制模块;
所述组网控制模块,配置为对拦截的报文进行解析,将解析得到的报文内容发送给流量隧道模块;
所述流量隧道模块,配置为对所述报文内容进行解析,将解析得到的应用数据发送给应用控制模块;
所述应用控制模块,配置为将所述应用数据发送给应用层进行处理。
再一方面,本申请实施例提供一种通信设备,包括:处理器和存储器,该存储器用于存储计算机程序,所述处理器用于调用并运行所述存储器中存储的计算机程序,执行上述任意一种网络穿透系统的启动方法及报文收发方法。
再一方面,本申请实施例提供一种芯片,包括:处理器,用于从存储器中调用并运行计算机程序,使得安装有所述芯片的设备执行上述任意一种方法。
再一方面,本申请实施例提供一种计算机可读存储介质,用于存储计算机程序,所述计算机程序使得计算机执行上述任意一种方法。
本申请实施例的技术方案中,网络穿透系统包括应用控制模块、流量隧道模块和组网控制模块,通过这三个模块相互协同完成网络穿透功能,可以拦截所有符合路由规则的报文并对拦截的报文进行转发,从而可以使得不在同一局域网内的通信设备之间也可实现针对特定功能的通信,并且,网络穿透系统所实现的网络穿透功能可以适用于任意形式的应用软件(也即网络穿透系统不依赖应用软件的类型),因此可以实现不同应用软件之间进行针对特定功能的通信。
附图说明
此处的附图被并入说明书中并构成本说明书的一部分,示出了符合本公开的实施例,并与说明书一起用于解释本公开的原理。
图1是本申请实施例提供的网络穿透系统的启动方法的流程示意图一;
图2是本申请实施例提供的网络穿透系统的报文发送方法的流程示意图一;
图3是本申请实施例提供的网络穿透系统的报文接收方法的流程示意图一;
图4是本申请实施例提供的网络穿透系统的启动方法的流程示意图二;
图5是本申请实施例提供的网络穿透系统的报文发送方法的流程示意图二;
图6是本申请实施例提供的网络穿透系统的报文接收方法的流程示意图二;
图7是本申请实施例提供的网络穿透系统的结构组成示意图一;
图8是本申请实施例提供的一种通信设备示意性结构图一;
图9是本申请实施例提供的一种通信设备示意性结构图二;
图10是本申请实施例的芯片的示意性结构图。
具体实施方式
为了能够更加详尽地了解本申请实施例的特点与技术内容,下面结合附图对本申请实施例的实现进行详细阐述,所附附图仅供参考说明之用,并非用来限定本申请实施例。
随着移动互联技术的发展,手机、平板成为了个人家庭主要使用设备。但是这些移动设备常常不在同一个局域网内,导致诸如投屏、远程控制、文件共享等需要同一局域网内的功能无法使用。
目前大多数实现远程屏幕共享、控制以及文件分享传输软件都是通过云端搭建文件或者流媒体服务器,转发各个网络环境下接入设备的数据来实现。诸如通信软件、云盘等软件可以实现不同网络环境下设备之间连接以及文件共享,但是所有的数据通过软件自己的云服务器转发,并且只限于本应用内使用,比如其他视频软件内的资源没办法直接通过软件投屏到另一台设备上播放,只能转发过去后本地播放。
为解决上述问题中的至少部分问题,提出了本申请实施例的以下技术方案。本申请实施例的技术方案提供一种网络穿透系统的启动方法及报文收发方法、装置,实现在不同网络环境下的设备虚拟组网,从而达成远程屏幕共享及操控、投屏等功能。
为便于理解本申请实施例的技术方案,以下通过具体实施例详述本申请的技术方案。以上相关技术作为可选方案与本申请实施例的技术方案可以进行任意结合,其均属于本申请实施例的保护范围。本申请实施例包括以下内容中的至少部分内容。
需要说明的是,本申请实施例的技术方案应用于通信设备,作为示例,通信设备可以是手机、平板电脑、笔记本、台式机、一体机、智能家居设备(如电视机、打印机)等。其中,通信设备的操作系统可以但不局限于是IOS系统。本申请实施例的技术方案基于通信设备的操作系统引入了网络穿透系统,所述网络穿透系统包括应用控制模块、流量隧道模块和组网控制模块。
图1是本申请实施例提供的网络穿透系统的启动方法的流程示意图一,如图1所示,所述网络穿透系统的启动方法包括以下步骤:
步骤101:所述应用控制模块启动所述流量隧道模块;
本申请实施例中,获得应用层的调用指令;响应所述调用指令,调用所述应用控制模块的管理(Manager)类来启动所述流量隧道模块。
这里,所述流量隧道模块启动成功后,所述流量隧道模块启动拦截功能和用户数据报协议(User Datagram Protocol,UDP)功能;其中,所述拦截功能用于转发拦截的报 文,所述UDP功能用于通过UDP会话。
步骤102:所述流量隧道模块启动成功后,通过所述流量隧道模块启动所述组网控制模块。
在一些可选实施方式中,所述通过所述流量控制模块启动所述组网控制模块之前,所述方法还包括:输出第一提示信息,所述第一提示信息用于提示用户是否同意启动所述网络穿透系统;若获得针对所述第一提示信息的第一操作,则执行所述流量隧道模块启动所述组网控制模块的步骤,所述第一操作为同意启动所述网络穿透系统的操作;若获得针对所述第一提示信息的第二操作,则判定启动所述网络穿透系统失败,所述第二操作为不同意启动所述网络穿透系统的操作。
这里,第一提示信息的类型可以是语音类型、或者是文字类型、或者是图片类型等。本申请实施例对所述第一提示信息的类型不做限定。
步骤103:所述组网控制模块启动成功后,通过所述组网控制模块连接云服务器,并接受所述云服务器发送的分配信息,基于所述分配信息配置路由信息,将所述路由信息发送给所述流量隧道模块。
在一些可选实施方式中,所述通过所述组网控制模块连接云服务器,可以通过以下方式实现:
通过所述组网控制模块向多个候选云服务器发送心跳消息,接收所述多个候选云服务器发送的响应消息;根据所述多个候选云服务器的响应消息的时延,确定所述多个候选云服务器的优先级顺序;根据所述多个候选云服务器的优先级顺序和/或网络状态从所述多个候选云服务器中选择一个云服务器进行连接。
这里,优先级越高的候选云服务器被选择的几率越高,网络状态越好的候选云服务器被选择的几率越高。作为示例:网络状态可以是网络时延。
在一些可选实施方式中,所述分配信息包括:目标设备的IP地址和目标设备使用的密钥信息,所述目标设备指所述网络穿透系统所在的设备。
在一些可选实施方式中,所述接收所述云服务器发送的分配信息之前,判断所述组网控制模块与云服务器是否连接成功;若连接成功,则执行所述接收所述云服务器发送的分配信息的步骤;若连接失败,则判定启动所述网络穿透系统失败。
在一些可选实施方式中,若连接成功,则通过所述组网控制模块向所述云服务器发送心跳消息,所述心跳消息用于保活所述组网控制模块与所述云服务器之间的连接。
具体实现时,在计时器达到预设时间时,通过所述组网控制模块向所述云服务器发送心跳消息;其中,所述计时器被重置的条件包括以下至少之一:
第一条件,所述第一条件为所述组网控制模块向所述云服务器发送报文或者接收所述服务器发送的报文;
第二条件,所述第二条件为所述计时器达到预设时间。这里,预设时间例如可以是10s。
举个例子:在组网控制模块没有向云服务器发送报文或者接收服务器发送的报文的情况下,计时器达到10s后,组网控制模块向云服务器发送一次心跳消息,并重置到10s,而后,计时器再次达到10s后,组网控制模块向云服务器发送一次心跳消息,并重置到0s,以此类推。
举个例子:在组网控制模块向云服务器发送报文或者接收服务器发送的报文的情况下,计时器重置到0s,计时器达到10s后,组网控制模块向云服务器发送一次心跳消息,并重置到0s。
进一步,若所述组网控制模块连续发送N个心跳消息均未收到响应消息,则输出第二提示信息并关闭所述网络穿透系统,所述第二提示信息用于提示所述网络穿透系统处 于离线状态,N为大于等于2的整数;否则,维持所述网络穿透系统处于在线状态。作为示例:N的取值可以为2,或者3,或者4等。
步骤104:通过所述流量隧道模块将所述路由信息发送给系统网络层,完成所述网络穿透系统的启动,其中,所述路由信息用于所述系统网络层拦截符合规则的报文。
图2是本申请实施例提供的基于网络穿透系统的报文发送方法的流程示意图一,如图2所示,所述基于网络穿透系统的报文发送方式包括以下步骤:
步骤201:通过系统网络层接收应用层发送的报文,根据路由信息拦截符合规则的报文,将拦截的报文发送给流量隧道模块。
这里,所述路由信息包括拦截的路由表;相应地,判断报文的目的地址是否在拦截的路由表中;若在,则拦截所述报文;若不在,则通过所述系统网络层发送所述报文。
步骤202:通过所述流量隧道模块将拦截的报文发送给组网控制模块。
具体地,通过所述组网控制模块按照特定的报文格式,对拦截的报文进行编码;其中,所述特定的报文格式包括以下一种或多种信息:报文标识、目标地址的哈希值、异常报文标志、报文数量、心跳包记录信息、协议版本号、报文类型、本地网络标志、本地网络分配的IP地址、报文内容。
步骤203:通过所述组网控制模块对拦截的报文进行编码,并将编码后的报文发送给云服务器,所述云服务器用于将编码后的报文转发给报文接收端。
在一些可选实施方式中,所述通过所述组网控制模块对拦截的报文进行编码之后,通过所述组网控制模块使用密钥信息对编码后的报文进行加密;通过UDP会话将编码及加密后后的报文发送给云服务器。而后,通过云服务器将编码后的报文转发给报文接收端。
图3是本申请实施例提供的基于网络穿透系统的报文接收方法的流程示意图一,如图3所示,所述基于网络穿透系统的报文接收方法包括以下步骤:
步骤301:通过系统网络层接收云服务器发送的报文,根据路由信息拦截符合规则的报文,将拦截的报文发送给组网控制模块。
这里,所述路由信息包括拦截的路由表;判断报文的目的地址是否在拦截的路由表中;若在,则拦截所述报文;若不在,则将所述报文发送给对应的应用进行处理。
步骤302:通过所述组网控制模块对拦截的报文进行解析,将解析得到的报文内容发送给流量隧道模块。
具体地,通过所述组网控制模块按照特定的报文格式,对拦截的报文进行解析;其中,所述特定的报文格式包括以下一种或多种信息:报文标识、目标地址的哈希值、异常报文标志、报文数量、心跳包记录信息、协议版本号、报文类型、本地网络标志、本地网络分配的IP地址、报文内容。
步骤303:通过所述流量隧道模块对所述报文内容进行解析,将解析得到的应用数据发送给应用控制模块。
在一些可选实施方式中,对于报文被加密的情况,所述通过所述组网控制模块对拦截的报文进行解析之前,通过所述组网控制模块使用密钥信息对拦截的报文进行解密;通过所述组网控制模块解密后的报文进行解析。
步骤304:通过所述应用控制模块将所述应用数据发送给应用层进行处理。
以下结合具体应用实例对本申请实施例的技术方案进行举例说明。
图4是本申请实施例提供的网络穿透系统的启动方法的流程示意图二,如图4所示,所述网络穿透系统的启动方法包括以下步骤:
步骤401:所述应用控制模块的Manager类启动所述流量隧道模块。
步骤402:系统询问用户是否同意授权,不同意则网络穿透系统启动失败,流程结 束;同意则进入步骤403。
一些实施例中,所述通过所述流量隧道模块启动所述组网控制模块之前,所述方法还包括:输出第一提示信息,所述第一提示信息用于提示用户是否同意启动所述网络穿透系统;
若获得针对所述第一提示信息的第一操作,则执行所述流量隧道模块启动所述组网控制模块的步骤,所述第一操作为同意启动所述网络穿透系统的操作;
若获得针对所述第一提示信息的第二操作,则判定启动所述网络穿透系统失败,所述第二操作为不同意启动所述网络穿透系统的操作。
步骤403:所述流量隧道模块启动拦截功能和UDP功能。
其中,所述拦截功能还用于转发拦截的报文,所述UDP功能还用于提供UDP会话。
步骤404:流量隧道模块会调用系统方法PTP获得系统权限的拦截功能,UDP会话配合做拦截后的报文转发。如果UDP功能启动失败,则所述系统启动失败,流程结束。如果成功成功进入步骤405。
步骤405:所述组网控制模块连接云服务器。
步骤406:判断所述组网控制模块与云服务器是否连接成功;如果连接失败,则所述系统启动失败,流程结束。如果连接成功,进入步骤407。
步骤407:所述组网控制模块接收所述云服务器发送的分配信息,基于所述分配信息配置路由信息,将所述路由信息发送给所述流量隧道模块;其中,所述分配信息包括目标设备的IP地址和目标设备使用的密钥信息,以及路由配置信息。
所述组网控制模块成功连接云服务器的同时,通过所述组网控制模块向所述云服务器发送心跳消息,所述心跳消息用于保活所述组网控制模块与所述云服务器之间的连接。
通过所述组网控制模块向多个候选云服务器发送心跳消息,接收所述多个候选云服务器发送的响应消息;根据所述多个候选云服务器的响应消息的时延,确定所述多个候选云服务器的优先级顺序;根据所述多个候选云服务器的优先级顺序和/或网络状态从所述多个候选云服务器中选择一个云服务器进行连接。
在一些实施方式中,可以对系统做出以下设定,所述策略如下:
为了达到系统高可用,云服务器在不同环境部署,例如部分直接部署在公司内网,本地连接也进行优化。首次连接时,所述系统会同时发送心跳给所有云服务器,本地记录缓存返回时延和信息,选择当前最优线路进行连接、广播消息等。如果网络状况发生变化,如当前服务器断开、WIFI内网切换到4G/5G,会查询缓存信息选择次优链路进行连接;如果所有服务器均无法连接,则通知系统下线。
步骤408:通过所述流量隧道模块将所述路由信息发送给系统网络层,系统网络层根据配置的系统路由器信息开始拦截流量包。其中,所述路由信息用于所述系统网络层拦截符合规则的报文。
步骤409:所述网络穿透系统启动完成。
图5是本申请实施例提供的网络穿透系统的报文发送方法的流程示意图二,如图5所示,所述网络穿透系统的报文发送方法包括以下步骤:
步骤501:应用层有网络发送请求时,会先按自己的业务需求组织报文,发送给目标地址。
步骤502:系统网络层接收应用层发送的报文;
步骤503:系统网络层会对接收的报文进行判断,检查报文中的目标地址是否在拦截的路由表中,如果不在,直接由系统网络层发送出去,流程结束;如果在,将拦截的报文发送给流量隧道模块并进入步骤504。
步骤504:流量隧道模块将拦截的报文发送给组网控制模块;
步骤505:组网控制模块对拦截的报文进行编码,并将编码后的报文发送给云服务器;
在一些实施方式中,所述组网控制模块按照特定的报文格式,对拦截的报文进行编码。具体的编码报文格式参照下表:
此报文格式设计,4-9段包含报文相关信息,对于大数据量的业务数据可以拆分发送,最后接收端进行合并处理。云服务器也可以做流量控制,分拆转发。
步骤506:编码后的报文,使用密钥加密,通过UDP会话发送给云服务器,云服务器解析后负责转发给对应IP的设备,设备端解析报文即可使用,流程结束。
图6是本申请实施例提供的网络穿透系统的报文接收方法的流程示意图二,如图6所示,所述网络穿透系统的报文发送方法包括以下步骤:
步骤601:系统网络层接收云服务器发送的报文。
步骤602:系统网络层对接受的报文进行处理。
步骤603:系统网络层判断接收到的报文的目的地址是否在拦截的路由表中。若不在,将所述报文发送给对应的应用层进行处理;若在,根据路由信息拦截符合规则的报文,将拦截的报文发送给组网控制模块。
步骤604:组网控制模块对拦截的报文进行解析,将解析得到的报文内容发送给流量隧道模块;
在一些实施方式中,通过所述组网控制模块按照特定的报文格式,对拦截的报文进行解析;其中,所述特定的报文格式包括以下一种或多种信息:报文标识、目标地址的哈希值、异常报文标志、报文数量、心跳包记录信息、协议版本号、报文类型、本地网络标志、本地网络分配的IP地址、报文内容。
步骤605:流量隧道模块将解析后的报文发送给对应的应用层处理,流程结束。
图7是本申请实施例提供的网络穿透系统的结构组成示意图,如图7所示,所述网络穿透系统包括:应用控制模块701、流量隧道模块702和组网控制模块703;三个模块相互协作,共同完成网络穿透系统,并且整个系统是独立运行在操作系统的进程,其 中,
所述应用控制模块701主要负责接收应用层指令,并控制开启/关闭流量隧道,监控流量隧道状态,发送接收流量隧道与业务层的数据。
所述流量隧道模块702主要负责建立系统层面的进程,UDP转发通道,设置拦截的路由信息以及规则,拦截设备发送与接收特定路由的数据交给组网控制去处理。
所述组网控制模块703配置为连接云服务器,缓存与动态切换连接节点,配置分配的IP、公钥、设备唯一标志等信息,按规则组装和解析流量隧道发送来的数据。
图8是本申请实施例提供的一种通信设备示意性结构图一,如图8所示,所述通信设备具有系统网络层和网络穿透系统,所述网络穿透系统包括应用控制模块、流量隧道模块和组网控制模块;其中,三个模块相互协作,共同完成网络穿透系统,并且整个系统是独立运行在操作系统的进程。
所述应用控制模块主要负责接收应用层指令,并控制开启/关闭流量隧道,监控流量隧道状态,发送接收流量隧道与业务层的数据。
所述流量隧道模块主要负责建立系统层面的进程,UDP转发通道,设置拦截的路由信息以及规则,拦截设备发送与接收特定路由的数据交给组网控制去处理。
所述组网控制模块配置为连接云服务器,缓存与动态切换连接节点,配置分配的IP、公钥、设备唯一标志等信息,按规则组装和解析流量隧道发送来的数据。
需要说明的是,在具体实施例中,所述网络穿透系统的启动方法包括:所述应用控制模块配置为启动所述流量隧道模块;所述流量隧道模块配置为启动所述组网控制模块;所述组网控制模块配置为连接云服务器,并接收所述云服务器发送的分配信息,基于所述分配信息配置路由信息,将所述路由信息发送给所述流量隧道模块;所述流量隧道模块还配置为将所述路由信息发送给系统网络层,完成所述网络穿透系统的启动,其中,所述路由信息用于所述系统网络层拦截符合规则的报文。
需要说明的是,在具体实施例中,所述网络穿透系统的报文发送方法包括:所述系统网络层接收应用层发送的报文,根据路由信息拦截符合规则的报文,将拦截的报文发送给流量隧道模块;所述流量隧道模块将拦截的报文发送给组网控制模块;所述组网控制模块对拦截的报文进行编码,并将编码后的报文发送给云服务器,所述云服务器用于将编码后的报文转发给报文接收端。
需要说明的是,在具体实施例中,所述网络穿透系统的报文接收方法包括:所述系统网络层接收云服务器发送的报文,根据路由信息拦截符合规则的报文,将拦截的报文发送给组网控制模块;所述组网控制模块对拦截的报文进行解析,将解析得到的报文内容发送给流量隧道模块;所述流量隧道模块对所述报文内容进行解析,将解析得到的应用数据发送给应用控制模块;所述应用控制模块将所述应用数据发送给应用层进行处理。
需要说明的是,在具体实施例中,系统网络层根据所述路由信息拦截数据包,并将该数据包发送给流量隧道模块,流量隧道模块将拦截的流量包发送给组网控制模块,组网控制模块模块按照特定的报文格式,对拦截的报文进行编码;其中,所述特定的报文格式包括以下一种或多种信息:报文标识、目标地址的哈希值、异常报文标志、报文数量、心跳包记录信息、协议版本号、报文类型、本地网络标志、本地网络分配的IP地址、报文内容。组网控制模块将编码后的报文发送给云服务器,所述云服务器用于将编码后的报文转发给报文接收端。
举个例子:当应用层有网络发送请求时,会先按自己的业务需求组织报文,发送给目标地址。系统网络层收到发送请求后检查目标地址是否在拦截的路由表中。如果不在,直接由系统网络层发送出去,流程结束。如果在,流量隧道模块会先将要发送出去的报 文拦截下来,然后整体交付给组网控制模块去进行编码。编码过后的报文,使用公共密钥加密,通过UDP会话发送给云服务器,云服务器解析后负责转发给对应IP的设备,设备端解析报文即可使用,流程结束。
举个例子:接收到网络报文,先交由系统网络层处理。系统网络层根据配置的路由信息,看目标IP是否是需要拦截,不需要则交由对应的应用去处理,如即时通信消息、微博消息由各自应用自行处理。如果是,组网控制模块获得拦截的报文,对报文按照格式进行解析,格式和发送报文格式相同。然后将解析出来的真实报文交由流量隧道模块,流量隧道模块收到组网控制模块发来的解析报文,然后解析成应用控制模块需要的业务信息,交付给应用层。应用层处理业务信息,达成远程操控、投屏等功能,流程结束
图9是本申请实施例提供的一种通信设备结构示意图二,如图9示的通信设备900包括处理器901,处理器901可以从存储器中调用并运行计算机程序,以实现本申请实施例中的方法。
可选地,如图9所示,通信设备900还可以包括存储器902。其中,处理器901可以从存储器902中调用并运行计算机程序,以实现本申请实施例中的方法。
其中,存储器902可以是独立于处理器901的一个单独的器件,也可以集成在处理器901中。
可选地,如图9所示,通信设备900还可以包括收发器903,处理器901可以控制该收发器903与其他设备进行通信,具体地,可以向其他设备发送信息或数据,或接收其他设备发送的信息或数据。
其中,收发器903可以包括发射机和接收机。收发器1330还可以进一步包括天线,天线的数量可以为一个或多个。
该通信设备900具体可为本申请实施例的网络穿透系统,并且该通信设备900可以实现本申请实施例的各个方法中由网络穿透系统实现的相应流程,为了简洁,在此不再赘述。
图10是本申请实施例的芯片的示意性结构图。图10所示的芯片1000包括处理器1001,处理器1001可以从存储器中调用并运行计算机程序,以实现本申请实施例中的方法。
可选地,如图10所示,芯片1000还可以包括存储器1002。其中,处理器1001可以从存储器1002中调用并运行计算机程序,以实现本申请实施例中的方法。
其中,存储器1002可以是独立于处理器1001的一个单独的器件,也可以集成在处理器1001中。
可选地,该芯片1000还可以包括输入接口1003。其中,处理器1001可以控制该输入接口1003与其他设备或芯片进行通信,具体地,可以获取其他设备或芯片发送的信息或数据。
可选地,该芯片1000还可以包括输出接口1004。其中,处理器1001可以控制该输出接口1004与其他设备或芯片进行通信,具体地,可以向其他设备或芯片输出信息或数据。
该芯片可应用于本申请实施例中的网络穿透系统,并且该芯片可以实现本申请实施例的各个方法中由网络穿透系统实现的相应流程,为了简洁,在此不再赘述。
应理解,本申请实施例提到的芯片还可以称为系统级芯片,系统芯片,芯片系统或片上系统芯片等。
应理解,本申请实施例的处理器可能是一种集成电路芯片,具有信号的处理能力。在实现过程中,上述方法实施例的各步骤可以通过处理器中的硬件的集成逻辑电路或者软件形式的指令完成。上述的处理器可以是通用处理器、数字信号处理器(Digital Signal  Processor,DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)、现成可编程门阵列(Field Programmable Gate Array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件。可以实现或者执行本申请实施例中的公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。结合本申请实施例所公开的方法的步骤可以直接体现为硬件译码处理器执行完成,或者用译码处理器中的硬件及软件模块组合执行完成。软件模块可以位于随机存储器,闪存、只读存储器,可编程只读存储器或者电可擦写可编程存储器、寄存器等本领域成熟的存储介质中。该存储介质位于存储器,处理器读取存储器中的信息,结合其硬件完成上述方法的步骤。
可以理解,本申请实施例中的存储器可以是易失性存储器或非易失性存储器,或可包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(Read-Only Memory,ROM)、可编程只读存储器(Programmable ROM,PROM)、可擦除可编程只读存储器(Erasable PROM,EPROM)、电可擦除可编程只读存储器(Electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(Random Access Memory,RAM),其用作外部高速缓存。通过示例性但不是限制性说明,许多形式的RAM可用,例如静态随机存取存储器(Static RAM,SRAM)、动态随机存取存储器(Dynamic RAM,DRAM)、同步动态随机存取存储器(Synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(Double Data Rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(Enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(Synchlink DRAM,SLDRAM)和直接内存总线随机存取存储器(Direct Rambus RAM,DR RAM)。应注意,本文描述的系统和方法的存储器旨在包括但不限于这些和任意其它适合类型的存储器。
应理解,上述存储器为示例性但不是限制性说明,例如,本申请实施例中的存储器还可以是静态随机存取存储器(static RAM,SRAM)、动态随机存取存储器(dynamic RAM,DRAM)、同步动态随机存取存储器(synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(double data rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(synch link DRAM,SLDRAM)以及直接内存总线随机存取存储器(Direct Rambus RAM,DR RAM)等等。也就是说,本申请实施例中的存储器旨在包括但不限于这些和任意其它适合类型的存储器。
本申请实施例还提供了一种计算机可读存储介质,用于存储计算机程序。该计算机可读存储介质可应用于本申请实施例中的网络穿透系统的启动方法或者报文收发方法或者装置,并且该计算机程序使得计算机执行本申请实施例的各个方法中由网络穿透系统实现的相应流程,为了简洁,在此不再赘述。
本领域技术人员应当理解,图7所示的网络穿透系统中的各模块的实现功能可参照前述系统的启动方法及报文收发方法的相关描述而理解。图7所示的网络穿透系统中的各模块的功能可通过运行于处理器上的程序而实现,也可通过具体的逻辑电路而实现。
本发明实施例所记载的技术方案之间,在不冲突的情况下,可以任意组合。
在本发明所提供的几个实施例中,应该理解到,所揭露的方法和智能设备,可以通过其它的方式实现。以上所描述的设备实施例仅仅是示意性的,例如,所述模块的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,如:多个模块或组件可以结合,或可以集成到另一个系统,或一些特征可以忽略,或不执行。另外,所显示或讨论的各组成部分相互之间的耦合、或直接耦合、或通信连接可以是通过一些接口,设备或模块的间接耦合或通信连接,可以是电性的、机械的或其它形式的。
上述作为分离部件说明的模块可以是、或也可以不是物理上分开的,作为模块显示的部件可以是、或也可以不是物理模块,即可以位于一个地方,也可以分布到多个网络模块上;可以根据实际的需要选择其中的部分或全部模块来实现本实施例方案的目的。
另外,在本发明各实施例中的各功能模块可以全部集成在一个第二处理模块中,也可以是各模块分别单独作为一个模块,也可以两个或两个以上模块集成在一个模块中;上述集成的模块既可以采用硬件的形式实现,也可以采用硬件加软件功能模块的形式实现。
以上所述,仅为本发明的具体实施方式,但本发明的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本发明揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本发明的保护范围之内。

Claims (24)

  1. 一种网络穿透系统的启动方法,所述网络穿透系统包括应用控制模块、流量隧道模块和组网控制模块;所述方法包括:
    通过所述应用控制模块启动所述流量隧道模块;
    所述流量隧道模块启动成功后,通过所述流量隧道模块启动所述组网控制模块;
    所述组网控制模块启动成功后,通过所述组网控制模块连接云服务器,并接收所述云服务器发送的分配信息,基于所述分配信息配置路由信息,将所述路由信息发送给所述流量隧道模块;
    通过所述流量隧道模块将所述路由信息发送给系统网络层,完成所述网络穿透系统的启动,其中,所述路由信息用于所述系统网络层拦截符合规则的报文。
  2. 根据权利要求1所述的方法,其中,所述通过所述应用控制模块启动所述流量隧道模块,包括:
    获得应用层的调用指令;
    响应所述调用指令,调用所述应用控制模块的管理类来启动所述流量隧道模块。
  3. 根据权利要求1所述的方法,其中,所述通过所述流量隧道模块启动所述组网控制模块之前,所述方法还包括:
    输出第一提示信息,所述第一提示信息用于提示用户是否同意启动所述网络穿透系统;
    若获得针对所述第一提示信息的第一操作,则执行所述流量隧道模块启动所述组网控制模块的步骤,所述第一操作为同意启动所述网络穿透系统的操作;
    若获得针对所述第一提示信息的第二操作,则判定启动所述网络穿透系统失败,所述第二操作为不同意启动所述网络穿透系统的操作。
  4. 根据权利要求1所述的方法,其中,所述方法还包括:
    所述流量隧道模块启动成功后,所述流量隧道模块启动拦截功能和用户数据报协议UDP功能;其中,所述拦截功能用于转发拦截的报文,所述UDP功能用于提供UDP会话。
  5. 根据权利要求1所述的方法,其中,所述接收所述云服务器发送的分配信息之前,所述方法还包括:
    判断所述组网控制模块与云服务器是否连接成功;
    若连接成功,则执行所述接收所述云服务器发送的分配信息的步骤;
    若连接失败,则判定启动所述网络穿透系统失败。
  6. 根据权利要求5所述的方法,其中,所述方法还包括:
    若连接成功,则通过所述组网控制模块向所述云服务器发送心跳消息,所述心跳消息用于保活所述组网控制模块与所述云服务器之间的连接。
  7. 根据权利要求6所述的方法,其中,所述通过所述组网控制模块向所述云服务器发送心跳消息,包括:
    在计时器达到预设时间时,通过所述组网控制模块向所述云服务器发送心跳消息;
    其中,所述计时器被重置的条件包括以下至少之一:
    第一条件,所述第一条件为所述组网控制模块向所述云服务器发送报文或者接收所述服务器发送的报文;
    第二条件,所述第二条件为所述计时器达到预设时间。
  8. 根据权利要求6所述的方法,其中,所述方法还包括:
    若所述组网控制模块连续发送N个心跳消息均未收到响应消息,则输出第二提示信息并关闭所述网络穿透系统,所述第二提示信息用于提示所述网络穿透系统处于离线状态,N为大于等于2的整数;否则,维持所述网络穿透系统处于在线状态。
  9. 根据权利要求6所述的方法,其中,所述通过所述组网控制模块连接云服务器,包括:
    通过所述组网控制模块向多个候选云服务器发送心跳消息,接收所述多个候选云服务器发送的响应消息;
    根据所述多个候选云服务器的响应消息的时延,确定所述多个候选云服务器的优先级顺序;
    根据所述多个候选云服务器的优先级顺序和/或网络状态从所述多个候选云服务器中选择一个云服务器进行连接。
  10. 根据权利要求1至9中任一项所述的方法,其中,所述分配信息包括:目标设备的IP地址和目标设备使用的密钥信息,所述目标设备指所述网络穿透系统所在的设备。
  11. 一种基于网络穿透系统的报文发送方法,所述方法包括:
    通过系统网络层接收应用层发送的报文,根据路由信息拦截符合规则的报文,将拦截的报文发送给流量隧道模块;
    通过所述流量隧道模块将拦截的报文发送给组网控制模块;
    通过所述组网控制模块对拦截的报文进行编码,并将编码后的报文发送给云服务器,所述云服务器用于将编码后的报文转发给报文接收端。
  12. 根据权利要求11所述的方法,其中,所述路由信息包括拦截的路由表;所述根据路由信息拦截符合规则的报文,将拦截的报文发送给流量隧道模块,包括:
    判断报文的目的地址是否在拦截的路由表中;
    若在,则拦截所述报文;
    若不在,则通过所述系统网络层发送所述报文。
  13. 根据权利要求11所述的方法,其中,所述通过所述组网控制模块对拦截的报文进行编码,包括:
    通过所述组网控制模块按照特定的报文格式,对拦截的报文进行编码;其中,所述特定的报文格式包括以下一种或多种信息:报文标识、目标地址的哈希值、异常报文标志、报文数量、心跳包记录信息、协议版本号、报文类型、本地网络标志、本地网络分配的IP地址、报文内容。
  14. 根据权利要求11所述的方法,其中,
    所述通过所述组网控制模块对拦截的报文进行编码之后,所述方法还包括:通过所述组网控制模块使用密钥信息对编码后的报文进行加密;
    所述将编码后的报文发送给云服务器,包括:通过UDP会话将编码及加密后后的报文发送给云服务器。
  15. 一种基于网络穿透系统的报文接收方法,所述方法包括:
    通过系统网络层接收云服务器发送的报文,根据路由信息拦截符合规则的报文,将拦截的报文发送给组网控制模块;
    通过所述组网控制模块对拦截的报文进行解析,将解析得到的报文内容发送给流量隧道模块;
    通过所述流量隧道模块对所述报文内容进行解析,将解析得到的应用数据发送给应用控制模块;
    通过所述应用控制模块将所述应用数据发送给应用层进行处理。
  16. 根据权利要求15所述的方法,其中,所述路由信息包括拦截的路由表;所述根据路由信息拦截符合规则的报文,将拦截的报文发送给组网控制模块,包括:
    判断报文的目的地址是否在拦截的路由表中;
    若在,则拦截所述报文;
    若不在,则将所述报文发送给对应的应用进行处理。
  17. 根据权利要求15所述的方法,其中,所述通过所述组网控制模块对拦截的报文进行解析,包括:
    通过所述组网控制模块按照特定的报文格式,对拦截的报文进行解析;其中,所述特定的报文格式包括以下一种或多种信息:报文标识、目标地址的哈希值、异常报文标志、报文数量、心跳包记录信息、协议版本号、报文类型、本地网络标志、本地网络分配的IP地址、报文内容。
  18. 根据权利要求15所述的方法,其中,
    所述通过所述组网控制模块对拦截的报文进行解析之前,所述方法还包括:通过所述组网控制模块使用密钥信息对拦截的报文进行解密;
    所述通过所述组网控制模块对拦截的报文进行解析,包括:通过所述组网控制模块解密后的报文进行解析。
  19. 一种网络穿透系统,所述网络穿透系统包括应用控制模块、流量隧道模块和组网控制模块;其中,
    所述应用控制模块,配置为启动所述流量隧道模块;
    所述流量隧道模块,配置为启动所述组网控制模块;
    所述组网控制模块,配置为连接云服务器,并接收所述云服务器发送的分配信息,基于所述分配信息配置路由信息,将所述路由信息发送给所述流量隧道模块;
    所述流量隧道模块,还配置为将所述路由信息发送给系统网络层,完成所述网络穿透系统的启动,其中,所述路由信息用于所述系统网络层拦截符合规则的报文。
  20. 一种通信设备,所述通信设备具有系统网络层和网络穿透系统,所述网络穿透系统包括应用控制模块、流量隧道模块和组网控制模块;其中,
    所述系统网络层,配置为接收应用层发送的报文,根据路由信息拦截符合规则的报文,将拦截的报文发送给流量隧道模块;
    所述流量隧道模块,配置为将拦截的报文发送给组网控制模块;
    所述组网控制模块,配置为对拦截的报文进行编码,并将编码后的报文发送给云服务器,所述云服务器用于将编码后的报文转发给报文接收端。
  21. 一种通信设备,所述通信设备具有系统网络层和网络穿透系统,所述网络穿透系统包括应用控制模块、流量隧道模块和组网控制模块;其中,
    所述系统网络层,配置为接收云服务器发送的报文,根据路由信息拦截符合规则的报文,将拦截的报文发送给组网控制模块;
    所述组网控制模块,配置为对拦截的报文进行解析,将解析得到的报文内容发送给流量隧道模块;
    所述流量隧道模块,配置为对所述报文内容进行解析,将解析得到的应用数据发送给应用控制模块;
    所述应用控制模块,配置为将所述应用数据发送给应用层进行处理。
  22. 一种通信设备,包括:处理器和存储器,该存储器用于存储计算机程序,所述处理器用于调用并运行所述存储器中存储的计算机程序,执行如权利要求1至10中任一项所述的方法,或者权利要求11至14中任一项所述的方法,或者权利要求15至18中任一项所述的方法。
  23. 一种芯片,包括:处理器,用于从存储器中调用并运行计算机程序,使得安装有所述芯片的设备执行如权利要求1至10中任一项所述的方法,或者权利要求11至14中任一项所述的方法,或者权利要求15至18中任一项所述的方法。
  24. 一种计算机可读存储介质,用于存储计算机程序,所述计算机程序使得计算机执行如权利要求1至10中任一项所述的方法,或者权利要求11至14中任一项所述的方法,或者权利要求15至18中任一项所述的方法。
PCT/CN2023/099827 2022-06-27 2023-06-13 一种网络穿透系统的启动方法及报文收发方法、通信设备 WO2024001753A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202210743954.6 2022-06-27
CN202210743954.6A CN117354276A (zh) 2022-06-27 2022-06-27 一种网络穿透系统的启动方法及报文收发方法、通信设备

Publications (1)

Publication Number Publication Date
WO2024001753A1 true WO2024001753A1 (zh) 2024-01-04

Family

ID=89360007

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/099827 WO2024001753A1 (zh) 2022-06-27 2023-06-13 一种网络穿透系统的启动方法及报文收发方法、通信设备

Country Status (2)

Country Link
CN (1) CN117354276A (zh)
WO (1) WO2024001753A1 (zh)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016164612A1 (en) * 2015-04-07 2016-10-13 Umbra Technologies Ltd. Systems and methods for providing a global virtual network (gvn)
CN107026784A (zh) * 2017-06-13 2017-08-08 电子科技大学 一种远程虚拟专网网关装置及实现方法
CN107690793A (zh) * 2015-05-11 2018-02-13 思杰系统有限公司 用于移动平台的微vpn隧穿
WO2020033493A1 (en) * 2018-08-07 2020-02-13 Dh2I Company Application transmission control protocol tunneling over the public internet

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016164612A1 (en) * 2015-04-07 2016-10-13 Umbra Technologies Ltd. Systems and methods for providing a global virtual network (gvn)
CN107690793A (zh) * 2015-05-11 2018-02-13 思杰系统有限公司 用于移动平台的微vpn隧穿
CN107026784A (zh) * 2017-06-13 2017-08-08 电子科技大学 一种远程虚拟专网网关装置及实现方法
WO2020033493A1 (en) * 2018-08-07 2020-02-13 Dh2I Company Application transmission control protocol tunneling over the public internet

Also Published As

Publication number Publication date
CN117354276A (zh) 2024-01-05

Similar Documents

Publication Publication Date Title
US11917498B2 (en) Communication method and communications apparatus
EP2533465B1 (en) Method and terminal for access control of network service
WO2021227650A1 (zh) Ue执行的方法及ue、以及smf实体执行的方法及smf实体
US20190089760A1 (en) Systems and methods for real-time content creation and sharing in a decentralized network
US20210185039A1 (en) Information synchronization method, authentication method, and apparatus
US20060117174A1 (en) Method of auto-configuration and auto-prioritizing for wireless security domain
US20230308951A1 (en) Data processing method, network element device, and readable storage medium
JP2004534424A (ja) ビデオ信号および音声信号をコード変換する方法およびシステム
US20220014574A1 (en) Data distribution method and network device
US11432140B2 (en) Multicast service processing method and access point
WO2021073155A1 (zh) 视频会议方法、装置、设备及存储介质
CN109818901B (zh) 报文头压缩机制确定方法、设备及系统
WO2024001753A1 (zh) 一种网络穿透系统的启动方法及报文收发方法、通信设备
US20230099930A1 (en) Communications method and communications apparatus
US11044214B2 (en) Multimedia file adaption across different communication platforms
WO2020042026A1 (zh) 无线通信的方法和设备
US11671487B1 (en) Port prediction for peer-to-peer communications
US11652853B2 (en) Integrated core network of 5G and ATSC 3.0, control plane entity and method for transmitting multimedia content in control plane entity
US10334086B2 (en) Header redundancy removal for tunneled media traffic
CN110620999B (zh) 用户面数据处理方法及装置
KR102648720B1 (ko) 동적 터널링 기반 트래픽 전송 시스템, 그리고 이의 시그널링 방법
WO2019141088A1 (zh) 一种传输信息的方法和装置
EP3454583B1 (en) Network connection method, and secure node determination method and device
WO2024108900A1 (zh) 一种电子签名验证方法及装置
JP2022511577A (ja) 無線通信及び機器

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23829936

Country of ref document: EP

Kind code of ref document: A1