CN118214803A - RTP interception detection and bypass method, equipment and medium based on PBX - Google Patents
RTP interception detection and bypass method, equipment and medium based on PBX Download PDFInfo
- Publication number
- CN118214803A CN118214803A CN202410626952.8A CN202410626952A CN118214803A CN 118214803 A CN118214803 A CN 118214803A CN 202410626952 A CN202410626952 A CN 202410626952A CN 118214803 A CN118214803 A CN 118214803A
- Authority
- CN
- China
- Prior art keywords
- pbx
- rtp
- interception
- packet
- invite request
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 27
- 238000001514 detection method Methods 0.000 title claims abstract description 24
- 230000003993 interaction Effects 0.000 claims description 27
- 238000004590 computer program Methods 0.000 claims description 19
- 210000001503 joint Anatomy 0.000 claims description 2
- 101000610107 Homo sapiens Pre-B-cell leukemia transcription factor 1 Proteins 0.000 abstract description 39
- 102100040171 Pre-B-cell leukemia transcription factor 1 Human genes 0.000 abstract description 39
- 101000610110 Homo sapiens Pre-B-cell leukemia transcription factor 2 Proteins 0.000 abstract description 34
- 102100040168 Pre-B-cell leukemia transcription factor 2 Human genes 0.000 abstract description 34
- 230000005540 biological transmission Effects 0.000 abstract description 5
- 101100189471 Mus musculus Pbx1 gene Proteins 0.000 description 3
- 230000000903 blocking effect Effects 0.000 description 3
- 230000006870 function Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 239000000470 constituent Substances 0.000 description 1
- 239000000284 extract Substances 0.000 description 1
- 238000001914 filtration Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000005457 optimization Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M7/00—Arrangements for interconnection between switching centres
- H04M7/006—Networks other than PSTN/ISDN providing telephone service, e.g. Voice over Internet Protocol (VoIP), including next generation networks with a packet-switched transport layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/60—Network streaming of media packets
- H04L65/65—Network streaming protocols, e.g. real-time transport protocol [RTP] or real-time control protocol [RTCP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/22—Parsing or analysis of headers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/26—Special purpose or proprietary protocols or architectures
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Multimedia (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention relates to a RTP interception detection and bypass method, equipment and medium based on PBX, wherein the method comprises the following steps: the PBX1 and the PBX2 establish call completion, if the PBX2 does not receive the RTP packet from the PBX1, the PBX2 actively sends the Re-INVITE packet to the PBX1 and carries a header field in the packet to inform the opposite party that the opposite party is in an RTP interception environment; after receiving the Re-INVITE, the PBX1 detects the header field to know that RTP interception exists in the network environment, and adopts a corresponding way of bypassing the RTP interception based on the value of the header field. The invention solves the problems of RTP interception by hackers and RTP misinterception by routers, and ensures normal transmission of real-time audio and video communication.
Description
Technical Field
The invention relates to the field of network calls, in particular to an RTP interception detection and bypass method, equipment and medium based on a PBX.
Background
RTP (Real-time Transport Protocol) is a protocol for transmitting audio and video data over the internet, typically for Real-time audio-video communication applications such as VoIP (Voice over Internet Protocol) telephony, video conferencing, etc. RTP interception refers to the act of intercepting, limiting, or blocking RTP traffic in a network. RTP interception may be caused by a network administrator, network device, or network policy, the purpose of which may be due to network management, security control, resource optimization, or other considerations. RTP interception typically has the following application scenarios: 1. hackers monitor information based on RTP interception; 2. RTP misinterception by the router.
The existing RTP interception is mostly in the following form:
(1) Port blocking: and blocking the UDP port used by the RTP to prevent the transmission of RTP data packets.
(2) And (3) protocol identification: identifying the characteristic or sign of RTP protocol, and filtering the identified RTP flow.
(3) And (3) flow control: and limiting or controlling the flow of a specific port or protocol so as to prevent the RTP data packet from being normally transmitted.
(4) Firewall rules: rules are set in the network firewall to limit traffic transmissions for a particular IP address, port or protocol, including RTP packets.
Conventional PBX's fail to provide an effective solution when encountering RTP interception problems, resulting in blocked real-time audio-video communications.
Disclosure of Invention
In order to solve the above problems, the present invention proposes a method, apparatus and medium for detecting and bypassing RTP interception based on a PBX.
The specific scheme is as follows:
the RTP interception detection and bypass method based on the PBX sets that a telephone and a first PBX are both in an RTP interception environment, and a second PBX is not in the RTP interception environment, and when the telephone calls into the second PBX, the following steps are executed:
after the telephone is in butt joint with the first PBX, a call is established between the first PBX and the second PBX;
The second PBX judges whether an RTP packet from the first PBX is received within a rated time after the call is established successfully, if not, the first PBX is judged to be in an RTP interception environment, an RE-INVITE request is sent to the first PBX, and whether the RTP packet from the first PBX is received within the rated time after the call is established successfully is judged; if not, another RE-INVITE request is sent to the first PBX, and whether RTP packets from the first PBX are received in the rated time is judged; if not, the last RE-INVITE request is sent to the first PBX, and whether the RTP packet from the first PBX is received in the rated time is judged; if not, judging that negotiation fails and hanging up the call;
The RE-INVITE request is to add a header field for identifying that the PBX is in an interception environment to a conventional INVITE request, and the RE-INVITE request includes three types, and the three types of RE-INVITE requests correspond to the following three different interception environments through the difference of the values of the header fields:
(1) The first interception environment is: detecting whether the first packet is an RTP packet or not, if so, directly intercepting a port for RTP interaction;
(2) The second interception environment is: detecting whether each packet is an RTP packet or not, if so, directly intercepting a port for RTP interaction;
(3) The third interception environment is: directly intercepting a port for RTP interaction based on SIP packet negotiation;
When the first PBX receives the RE-INVITE request, judging which interception environment is in by analyzing the value of the corresponding header field, and taking the following measures according to the different interception environments:
(1) When in the first interception environment, first, transmitting an empty packet to the second PBX before transmitting the RTP packet to the second PBX;
(2) When the first interception environment is in the second interception environment, changing the values of the front two bits of the packet header of the RTP packet to be transmitted into a fixed value, and setting that the front two bits of the packet header of the RTP packet are not checked by the first PBX and the second PBX;
(3) When the third interception environment is in, changing the port for RTP interaction into a new port calculated based on the negotiated port for RTP interaction and a fixed algorithm, and transmitting RTP packets through the new port.
Further, the process of establishing a call between the first PBX and the second PBX includes the steps of:
s101: the first PBX sends an INVITE request to the second PBX;
S102: after receiving the INVITE request sent by the first PBX, the second PBX replies a 200OK message to the first PBX;
S103: after receiving the 200OK message replied by the second PBX, the first PBX sends an ACK message to the second PBX;
S104: and after the second PBX receives the ACK message sent by the first PBX, judging that the call establishment is successful.
Further, after receiving the RE-INVITE request, the first PBX replies the second PBX with a 200OK message, and then takes measures according to the interception environments corresponding to the RE-INVITE request.
Further, the port for RTP interaction of the negotiated second PBX is determined by SDP carried in the RE-INVITE request sent to the first PBX by the second PBX; the port of the negotiated first PBX for RTP interaction is determined by the SDP carried in the 200OK message sent by the first PBX to the second PBX.
Further, a fixed value to which the values of the first two bits of the header of the RTP packet to be transmitted are changed is binary 00.
Further, the fixed algorithm for calculating the new port is: negotiated port +1 for RTP interactions.
The RTP interception detection and bypassing terminal equipment based on the PBX comprises a processor, a memory and a computer program which is stored in the memory and can run on the processor, wherein the processor realizes the steps of the method according to the embodiment of the invention when executing the computer program.
A computer readable storage medium storing a computer program which, when executed by a processor, implements the steps of the method described above for embodiments of the present invention.
The invention adopts the technical scheme and has the beneficial effects that:
(1) Under the scene that a hacker monitors the RTP, the RTP interception can be effectively bypassed, and the normal transmission of real-time audio and video communication is ensured.
(2) The method solves the problem of RTP misinterception of the router, ensures normal transmission of real-time audio and video communication, improves service availability and reliability of the PBX system, ensures that communication service of enterprises or users is not affected by network limitation, and maintains continuous and stable communication connection.
Drawings
FIG. 1 is a flow chart of a method according to an embodiment of the invention.
Detailed Description
For further illustration of the various embodiments, the invention is provided with the accompanying drawings. The accompanying drawings, which are incorporated in and constitute a part of this disclosure, illustrate embodiments and together with the description, serve to explain the principles of the embodiments. With reference to these matters, one of ordinary skill in the art will understand other possible embodiments and advantages of the present invention.
The invention will now be further described with reference to the drawings and detailed description.
Embodiment one:
the precondition of this embodiment is the following three RTP interception environments:
(1) The first interception environment is: and detecting whether the first packet is an RTP packet, and if so, directly intercepting a port for RTP interaction.
(2) The second interception environment is: and detecting whether each packet is an RTP packet, if so, directly intercepting a port for RTP interaction.
(3) The third interception environment is: ports for RTP interactions based on SIP packet negotiations are directly intercepted.
For the three interception environments, the embodiment constructs the Re-INVITE request on the basis of the INVITE request for identifying the three interception environments. The Re-INVITE request is to add header fields RTP-Disguise for identifying that the PBX is in an interception environment to a conventional INVITE request, and three different identifications are set as values of header fields RTP-Disguise for three interception environments to correspond to three Re-INVITE requests. Specifically, the value of the header field in the Re-INVITE request corresponding to the first interception environment is set to SEND EMPTY PACKET (null packet is sent); setting a header field value in the Re-INVITE request corresponding to the second interception environment to HIDE HEADER (hide header); the value of the header field in the Re-INVITE request corresponding to the first interception environment is set to Hidden port (Hidden port). In other embodiments, the person skilled in the art can set the identification representing different interception environments according to the requirements, which is not limited herein.
Based on the above-mentioned settings, in this embodiment, a method for detecting and bypassing RTP interception based on a PBX is provided, as shown in fig. 1, a first PBX is named as a PBX1, and a second PBX is named as a PBX2, when both a telephone and the PBX1 are in an interception environment, and the PBX2 is not in an RTP interception environment, when the telephone needs to call into the PBX2, the following steps are executed:
S1: the telephone interfaces with PBX1 through the private network and sends an INVITE request to PBX2 through PBX1 to establish a connection.
S2: after receiving the INVITE request sent by the PBX1, the PBX2 replies a 200OK message to the PBX1 to establish a call.
S3: after receiving the 200OK message sent by the PBX2, the PBX1 sends an ACK message to the PBX 2.
S4: after receiving the ACK message sent by the PBX1, the PBX2 determines that the call is established successfully, determines whether an RTP packet from the PBX1 is received within a rated time after the call is established successfully, if not, determines that the PBX1 is in an RTP interception environment, and sends a first RE-INVITE request to the PBX1, wherein a value of a header field RTP-Disguise carried in the RE-INVITE request is SEND EMPTY PACKET.
S5: after receiving the RE-INVITE request sent by the PBX2, the PBX1 first replies a 200OK message to the PBX2, then parses the RE-INVITE request, extracts the value "SEND EMPTY PACKET" of the header field RTP-Disguise, and further knows that it is in the first interception environment, so that a corresponding measure is adopted, that is, before sending the RTP packet to the PBX2, firstly sends an empty packet to the PBX2 to bypass the first RTP interception environment.
The RE-INVITE request belongs to SIP, which carries the port of the PBX2 that SDP uses to negotiate the two-end RTP interactions. The 200OK message also belongs to SIP, which carries the port of PBX1 that SDP uses to negotiate both RTP interactions.
S6: the PBX2 judges whether an RTP packet from the PBX1 is received or not in the rated time after the first RE-INVITE request is sent, and if so, the RTP interaction is normal without the subsequent steps; if not, indicating that the PBX1 is not in the first interception environment, RE-sending a second RE-INVITE request to the PBX1, the RE-INVITE request carrying a header RTP-Disguise having a value of HIDE HEADER.
S7: after the PBX1 receives the RE-INVITE request sent by the PBX2 for the second time, which indicates that the previous measures cannot bypass RTP interception, firstly replying the PBX2 with a 200OK message, then resolving the RE-INVITE request, extracting the value "HIDE HEADER" of the header field RTP-Disguise, and further knowing that the RE-INVITE request is in the second interception environment, so that corresponding measures are adopted, namely changing the values of the two front bits of the header of the RTP packet to be sent into fixed values, and setting that neither the PBX1 nor the PBX2 verifies the two front bits of the header of the RTP packet.
According to the introduction of RFC3550 to the RTP protocol, the first two bits of the header of RTP default to 10, the decimal number 2, represent RFC1889 version. In the second RTP interception environment, the first two bits of the header of the RTP need to be checked. In this embodiment, the PBX1 and the PBX2 are set to not check the first two bits of the header of the RTP, and by changing the values of the first two bits of the header, the second RTP interception environment can be bypassed. The modified fixed value can be set by the person skilled in the art, and is set to 00 binary in this embodiment.
In a specific implementation process, after the PBX2 sends a second RE-INVITE request to the PBX1, setting that the PBX2 does not check the first two bits of the packet header of the RTP packet received later, and continuing until the PBX2 ends after sending another RE-INVITE request to the PBX 1; when the PBX1 receives the second RE-INVITE request, it is set that the PBX1 does not check the first two bits of the header of the RTP packet sent later, until the PBX1 receives another RE-INVITE request and ends.
S8: the PBX2 judges whether an RTP packet from the PBX1 is received or not in the rated time after the second RE-INVITE request is sent, and if so, the RTP interaction is normal without the subsequent steps; if not, indicating that the PBX1 is not in the second interception environment, RE-sending a third RE-INVITE request to the PBX1, wherein the value of the header field RTP-Disguise carried in the RE-INVITE request is Hidden port.
S9: after the PBX1 receives the RE-INVITE request sent by the PBX2 for the third time, which indicates that the previous measures cannot bypass RTP interception, firstly replying a 200OK message to the PBX2, then analyzing the RE-INVITE request, extracting the value "Hidden port" of the header field RTP-Disguise, and further knowing that the RE-INVITE request is in the third interception environment, so that the corresponding measures are adopted, namely, changing the port for RTP interaction into a new port calculated based on the negotiated port for RTP interaction (hereinafter referred to as negotiation port) and a fixed algorithm, and sending an RTP packet through the new port.
The fixed algorithm used to calculate the new port is set in this embodiment as: negotiated port +1 for RTP interactions. If the negotiation port of SDP negotiation in RE-INVITE of PBX2 is 10000, and the negotiation port of SDP negotiation in 200OK of PBX1 reply is 20000. Both parties default to send packets to the negotiation port-1 of the other party. I.e., PBX1 sends packets to the 9999 port of PBX2, and PBX2 sends packets to the 19999 port of PBX 1.
In a specific embodiment, after the PBX2 sends the third RE-INVITE request to the PBX1, the PBX2 is set to issue packets to the negotiation port-1 of the PBX1 until the PBX2 sends another RE-INVITE request to the PBX 1; when the PBX1 receives the third RE-INVITE request, the PBX1 is set to issue packets to the negotiation port-1 of the PBX2 until the PBX1 receives another RE-INVITE request.
S10: the PBX2 judges whether an RTP packet from the PBX1 is received or not in the rated time after the third RE-INVITE request is sent, and if so, the RTP interaction is normal and is ended; if not, judging that the negotiation fails and hanging up the call.
In the above embodiment, the first interception environment, the second interception environment, and the third interception environment are sequentially determined according to the sequence of the first interception environment, the second interception environment, and the third interception environment, and in other embodiments, the person skilled in the art may replace the sequence according to actual needs, which is not limited herein.
Embodiment two:
the invention also provides a PBX-based RTP interception detection and bypass terminal device, which comprises a memory, a processor and a computer program stored in the memory and capable of running on the processor, wherein the processor realizes the steps in the method embodiment of the first embodiment of the invention when executing the computer program.
Further, as an executable scheme, the PBX-based RTP interception detection and bypass terminal device may be a computing device such as a desktop computer, a notebook computer, a palm computer, and a cloud server. The PBX-based RTP intercept detection and bypass terminal devices may include, but are not limited to, processors, memory. It will be appreciated by those skilled in the art that the above-described constituent structure of the PBX-based RTP interception detection and bypass terminal device is merely an example of the PBX-based RTP interception detection and bypass terminal device, and does not constitute a limitation on the PBX-based RTP interception detection and bypass terminal device, and may include more or fewer components than those described above, or may combine some components, or different components, for example, the PBX-based RTP interception detection and bypass terminal device may further include an input/output device, a network access device, a bus, and the like, which is not limited by the embodiment of the present invention.
Further, as an executable scheme, the Processor may be a central processing unit (Central Processing Unit, CPU), other general purpose Processor, digital signal Processor (DIGITAL SIGNAL Processor, DSP), application SPECIFIC INTEGRATED Circuit (ASIC), field-Programmable gate array (Field-Programmable GATE ARRAY, FPGA), or other Programmable logic device. The general purpose processor may be a microprocessor or the processor may be any conventional processor or the like, which is a control center of the PBX-based RTP intercept detection and bypass terminal equipment, and connects the entire PBX-based RTP intercept detection and bypass terminal equipment with various interfaces and lines.
The memory may be used to store the computer program and/or module, and the processor may implement the various functions of the PBX-based RTP intercept detection and bypass terminal device by running or executing the computer program and/or module stored in the memory and invoking data stored in the memory. The memory may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, at least one application program required for a function; the storage data area may store data created according to the use of the cellular phone, etc. In addition, the memory may include high-speed random access memory, and may also include non-volatile memory, such as a hard disk, memory, plug-in hard disk, smart memory card (SMART MEDIA CARD, SMC), secure Digital (SD) card, flash memory card (FLASH CARD), at least one disk storage device, flash memory device, or other volatile solid-state storage device.
The present invention also provides a computer readable storage medium storing a computer program which when executed by a processor implements the steps of the above-described method of an embodiment of the present invention.
The module/unit of the PBX-based RTP interception detection integrated with the bypass terminal device may be stored in a computer readable storage medium if implemented in the form of a software functional unit and sold or used as a separate product. Based on such understanding, the present invention may implement all or part of the flow of the method of the above embodiment, or may be implemented by a computer program to instruct related hardware, where the computer program may be stored in a computer readable storage medium, and when the computer program is executed by a processor, the computer program may implement the steps of each of the method embodiments described above. Wherein the computer program comprises computer program code which may be in source code form, object code form, executable file or some intermediate form etc. The computer readable medium may include: any entity or device capable of carrying the computer program code, a recording medium, a U disk, a removable hard disk, a magnetic disk, an optical disk, a computer Memory, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a software distribution medium, and so forth.
While the invention has been particularly shown and described with reference to a preferred embodiment, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the invention as defined by the appended claims.
Claims (8)
1. The RTP interception detection and bypassing method based on the PBX is characterized in that: setting the telephone and the first PBX to be in an RTP interception environment, wherein the second PBX is not in the RTP interception environment, and executing the following steps when the telephone calls into the second PBX:
after the telephone is in butt joint with the first PBX, a call is established between the first PBX and the second PBX;
The second PBX judges whether an RTP packet from the first PBX is received within a rated time after the call is established successfully, if not, the first PBX is judged to be in an RTP interception environment, an RE-INVITE request is sent to the first PBX, and whether the RTP packet from the first PBX is received within the rated time after the call is established successfully is judged; if not, another RE-INVITE request is sent to the first PBX, and whether RTP packets from the first PBX are received in the rated time is judged; if not, the last RE-INVITE request is sent to the first PBX, and whether the RTP packet from the first PBX is received in the rated time is judged; if not, judging that negotiation fails and hanging up the call;
The RE-INVITE request is to add a header field for identifying that the PBX is in an interception environment to a conventional INVITE request, and the RE-INVITE request includes three types, and the three types of RE-INVITE requests correspond to the following three different interception environments through the difference of the values of the header fields:
(1) The first interception environment is: detecting whether the first packet is an RTP packet or not, if so, directly intercepting a port for RTP interaction;
(2) The second interception environment is: detecting whether each packet is an RTP packet or not, if so, directly intercepting a port for RTP interaction;
(3) The third interception environment is: directly intercepting a port for RTP interaction based on SIP packet negotiation;
When the first PBX receives the RE-INVITE request, judging which interception environment is in by analyzing the value of the corresponding header field, and taking the following measures according to the different interception environments:
(1) When in the first interception environment, first, transmitting an empty packet to the second PBX before transmitting the RTP packet to the second PBX;
(2) When the first interception environment is in the second interception environment, changing the values of the front two bits of the packet header of the RTP packet to be transmitted into a fixed value, and setting that the front two bits of the packet header of the RTP packet are not checked by the first PBX and the second PBX;
(3) When the third interception environment is in, changing the port for RTP interaction into a new port calculated based on the negotiated port for RTP interaction and a fixed algorithm, and transmitting RTP packets through the new port.
2. The PBX-based RTP intercept detection and bypass method according to claim 1 wherein: the process of establishing a call between a first PBX and a second PBX comprises the following steps:
s101: the first PBX sends an INVITE request to the second PBX;
S102: after receiving the INVITE request sent by the first PBX, the second PBX replies a 200OK message to the first PBX;
S103: after receiving the 200OK message replied by the second PBX, the first PBX sends an ACK message to the second PBX;
S104: and after the second PBX receives the ACK message sent by the first PBX, judging that the call establishment is successful.
3. The PBX-based RTP intercept detection and bypass method according to claim 1 wherein: after receiving the RE-INVITE request, the first PBX replies a 200OK message to the second PBX, and then takes measures according to the different interception environments corresponding to the RE-INVITE request.
4. A PBX-based RTP intercept detection and bypass method according to claim 3 wherein: the port for RTP interaction of the negotiated second PBX is determined by SDP carried in RE-INVITE request sent by the second PBX to the first PBX; the port of the negotiated first PBX for RTP interaction is determined by the SDP carried in the 200OK message sent by the first PBX to the second PBX.
5. The PBX-based RTP intercept detection and bypass method according to claim 1 wherein: the fixed value to which the values of the first two bits of the header of the RTP packet to be transmitted are changed is binary 00.
6. The PBX-based RTP intercept detection and bypass method according to claim 1 wherein: the fixed algorithm for calculating the new port is: negotiated port +1 for RTP interactions.
7. The RTP interception detection and bypassing terminal equipment based on the PBX is characterized in that: comprising a processor, a memory and a computer program stored in the memory and running on the processor, the processor implementing the steps of the method according to any one of claims 1 to 6 when the computer program is executed.
8. A computer-readable storage medium storing a computer program, characterized in that: the computer program when executed by a processor performs the steps of the method according to any one of claims 1 to 6.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202410626952.8A CN118214803B (en) | 2024-05-21 | 2024-05-21 | RTP interception detection and bypass method, equipment and medium based on PBX |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202410626952.8A CN118214803B (en) | 2024-05-21 | 2024-05-21 | RTP interception detection and bypass method, equipment and medium based on PBX |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN118214803A true CN118214803A (en) | 2024-06-18 |
| CN118214803B CN118214803B (en) | 2024-07-12 |
Family
ID=91447328
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202410626952.8A Active CN118214803B (en) | 2024-05-21 | 2024-05-21 | RTP interception detection and bypass method, equipment and medium based on PBX |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN118214803B (en) |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1874256A (en) * | 2005-06-03 | 2006-12-06 | 华为技术有限公司 | Method for implementing online maintenance in communication network |
| US20090041011A1 (en) * | 2007-04-03 | 2009-02-12 | Scott Sheppard | Lawful Interception of Broadband Data Traffic |
| KR102093912B1 (en) * | 2019-07-11 | 2020-03-26 | 한화시스템 주식회사 | Videoconference system and method thereof |
| CN111131182A (en) * | 2019-12-05 | 2020-05-08 | 厦门朗视信息科技有限公司 | VoIP communication network penetration device and method |
-
2024
- 2024-05-21 CN CN202410626952.8A patent/CN118214803B/en active Active
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1874256A (en) * | 2005-06-03 | 2006-12-06 | 华为技术有限公司 | Method for implementing online maintenance in communication network |
| US20090041011A1 (en) * | 2007-04-03 | 2009-02-12 | Scott Sheppard | Lawful Interception of Broadband Data Traffic |
| KR102093912B1 (en) * | 2019-07-11 | 2020-03-26 | 한화시스템 주식회사 | Videoconference system and method thereof |
| CN111131182A (en) * | 2019-12-05 | 2020-05-08 | 厦门朗视信息科技有限公司 | VoIP communication network penetration device and method |
Non-Patent Citations (1)
| Title |
|---|
| 陈晓琛, 成际镇, 王隽: "RTP/RTCP在IP-PBX系统中的应用", 《南京邮电大学学报(自然科学版)》, no. 2005, 28 February 2005 (2005-02-28), pages 85 - 89 * |
Also Published As
| Publication number | Publication date |
|---|---|
| CN118214803B (en) | 2024-07-12 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US10693919B2 (en) | Distributed connectivity policy enforcement with ICE | |
| CN1685634B (en) | Call service based on packet streaming | |
| US20090319674A1 (en) | Techniques to manage communications between relay servers | |
| US8082580B1 (en) | Session layer pinhole management within a network security device | |
| WO2002103982A2 (en) | Protecting a network from unauthorized access | |
| US11677792B2 (en) | IP tolerance and signaling interworking | |
| RU2608673C2 (en) | Handling session initiation protocol messages in wireless telecommunications device | |
| Natarajan et al. | SCTP: What, why, and how | |
| US20210120048A1 (en) | Voice over internet protocol (voip) call quality | |
| US8789141B2 (en) | Method and apparatus for providing security for an internet protocol service | |
| CN118214803B (en) | RTP interception detection and bypass method, equipment and medium based on PBX | |
| JP5926164B2 (en) | High-speed distribution method and connection system for session border controller | |
| US11218449B2 (en) | Communications methods, systems and apparatus for packet policing | |
| US8589570B2 (en) | Dynamic handler for SIP max-size error | |
| US10263913B2 (en) | Tunnel consolidation for real-time communications | |
| CN118368273A (en) | Network connection control method, equipment and storage medium of IPPBX | |
| US9467570B2 (en) | Call transfer with network spanning back-to-back user agents | |
| KR100957432B1 (en) | Media transfer method | |
| CN118827632A (en) | A four-layer traffic distribution method for ultra-large-scale SIP protocol | |
| CN116600286A (en) | Application data mapping method, device, equipment and readable storage medium | |
| CN116527324A (en) | A data processing method, device and storage medium | |
| CN118631789A (en) | A communication method, network, electronic device and storage medium | |
| CN117082123A (en) | Communication method, device, system, medium and equipment | |
| US20040205183A1 (en) | Method and system for avoiding tracking communication connection state until accepted | |
| Mena et al. | SCTP: Stream Control Transmission Protocol An Analysis |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant |