[go: up one dir, main page]

WO2017054456A1 - A method and device for network communications - Google Patents

A method and device for network communications Download PDF

Info

Publication number
WO2017054456A1
WO2017054456A1 PCT/CN2016/081483 CN2016081483W WO2017054456A1 WO 2017054456 A1 WO2017054456 A1 WO 2017054456A1 CN 2016081483 W CN2016081483 W CN 2016081483W WO 2017054456 A1 WO2017054456 A1 WO 2017054456A1
Authority
WO
WIPO (PCT)
Prior art keywords
communication party
operable object
communication
party
application
Prior art date
Application number
PCT/CN2016/081483
Other languages
French (fr)
Chinese (zh)
Inventor
张日和
吴开园
Original Assignee
深圳市先河系统技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳市先河系统技术有限公司 filed Critical 深圳市先河系统技术有限公司
Publication of WO2017054456A1 publication Critical patent/WO2017054456A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/40Support for services or applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • H04L67/1074Peer-to-peer [P2P] networks for supporting data block transmission mechanisms
    • H04L67/1078Resource delivery mechanisms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/563Data redirection of data network streams

Definitions

  • the present invention relates to communication technologies, and in particular, to a network communication method and device.
  • P2P Peer to Peer, Peer-to-Peer Networking technology leverages the power of each computer in the network to provide services to each other.
  • Each computer in a P2P network environment can act as both a requester for a network service and a request for other computers to provide resources and services.
  • the technical problem to be solved by the present invention is to provide a network communication method and device, which can solve the problem that the operation steps are cumbersome when exchanging resources between different server terminals in the prior art.
  • a network communication method including:
  • the first agent of the first communication party establishes a first and second P2P penetration connection with the second agent of the second communication party and the third agent of the third communication party, respectively;
  • the sending the first operable object of the second communication party to the third communication party includes:
  • the first window is a display interface of the first application of the first communication party
  • the second window is a display interface of the second application of the first communication party
  • the step of sending the acquiring manner of the first operable object to the third communicating party by using the second P2P penetration connection includes:
  • the third application of the communication party receives the acquisition manner of the first operable object and sends it to the fourth application of the third communication party;
  • the step of transmitting the first operable object of the second communication party to the third communication party through the third P2P penetration connection comprises:
  • the fourth application of the third communication party sends a request for acquiring the first operable object to the fifth application of the second communication party by using the third P2P penetration connection;
  • the fifth application of the second communication party receives the acquisition request sent by the fourth application of the third communication party, and connects the first operable object through the third P2P through the connection request a fourth application sent to the third communication party;
  • the fourth application of the third communication party receives and stores the first operable object.
  • the step of the fourth application of the third communication party sending a request for acquiring the first operable object to the fifth application of the second communication party by using the third P2P penetration connection includes:
  • the fifth application of the second communication party receives the acquisition request sent by the fourth application of the third communication party, and connects the first operable object through the third P2P through the connection request
  • the step of sending the fourth application to the third communication party includes:
  • the fifth application of the second communication party receives the third protocol-based acquisition request, and sends the first operable object based on the third protocol in response to the third protocol-based acquisition request;
  • the third agent of the third communication party receives the first operable object based on the second protocol
  • the fourth application of the third communication party receives the first operable object based on the first protocol.
  • the step of converting the first protocol-based acquisition request of the fourth application from the third communication party to the second protocol-based acquisition request includes:
  • the fourth application of the third communication party sends the first protocol-based acquisition request to the first loopback port of the third communication party;
  • the sixth application of the third communication party obtains the first protocol-based acquisition request from the first loopback port and converts to the second protocol-based acquisition request, and the second protocol-based acquisition request Obtaining a second proxy requesting to be sent to the second correspondent party;
  • the step of converting the first operable object based on the second protocol from the third agent of the third communicating party to the first operable object based on the first protocol comprises:
  • the third agent of the third communication party sends the first operable object based on the second protocol to the sixth application of the third communication party, and the sixth application applies the second protocol based Translating the first operable object into the second loopback port of the third communicator based on the first operable object of the first protocol;
  • the step of receiving, by the fourth application of the third communication party, the first operable object based on the first protocol comprises:
  • the fourth application of the third communication party receives the first operable object based on the first protocol from a second loopback port of the third communication party.
  • the second agent of the second communication party accesses the second communication party and the first loopback port and the second loopback port used by the third communication party when accessing the second communication party Binding, and the access mode of the second communication party that is bound to the first loopback port and the second loopback port by managing the second communication party and the third communication party
  • the server sends to the third agent of the third communicating party.
  • the first protocol is a TCP protocol
  • the second protocol is a UDP protocol
  • the third protocol is a TCP protocol.
  • the progress of receiving the first operable object is further fed back to the second application of the first communication party by using the third application.
  • the second window when detecting an instruction to copy or move the first operable object in the first window into the second window, the second window requests the first window to operate the first window The manner of acquiring the object, the method for triggering the first window to be sent in response to the request sent by the second window to read the first operable object, and sending the first operable object to the first Two windows.
  • Another technical solution adopted by the present invention is to provide a communication method, including:
  • the first agent of the first communication party establishes a first and second P2P penetration connection with the second agent of the second communication party and the third agent of the third communication party, respectively;
  • the first communication party When detecting an instruction to copy or move the first operable object in the first window into the second window, the first communication party will connect the first through a second P2P through connection The obtaining manner of the operable object is sent to the third communicating party, so that the third communicating party acquires the first operable object from the second communicating party according to the acquiring manner.
  • Another technical solution adopted by the present invention is to provide a communication method, including:
  • the second agent of the second communication party establishes a first P2P penetration connection with the first agent of the first communication party;
  • the first operable object of the second communication party is displayed in the first window of the first communication party through the first P2P penetration connection;
  • the second communication direction sends the first operable object to the third communication party
  • the request for acquiring the first operable object is sent by the third communication party to the second communication party according to the acquiring manner of the first operable object, and the acquiring of the first operable object
  • the first proxy and the first communication party are configured by the first communication party when the first communication party detects an instruction to copy or move the first operable object in the first window into the second window.
  • a second P2P penetration connection between the third agents of the three communicating parties is sent to the third communicating party.
  • Another technical solution adopted by the present invention is to provide a communication method, including:
  • the third agent of the third communication party establishes a second P2P penetration connection with the first agent of the first communication party;
  • the third communication party receives the acquisition manner of the first operable object by using the second P2P penetration connection, and sends a request for acquiring the first operable object to the second communication party according to the obtaining manner, where
  • the obtaining manner of the first operable object is when the first communication party detects an instruction to copy or move the first operable object in the first window into the second window, and wears through the second P2P Transmitting to the third communication party, the first P2P penetration connection between the first agent of the first communication party and the second agent of the second communication party is displayed in the first window The first operable object in the second communication party;
  • the third communication party receives the first operable object sent by the second communication party in response to the request to acquire the first operable object.
  • an apparatus including:
  • processor and a network communication circuit, wherein the processor is connected to the network communication circuit
  • the processor is configured to run a first proxy to establish a first and a second P2P penetration connection with the second proxy of the second communication party and the third proxy of the third communication party by the network communication circuit, respectively;
  • the processor is further configured to run a first window to display the first operable object of the second communication party by using the first P2P penetration connection;
  • the processor is further configured to run a second window to: when the first operable object in the first window is detected to be copied or moved to an instruction in the second window, the first The manner of acquiring the operation object is sent to the third communication party through the second P2P penetration connection.
  • an apparatus including:
  • processor and a network communication circuit, wherein the processor is connected to the network communication circuit
  • the processor is configured to run a second proxy to establish a first P2P penetration connection with the first agent of the first communication party by using the network communication circuit;
  • the processor is further configured to run a fifth application to display the first operable object in the first window of the first communication party through the first P2P penetration connection, and receive the third communication party through the network communication circuit Transmitting a request to acquire the first operable object, and transmitting, by the network communication circuit, the first operable object to the third communication party in response to the request, wherein the acquiring the first The request of the operation object is sent by the third communication party to the fifth application according to the acquisition manner of the first operable object, and the acquiring manner of the first operable object is that the first communication party detects When copying or moving the first operable object in the first window to an instruction in the second window, between the first agent of the first communication party and the third agent of the third communication party Transmitting, by the second P2P, the third communication party;
  • the second agent is independent of the fifth application.
  • an apparatus including:
  • processor and a network communication circuit, wherein the processor is connected to the network communication circuit
  • the processor is configured to run a third proxy to establish a second P2P penetration connection with the first agent of the first communication party through the communication network circuit;
  • the processor is further configured to run a third application, to receive, by using the second P2P penetration connection, an acquisition manner of the first operable object sent by the first communication party, where the acquiring manner of the first operable object is the When the first communication party detects an instruction to copy or move the first operable object in the first window to the second window, and sends the second P2P through the second P2P through the connection, Displaying the first one of the second communication parties by the first P2P penetration connection between the first agent of the first communication party and the second agent of the second communication party in the first window Operational object
  • the processor is further configured to run a fourth application, to receive an acquisition manner of the first operable object from the third application, and send, by using the network communication circuit, an acquisition location to the second communication party according to the acquiring manner Determining, by the network communication circuit, a first operable object that is sent by the second communication party in response to the request;
  • the third agent is independent of the third application and the fourth application.
  • the first communication party establishes a P2P penetration connection with the second communication party and the third communication party respectively through the independently running agent program, and the first communication party can access the first party as the client.
  • the resources provided by the two servers of the second party and the third party. Displaying, in a first window of the first communicating party, a first operable object of the second communicating party, by copying or moving the first operable object to the second window in the first communicating party, the first operable object is from the first
  • the two communicating parties are sent to the third communicating party. That is, the resource transmission between different servers is realized by copying or moving operations on the client, and the operation is simple.
  • FIG. 1 is a flow chart of a first embodiment of a network communication method of the present invention
  • FIG. 2 is a flow chart of a second embodiment of the network communication method of the present invention.
  • Figure 3 is a flow chart showing a third embodiment of the network communication method of the present invention.
  • FIG. 4 is a flow chart showing a fourth embodiment of the network communication method of the present invention.
  • Figure 5 is a flow chart showing a fifth embodiment of the network communication method of the present invention.
  • Figure 6 is a flowchart of a sixth embodiment of the network communication method of the present invention.
  • Figure 7 is a flowchart of a seventh embodiment of the network communication method of the present invention.
  • Figure 8 is a schematic illustration of a first embodiment of the apparatus of the present invention.
  • Figure 9 is a schematic illustration of a second embodiment of the apparatus of the present invention.
  • Figure 10 is a schematic illustration of a third embodiment of the apparatus of the present invention.
  • the first embodiment of the network communication method of the present invention includes:
  • the first agent of the first communication party establishes a first and a second P2P penetration connection with the second agent of the second communication party and the third agent of the third communication party, respectively.
  • the first agent, the second agent, and the third agent are all independently running programs, and are a bridge and an intermediary for P2P penetration between the programs of the machine and other devices. Of course, it can also be understood as a communication interface.
  • the first agent, the second agent, and the third agent can be called by the native program to establish a P2P penetration connection with the agent on the other device, and provide data distribution and reception for the native application.
  • the first communication party, the second communication party and the third communication party may be in different intranets; or one of the communication parties is in the internal network, the other two communication parties are on the public network; or one of the communication parties is on the public network, and the other communication party is on the public network, and the other The second communication party is in the internal network.
  • the first window is a display interface of the first application of the first communication party
  • the second window is a display interface of the second application of the first communication party.
  • the first agent is independent of the first application and the second application.
  • the first application and the second application may be a browser side or an FTP client.
  • the first application is configured to display resources provided by the second communication party through the first P2P penetration connection
  • the second application is configured to display resources provided by the third communication party through the second P2P penetration connection.
  • the first communication party serves as a client to simultaneously view the resources provided by the two servers, that is, the second communication party and the third communication party.
  • the first operable object is a resource provided by the second communication party, and the resource may be several files, folders or a combination of the two.
  • the first communication party establishes a P2P penetration connection with the second communication party and the third communication party respectively through the independently running agent, and the first communication party can access the second communication party and the third as the client.
  • the resources provided by the two servers of the communicating party. Displaying, in a first window of the first communicating party, a first operable object of the second communicating party, by copying or moving the first operable object to the second window in the first communicating party, the first operable object is from the first
  • the two communicating parties are sent to the third communicating party. That is, the resource transmission between different servers is realized by copying or moving operations on the client, and the operation is simple.
  • a second embodiment of the network communication method of the present invention based on the first embodiment of the network communication method of the present invention, the step of transmitting the first operable object of the second communication party to the third communication party includes:
  • the second window When detecting an instruction to copy or move the first operable object in the first window to the second window, the second window requests the first window to acquire the first operable object.
  • the first window responds to the request sent by the second window to read the acquiring manner of the first operable object and sends the acquiring manner of the first operable object to the second window.
  • the manner of obtaining the first operable object includes the name of the first operable object, the storage path, and the access manner of the second communication party.
  • the first communication party sends the acquiring manner of the first operable object to the third communicating party by using the second P2P penetration connection.
  • a third P2P penetration connection is established between the third agent of the third communication party and the second agent of the second communication party.
  • the third communication party sends a request for acquiring the first operable object to the second communication party by using the third P2P penetration connection.
  • the second communication party sends the first operable object to the third communication party through the third P2P penetration connection in response to the request.
  • the P2P is established between the second communication party and the third communication party as the server by copying or moving the first operable object in the first window to the second window in the first communication party.
  • the connection is penetrated, and the first operable object is transmitted through the P2P penetration connection, and the operation is simple and the transmission process does not occupy the network resources of the first communication party.
  • a third embodiment of the network communication method of the present invention based on the second embodiment of the network communication method of the present invention, includes:
  • the second application of the first communication party acquires the acquisition manner of the first operable object and sends it to the third application of the third communication party through the second P2P penetration connection.
  • the third application is a server program for providing resources for client access, and the second application of the first communication party accesses the third application of the third communication party through the second P2P penetration connection.
  • the third application of the third communication party receives the acquisition manner of the first operable object and sends it to the fourth application of the third communication party.
  • the fourth application is a client program, configured to access the second communication party according to the acquiring manner of the first operable object and request to acquire the first operable object.
  • the fourth application of the third communication party sends a request for acquiring the first operable object to the fifth application of the second communication party by using the third P2P penetration connection.
  • the fifth application of the second communication party receives the acquisition request sent by the fourth application of the third communication party, and sends the first operable object to the third communication party through the third P2P penetration connection in response to the acquisition request.
  • the fifth application is a server program for providing resources for client access, and the first application of the first communication party accesses the fifth application of the second communication party through the first P2P penetration connection.
  • the fifth application also provides resources to it.
  • the fourth application of the third communication party receives and stores the first operable object.
  • the fourth application stores the first operable object according to a storage path of resources of the third communication party displayed in the second window when the first operable object is moved or copied from the first window of the first communication party to the second window.
  • the storage path is sent by the third application to the fourth application.
  • the third agent of the third communicating party is independent of the third application and the fourth application, and the second agent of the second communicating party is independent of the fifth application. Since the transmission of resources between the second communication party and the third communication party is not necessarily unidirectional, the second communication party may further include a client program for accessing the third communication party and requesting acquisition of resources therefrom.
  • the third communication party requests the second communication party through the fourth application of the client program.
  • the first operable object transmits the first operable object through the P2P through connection.
  • the second communication party acts as the server and the third communication party acts as the client.
  • the process of receiving the first operable object is further fed back to the first communication party by using the third application.
  • the second application, and the second window of the first communication party displays the progress of receiving the first operable object.
  • the progress of the first communication party showing that the first operable object is received can be displayed through the progress bar.
  • a fourth embodiment of the network communication method of the present invention based on the third embodiment of the network communication method of the present invention, includes:
  • the fourth application of the third communication party sends the acquisition request based on the first protocol to the first loopback port of the third communication party.
  • the sixth application of the third communication party obtains the acquisition request based on the first protocol from the first loopback port and converts the request to the second protocol based acquisition request, and sends the second protocol based acquisition request to the second communication party.
  • the second agent obtains the acquisition request based on the first protocol from the first loopback port and converts the request to the second protocol based acquisition request, and sends the second protocol based acquisition request to the second communication party.
  • the third agent is independent of the sixth application, and the sixth application is a conversion program for mutually converting access data based on different protocols.
  • the second agent of the second communication party receives the acquisition request based on the second protocol.
  • the fifth application of the second communication party receives the acquisition request based on the third protocol, and sends the first operable object based on the third protocol in response to the third protocol-based acquisition request.
  • the second agent is independent of the fifth application, and the fifth application is a service program.
  • the third agent of the third communication party receives the first operable object based on the second protocol.
  • the third agent of the third communication party sends the first operable object based on the second protocol to the sixth application of the third communication party.
  • the sixth application converts the first operable object based on the second protocol into a second loopback port based on the first operable object of the first protocol and sent to the third communication party.
  • the fourth application of the third communication party receives the first operable object based on the first protocol from the second loopback port of the third communication party.
  • the first protocol is a protocol that can be identified and used by the fourth application
  • the second protocol is a protocol that can be supported by the P2P penetrating connection. Since the P2P penetrating connection does not support direct transmission of the access data based on the first protocol, It needs to be converted into access data based on the second protocol.
  • the third protocol is a protocol that can be identified and used by the fifth application. Since the P2P penetration connection does not support direct transmission of access data based on the third protocol, it needs to be converted. The access data based on the second protocol becomes the access data based on the third protocol and is retransmitted to the fifth application.
  • the loopback port is a virtual port on the device, and the address range is 127.0.0.1 to 127.255.255.254, and the acquisition request or the first operable object sent to the loopback port does not pass through the external network interface.
  • the P2P penetration connection is not established between the devices of the same intranet through the independently running agent, and the network transmission service based on different protocols can be in the P2P by mutually converting the access data based on different protocols. Use under penetration.
  • the second agent of the second communication party accesses the second communication party and the first loopback port and the second loopback used by the third communication party when accessing the second communication party
  • the port is bound, and the bounded second communication party access mode and the first loopback port and the second loopback port are sent to the third communication party by the server managing the second communication party and the third communication party. proxy.
  • the first protocol is a TCP protocol
  • the second protocol is a UDP protocol
  • the third protocol is a TCP protocol
  • the third protocol may also be a DCCP protocol or an SCTP protocol RTP protocol.
  • a fifth embodiment of the network communication method of the present invention includes:
  • the first agent of the first communication party establishes a first and a second P2P penetration connection with the second agent of the second communication party and the third agent of the third communication party, respectively.
  • the first window is a display interface of the first application of the first communication party
  • the second window is a display interface of the second application of the first communication party.
  • the first agent is independent of the first application and the second application.
  • the first application and the second application may be a browser side or an FTP client.
  • the first application is configured to display resources provided by the second communication party through the first P2P penetration connection
  • the second application is configured to display resources provided by the third communication party through the second P2P penetration connection.
  • the first communication party serves as a client to simultaneously view the resources provided by the two servers, that is, the second communication party and the third communication party.
  • the first communication party when detecting that the first operable object in the first window is copied or moved to the second window, the first communication party sends the acquiring manner of the first operable object to the third communicating party by using the second P2P through connection, So that the third communication party acquires the first operable object from the second communication party according to the acquisition manner.
  • the first communication party establishes a P2P penetration connection with the second communication party and the third communication party respectively through the independently running agent, and the first communication party can access the second communication party and the third as the client.
  • the resources provided by the two servers of the communicating party. Displaying, in a first window of the first communicating party, a first operable object of the second communicating party, by copying or moving the first operable object to the second window in the first communicating party, the first operable object is from the first
  • the two communicating parties are sent to the third communicating party. That is, the resource transmission between different servers is realized by copying or moving operations on the client, and the operation is simple.
  • a sixth embodiment of the network communication method of the present invention includes:
  • the second agent of the second communication party establishes a first P2P penetration connection with the first agent of the first communication party.
  • the first operable object of the second communication party is displayed in the first window of the first communication party by using the first P2P penetration connection.
  • the second proxy of the second communication party establishes a third P2P penetration connection with the third proxy of the third communication party.
  • the second communication party receives, by using the third P2P penetration connection, a request for acquiring the first operable object sent by the third communication party.
  • the request for acquiring the first operable object is that the third communicating party obtains, according to the acquiring manner of the first operable object, that the first communicating party detects that the first operable object in the first window is copied or moved to the second window.
  • the instruction is sent to the third communication party through a second P2P penetration connection between the first agent of the first communication party and the third agent of the third communication party.
  • the second communication party sends the first operable object to the third communication party through the third P2P penetration connection in response to the request.
  • the second communication party establishes a P2P penetration connection with the first communication party and the third communication party respectively through the independently running agent, and the first communication party can access the second communication party and the third as the client.
  • the first operable object of the second communicating party may be displayed in the first window of the first communicating party, and the first operable object is copied or moved to the second window in the first communicating party Transmitted from the second communicating party to the third communicating party. That is, the resource transmission between different servers is realized by copying or moving operations on the client, and the operation is simple.
  • a seventh embodiment of the network communication method of the present invention includes:
  • the third agent of the third communication party establishes a second P2P penetration connection with the first agent of the first communication party.
  • the third communication party obtains an acquisition manner of the first operable object by using the second P2P penetration connection.
  • the first operable object is obtained by the first communication party detecting the copying or moving the first operable object in the first window to the second window, and connecting to the third communication through the second P2P through the connection
  • the first P2P penetration connection between the first agent of the first communication party and the second agent of the second communication party in the first window is displayed by the party, and the first operable object in the second communication party is displayed.
  • the third agent of the third communication party establishes a third P2P penetration connection with the second agent of the second communication party.
  • the third agent of the third communication party sends a request for acquiring the first operable object to the second agent of the second communication party by using the third P2P penetration connection.
  • the third communication party receives the first operable object sent by the second communication party in response to the request for acquiring the first operable object.
  • the third communication party establishes a P2P penetration connection with the first communication party and the second communication party respectively by the independently running agent, and the first communication party can access the second communication party and the third as the client.
  • the resources provided by the two servers of the communicating party. Displaying, in a first window of the first communicating party, a first operable object of the second communicating party, by copying or moving the first operable object to the second window in the first communicating party, the first operable object is from the first
  • the two communicating parties are sent to the third communicating party. That is, the resource transmission between different servers is realized by copying or moving operations on the client, and the operation is simple.
  • a first embodiment of the device of the present invention includes a processor and a network communication circuit, and the processor is connected to a network communication circuit;
  • the processor is configured to run the first proxy 11 to establish first and second P2P penetration connections with the second proxy of the second communication party and the third proxy of the third communication party respectively through the network communication circuit;
  • the processor is further configured to run the first window 12 to display the first operable object of the second communication party through the first P2P penetration connection. It will be appreciated that the first operable object is displayed within the first window 12 in the manner of FIG.
  • the processor is further configured to run the second window 13 to detect when the first operable object in the first window 12 is copied or moved to the instruction in the second window 13 to pass the first operable object through the first
  • the two P2P penetration connection is sent to the third communication party, so that the third communication party acquires the first operable object from the second communication party according to the acquisition manner.
  • the first window 12 is a display interface of a first application (not shown), and the second window 13 is a display interface of a second application (not shown).
  • the first agent is independent of the first application and the second application.
  • the first application and the second application may be a browser side or an FTP client.
  • the first application is configured to display resources provided by the second communication party through the first P2P penetration connection
  • the second application is configured to display resources provided by the third communication party through the second P2P penetration connection.
  • the device as a client simultaneously views the two servers, that is, the resources provided by the second communication party and the third communication party.
  • the first agent 11 is independent of the first application and the second application.
  • the device establishes a P2P penetration connection with the second communication party and the third communication party respectively through the independently running agent, and simultaneously accesses the second communication party and the third communication party as the client.
  • Resources provided by the end Displaying a first operable object of the second communicating party in the first window, and transmitting the first operable object from the second communicating party to the third communicating party by copying or moving the first operable object to the second window . That is, the resource transmission between different server ends is realized by copying or moving operations on the device as a client, and the operation is simple.
  • a second embodiment of the device of the present invention includes a processor and a network communication circuit, and the processor is connected to a network communication circuit.
  • the processor is configured to run the second agent 21 to establish a first P2P through connection between the first communication agent and the first agent of the first communication party.
  • the processor is further configured to run the fifth application 22 to display the first operable object in the first window of the first communication party through the first P2P penetration connection, and receive the acquisition sent by the third communication party through the network communication circuit a first operable object request, and transmitting the first operable object to the third communication party through the network communication circuit in response to the request, wherein the request to acquire the first operable object is the third communication party acquiring according to the first operable object
  • the manner of obtaining the first operable object sent by the first application 22 is when the first communication party detects an instruction to copy or move the first operable object in the first window to the second window, by using the first A second P2P penetration connection between the first agent of the communicating party and the third agent of the third communicating party is sent to the third communicating party.
  • the second agent 21 is independent of the fifth application 22.
  • the device establishes a P2P penetration connection with the first communication party through the independently running agent, and provides resources to the first communication party as a server.
  • the first operable object of the first communication party displays the first operable object of the device, and the device sends the first operable object by the operation of copying or moving the first operable object to the second window by the first communication party.
  • the resource transmission between different servers is realized by copying or moving operations on the client, and the operation is simple.
  • a third embodiment of the device of the present invention includes a processor and a network communication circuit, and the processor is connected to the network communication circuit.
  • the processor is operative to run the third agent 31 to establish a second P2P through connection between the communication network circuit and the first agent of the first correspondent.
  • the processor is further configured to run the third application 32, to receive, by the second P2P penetration connection, an acquisition manner of the first operable object sent by the first communication party, where the first operable object is acquired by the first communication party.
  • the second P2P through the connection is sent to the third communication party, and the first window passes through the first communication party.
  • a first P2P penetration connection between an agent and a second agent of the second communication party displays the first operable object of the second communication party.
  • the processor is further configured to run the fourth application 33 to receive the acquisition manner of the first operable object from the third application 32, and send a request for acquiring the first operable object to the second communication party through the network communication circuit according to the obtaining manner, And receiving, by the network communication circuit, the first operable object sent by the second communication party in response to the request.
  • the third agent 31 is independent of the third application 32 and the fourth application 33.
  • the device establishes a P2P penetration connection with the first communication party through the independently running agent, and provides resources to the first communication party as a server.
  • the device receives the acquisition manner of the first operable object from the first communication party by requesting the first communication party to copy or move the first operable object to the second window, and requests the second communication party to obtain the first Operable objects. That is, the resource transmission between different servers is realized by copying or moving operations on the client, and the operation is simple.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Computer And Data Communications (AREA)

Abstract

Disclosed in the present invention is a method for network communications, comprising: a first proxy of a first communicating party establishing a first and second peer-to-peer (P2P) traversal connection with a second proxy of a second communicating party and a third proxy of a third communicating party, respectively; displaying a first window and second window on the display screen of the first communicating party, wherein the first window displays a first operable object of the second communicating party via the first P2P traversal connection; when an instruction to copy or move the first operable object in the first window to the second window is detected, the first operable object of the second communicating party being sent to the third communicating party. Further provided in the present invention is a device.

Description

一种网络通信方法及设备 Network communication method and device

【技术领域】[Technical Field]

本发明涉及通信技术,特别是涉及一种网络通信方法及设备。The present invention relates to communication technologies, and in particular, to a network communication method and device.

【背景技术】 【Background technique】

P2P(Peer to Peer,对等网络)技术充分利用网络中的每一台计算机的能力,互相提供服务。在P2P网络环境中的每台计算机既能充当网络服务的请求者,又对其它计算机的请求作出响应,提供资源和服务。P2P (Peer to Peer, Peer-to-Peer Networking technology leverages the power of each computer in the network to provide services to each other. Each computer in a P2P network environment can act as both a requester for a network service and a request for other computers to provide resources and services.

现有技术中,用户需要把资源从一台服务端传输到另外一台服务端时需先在一台客户端登陆第一台服务端,把需要传输的资源下载到客户端上,然后在同一台客服端设备上登陆第二台服务端,再把资源上传到第二台服务端,如此,在交换资源时操作步骤繁琐,操作体验差,不利于资源有效传输。In the prior art, when a user needs to transfer resources from one server to another, the user must first log in to the first server on one client, download the resources to be transmitted to the client, and then The customer service device on the station logs in to the second server, and then uploads the resource to the second server. Thus, when the resources are exchanged, the operation steps are cumbersome and the operation experience is poor, which is not conducive to efficient resource transmission.

【发明内容】 [Summary of the Invention]

本发明主要解决的技术问题是提供一种网络通信方法及设备,能够解决现有技术中不同服务端之间交换资源时操作步骤繁琐的问题。The technical problem to be solved by the present invention is to provide a network communication method and device, which can solve the problem that the operation steps are cumbersome when exchanging resources between different server terminals in the prior art.

为解决上述技术问题,本发明采用的一个技术方案是:一种网络通信方法,包括:In order to solve the above technical problem, a technical solution adopted by the present invention is: a network communication method, including:

第一通信方的第一代理分别与第二通信方的第二代理和第三通信方的第三代理建立第一、第二P2P穿透连接;The first agent of the first communication party establishes a first and second P2P penetration connection with the second agent of the second communication party and the third agent of the third communication party, respectively;

在所述第一通信方的显示屏中展示第一窗口和第二窗口,其中所述第一窗口内通过所述第一P2P穿透连接显示所述第二通信方中的第一可操作对象;Displaying a first window and a second window in a display screen of the first communication party, wherein the first operable object in the second communication party is displayed by the first P2P penetration connection in the first window ;

当检测到将所述第一窗口中的所述第一可操作对象复制或移动到所述第二窗口中的指令时,将所述第二通信方的第一可操作对象发送到所述第三通信方。Sending a first operable object of the second communicating party to the first when detecting an instruction to copy or move the first operable object in the first window into the second window Three communication parties.

其中,所述将所述第二通信方的第一可操作对象发送到所述第三通信方包括:The sending the first operable object of the second communication party to the third communication party includes:

通过所述第二P2P穿透连接将所述第一可操作对象的获取方式发给所述第三通信方,以使得所述第三通信方的第三代理与所述第二通信方的第二代理之间建立第三P2P穿透连接,并且将所述第二通信方的第一可操作对象通过所述第三P2P穿透连接发送到所述第三通信方。Transmitting the acquisition manner of the first operable object to the third communication party by using the second P2P penetration connection, so that the third proxy of the third communication party and the second communication party A third P2P penetration connection is established between the two agents, and the first operable object of the second communication party is sent to the third communication party through the third P2P penetration connection.

其中,所述第一窗口为所述第一通信方的第一应用的显示界面,所述第二窗口为所述第一通信方的第二应用的显示界面;The first window is a display interface of the first application of the first communication party, and the second window is a display interface of the second application of the first communication party;

所述通过所述第二P2P穿透连接将所述第一可操作对象的获取方式发给所述第三通信方的步骤包括:The step of sending the acquiring manner of the first operable object to the third communicating party by using the second P2P penetration connection includes:

所述第一通信方的第二应用获取所述第一可操作对象的获取方式并通过所述第二P2P穿透连接将其发给所述第三通信方的第三应用,所述第三通信方的第三应用接收所述第一可操作对象的获取方式并将其发给所述第三通信方的第四应用;Obtaining, by the second application of the first communication party, the acquiring manner of the first operable object, and sending the third operable object to the third application of the third communication party by using the second P2P penetration connection, the third The third application of the communication party receives the acquisition manner of the first operable object and sends it to the fourth application of the third communication party;

所述将所述第二通信方的第一可操作对象通过所述第三P2P穿透连接发送到所述第三通信方的步骤包括:The step of transmitting the first operable object of the second communication party to the third communication party through the third P2P penetration connection comprises:

所述第三通信方的第四应用通过所述第三P2P穿透连接,向所述第二通信方的第五应用发送获取所述第一可操作对象的请求;The fourth application of the third communication party sends a request for acquiring the first operable object to the fifth application of the second communication party by using the third P2P penetration connection;

所述第二通信方的第五应用接收所述第三通信方的第四应用所发送的获取请求,并响应所述获取请求将所述第一可操作对象通过所述第三P2P穿透连接发给所述第三通信方的第四应用;The fifth application of the second communication party receives the acquisition request sent by the fourth application of the third communication party, and connects the first operable object through the third P2P through the connection request a fourth application sent to the third communication party;

所述第三通信方的第四应用接收并存储所述第一可操作对象。The fourth application of the third communication party receives and stores the first operable object.

其中,所述第三通信方的第四应用通过所述第三P2P穿透连接向所述第二通信方的第五应用发送获取所述第一可操作对象的请求的步骤包括:The step of the fourth application of the third communication party sending a request for acquiring the first operable object to the fifth application of the second communication party by using the third P2P penetration connection includes:

将来自于所述第三通信方的第四应用的基于第一协议的获取请求转换为基于第二协议的获取请求;Transmitting a first protocol-based acquisition request from the fourth application of the third communication party to an acquisition request based on the second protocol;

由所述第三通信方的第三代理将所述基于第二协议的获取请求发送给所述第二通信方的第二代理;Sending, by the third agent of the third communication party, the second protocol based acquisition request to the second agent of the second communication party;

所述第二通信方的第五应用接收所述第三通信方的第四应用所发送的获取请求,并响应所述获取请求将所述第一可操作对象通过所述第三P2P穿透连接发给所述第三通信方的第四应用的步骤包括:The fifth application of the second communication party receives the acquisition request sent by the fourth application of the third communication party, and connects the first operable object through the third P2P through the connection request The step of sending the fourth application to the third communication party includes:

所述第二通信方的第二代理接收所述基于第二协议的获取请求;Receiving, by the second agent of the second communication party, the acquisition request based on the second protocol;

将来自于所述第二通信方的第二代理的基于第二协议的获取请求转换为基于第三协议的获取请求;Transmitting a second protocol-based acquisition request from the second agent of the second communication party to a third protocol-based acquisition request;

所述第二通信方的第五应用接收所述基于第三协议的获取请求,并响应所述基于第三协议的获取请求发送基于第三协议的所述第一可操作对象;The fifth application of the second communication party receives the third protocol-based acquisition request, and sends the first operable object based on the third protocol in response to the third protocol-based acquisition request;

将来自于所述第二通信方的第五应用的所述基于第三协议的所述第一可操作对象转换为基于第二协议的所述第一可操作对象;Converting the first operable object based on the third protocol from the fifth application of the second communicating party to the first operable object based on the second protocol;

由所述第二通信方的第二代理将所述基于第二协议的所述第一可操作对象发给所述第三通信方的第三代理;Sending, by the second agent of the second communication party, the first operable object based on the second protocol to a third agent of the third communication party;

所述第三通信方的第三代理接收所述基于第二协议的所述第一可操作对象;The third agent of the third communication party receives the first operable object based on the second protocol;

将来自于所述第三通信方的第三代理的所述基于第二协议的所述第一可操作对象转换为基于第一协议的所述第一可操作对象;Converting the first operable object based on the second protocol from the third agent of the third communicating party to the first operable object based on the first protocol;

所述第三通信方的第四应用接收所述基于第一协议的所述第一可操作对象。The fourth application of the third communication party receives the first operable object based on the first protocol.

其中,将来自于所述第三通信方的第四应用的基于第一协议的获取请求转换为基于第二协议的获取请求的步骤包括:The step of converting the first protocol-based acquisition request of the fourth application from the third communication party to the second protocol-based acquisition request includes:

所述第三通信方的第四应用将所述基于第一协议的获取请求发给所述第三通信方的第一环回端口;The fourth application of the third communication party sends the first protocol-based acquisition request to the first loopback port of the third communication party;

所述第三通信方的第六应用从所述第一环回端口获得所述基于第一协议的获取请求并转换为所述基于第二协议的获取请求,并将所述基于第二协议的获取请求发给所述第二通信方的第二代理;The sixth application of the third communication party obtains the first protocol-based acquisition request from the first loopback port and converts to the second protocol-based acquisition request, and the second protocol-based acquisition request Obtaining a second proxy requesting to be sent to the second correspondent party;

所述将来自于所述第三通信方的第三代理的基于第二协议的所述第一可操作对象转换为基于第一协议的所述第一可操作对象的步骤包括:The step of converting the first operable object based on the second protocol from the third agent of the third communicating party to the first operable object based on the first protocol comprises:

所述第三通信方的第三代理将所述基于第二协议的所述第一可操作对象发给所述第三通信方的第六应用,所述第六应用将所述基于第二协议的所述第一可操作对象转换为所述基于第一协议的所述第一可操作对象并发给所述第三通信方的第二环回端口;The third agent of the third communication party sends the first operable object based on the second protocol to the sixth application of the third communication party, and the sixth application applies the second protocol based Translating the first operable object into the second loopback port of the third communicator based on the first operable object of the first protocol;

所述第三通信方的第四应用接收所述基于第一协议的所述第一可操作对象的步骤包括:The step of receiving, by the fourth application of the third communication party, the first operable object based on the first protocol comprises:

所述第三通信方的第四应用从所述第三通信方的第二环回端口接收所述基于第一协议的所述第一可操作对象。The fourth application of the third communication party receives the first operable object based on the first protocol from a second loopback port of the third communication party.

其中,所述第二通信方的第二代理将所述第二通信方的访问方式和访问所述第二通信方时所述第三通信方使用的第一环回端口、第二环回端口绑定,并将所述绑定的所述第二通信方的访问方式和所述第一环回端口、所述第二环回端口通过管理所述第二通信方和所述第三通信方的服务器发送给所述第三通信方的第三代理。The second agent of the second communication party accesses the second communication party and the first loopback port and the second loopback port used by the third communication party when accessing the second communication party Binding, and the access mode of the second communication party that is bound to the first loopback port and the second loopback port by managing the second communication party and the third communication party The server sends to the third agent of the third communicating party.

其中,所述第一协议为TCP协议,所述第二协议为UDP协议,所述第三协议为TCP协议。The first protocol is a TCP protocol, the second protocol is a UDP protocol, and the third protocol is a TCP protocol.

其中,所述第三通信方的第四应用接收所述第一可操作对象时,进一步将接收所述第一可操作对象的进度通过第三应用反馈至第一通信方的第二应用。When the fourth application of the third communication party receives the first operable object, the progress of receiving the first operable object is further fed back to the second application of the first communication party by using the third application.

其中,当检测到将所述第一窗口中的所述第一可操作对象复制或移动到所述第二窗口中的指令时,所述第二窗口向第一窗口请求所述第一可操作对象的获取方式,以触发所述第一窗口响应所述第二窗口发送的请求读取所述第一可操作对象的获取方式并将所述第一可操作对象的获取方式发送给所述第二窗口。Wherein, when detecting an instruction to copy or move the first operable object in the first window into the second window, the second window requests the first window to operate the first window The manner of acquiring the object, the method for triggering the first window to be sent in response to the request sent by the second window to read the first operable object, and sending the first operable object to the first Two windows.

为解决上述技术问题,本发明采用的另一个技术方案是:提供一种通信方法,包括:In order to solve the above technical problem, another technical solution adopted by the present invention is to provide a communication method, including:

第一通信方的第一代理分别与第二通信方的第二代理和第三通信方的第三代理建立第一、第二P2P穿透连接;The first agent of the first communication party establishes a first and second P2P penetration connection with the second agent of the second communication party and the third agent of the third communication party, respectively;

在所述第一通信方的显示屏中展示第一窗口和第二窗口,其中所述第一窗口内通过所述第一P2P穿透连接显示所述第二通信方中的第一可操作对象;Displaying a first window and a second window in a display screen of the first communication party, wherein the first operable object in the second communication party is displayed by the first P2P penetration connection in the first window ;

当检测到将所述第一窗口中的所述第一可操作对象复制或移动到所述第二窗口中的指令时,所述第一通信方通过第二P2P穿透连接将所述第一可操作对象的获取方式发送至所述第三通信方,以使得所述第三通信方根据所述获取方式从所述第二通信方获取所述第一可操作对象。When detecting an instruction to copy or move the first operable object in the first window into the second window, the first communication party will connect the first through a second P2P through connection The obtaining manner of the operable object is sent to the third communicating party, so that the third communicating party acquires the first operable object from the second communicating party according to the acquiring manner.

为解决上述技术问题,本发明采用的另一个技术方案是:提供一种通信方法,包括:In order to solve the above technical problem, another technical solution adopted by the present invention is to provide a communication method, including:

第二通信方的第二代理与第一通信方的第一代理建立第一P2P穿透连接;The second agent of the second communication party establishes a first P2P penetration connection with the first agent of the first communication party;

所述第二通信方的第一可操作对象通过所述第一P2P穿透连接显示于所述第一通信方的第一窗口内;The first operable object of the second communication party is displayed in the first window of the first communication party through the first P2P penetration connection;

当所述第二通信方接收到所述第三通信方发送的获取所述第一可操作对象的请求时,所述第二通信方向所述第三通信方发送所述第一可操作对象,其中所述获取所述第一可操作对象的请求是所述第三通信方根据所述第一可操作对象的获取方式向所述第二通信方发送的,所述第一可操作对象的获取方式是所述第一通信方检测到将所述第一窗口中的第一可操作对象复制或移动到第二窗口中的指令时,通过所述第一通信方的第一代理与所述第三通信方的第三代理之间的第二P2P穿透连接向所述第三通信方发送的。When the second communication party receives the request for acquiring the first operable object sent by the third communication party, the second communication direction sends the first operable object to the third communication party, The request for acquiring the first operable object is sent by the third communication party to the second communication party according to the acquiring manner of the first operable object, and the acquiring of the first operable object The first proxy and the first communication party are configured by the first communication party when the first communication party detects an instruction to copy or move the first operable object in the first window into the second window. A second P2P penetration connection between the third agents of the three communicating parties is sent to the third communicating party.

为解决上述技术问题,本发明采用的另一个技术方案是:提供一种通信方法,包括:In order to solve the above technical problem, another technical solution adopted by the present invention is to provide a communication method, including:

第三通信方的第三代理与第一通信方的第一代理建立第二P2P穿透连接;The third agent of the third communication party establishes a second P2P penetration connection with the first agent of the first communication party;

所述第三通信方通过第二P2P穿透连接接收第一可操作对象的获取方式,并根据所述获取方式向所述第二通信方发送获取所述第一可操作对象的请求,其中所述第一可操作对象的获取方式是所述第一通信方检测到将第一窗口中的所述第一可操作对象复制或移动到第二窗口中的指令时,通过所述第二P2P穿透连接向所述第三通信方发送的,所述第一窗口内通过所述第一通信方的第一代理与所述第二通信方的第二代理之间的第一P2P穿透连接显示所述第二通信方中的所述第一可操作对象;The third communication party receives the acquisition manner of the first operable object by using the second P2P penetration connection, and sends a request for acquiring the first operable object to the second communication party according to the obtaining manner, where The obtaining manner of the first operable object is when the first communication party detects an instruction to copy or move the first operable object in the first window into the second window, and wears through the second P2P Transmitting to the third communication party, the first P2P penetration connection between the first agent of the first communication party and the second agent of the second communication party is displayed in the first window The first operable object in the second communication party;

所述第三通信方接收所述第二通信方响应所述获取所述第一可操作对象的请求发送的第一可操作对象。The third communication party receives the first operable object sent by the second communication party in response to the request to acquire the first operable object.

为解决上述技术问题,本发明采用的另一个技术方案是:提供一种设备,包括:In order to solve the above technical problem, another technical solution adopted by the present invention is to provide an apparatus, including:

处理器及网络通信电路,所述处理器与所述网络通信电路连接;a processor and a network communication circuit, wherein the processor is connected to the network communication circuit;

所述处理器用于运行第一代理,以通过所述网络通信电路分别与第二通信方的第二代理和第三通信方的第三代理建立第一、第二P2P穿透连接;The processor is configured to run a first proxy to establish a first and a second P2P penetration connection with the second proxy of the second communication party and the third proxy of the third communication party by the network communication circuit, respectively;

所述处理器还用于运行第一窗口,以通过所述第一P2P穿透连接显示所述第二通信方中的第一可操作对象;The processor is further configured to run a first window to display the first operable object of the second communication party by using the first P2P penetration connection;

所述处理器还用于运行第二窗口,以当检测到所述第一窗口中的所述第一可操作对象复制或移动到所述第二窗口中的指令时,将所述第一可操作对象的获取方式通过所述第二P2P穿透连接发送至所述第三通信方。The processor is further configured to run a second window to: when the first operable object in the first window is detected to be copied or moved to an instruction in the second window, the first The manner of acquiring the operation object is sent to the third communication party through the second P2P penetration connection.

为解决上述技术问题,本发明采用的另一个技术方案是:提供一种设备,包括:In order to solve the above technical problem, another technical solution adopted by the present invention is to provide an apparatus, including:

处理器及网络通信电路,所述处理器与所述网络通信电路连接;a processor and a network communication circuit, wherein the processor is connected to the network communication circuit;

所述处理器用于运行第二代理,以通过所述网络通信电路与第一通信方的第一代理建立第一P2P穿透连接;The processor is configured to run a second proxy to establish a first P2P penetration connection with the first agent of the first communication party by using the network communication circuit;

所述处理器还用于运行第五应用,以通过第一P2P穿透连接将第一可操作对象显示于第一通信方的第一窗口内,并通过所述网络通信电路接收第三通信方发送的获取所述第一可操作对象的请求,并响应所述请求通过所述网络通信电路将所述第一可操作对象发送至所述第三通信方,其中所述获取所述第一可操作对象的请求是所述第三通信方根据所述第一可操作对象的获取方式向所述第五应用发送的,所述第一可操作对象的获取方式是所述第一通信方检测到将所述第一窗口中的第一可操作对象复制或移动到第二窗口中的指令时,通过所述第一通信方的第一代理与所述第三通信方的第三代理之间的第二P2P穿透连接向所述第三通信方发送的;The processor is further configured to run a fifth application to display the first operable object in the first window of the first communication party through the first P2P penetration connection, and receive the third communication party through the network communication circuit Transmitting a request to acquire the first operable object, and transmitting, by the network communication circuit, the first operable object to the third communication party in response to the request, wherein the acquiring the first The request of the operation object is sent by the third communication party to the fifth application according to the acquisition manner of the first operable object, and the acquiring manner of the first operable object is that the first communication party detects When copying or moving the first operable object in the first window to an instruction in the second window, between the first agent of the first communication party and the third agent of the third communication party Transmitting, by the second P2P, the third communication party;

其中,所述第二代理独立于所述第五应用。The second agent is independent of the fifth application.

为解决上述技术问题,本发明采用的另一个技术方案是:提供一种设备,包括:In order to solve the above technical problem, another technical solution adopted by the present invention is to provide an apparatus, including:

处理器及网络通信电路,所述处理器与所述网络通信电路连接;a processor and a network communication circuit, wherein the processor is connected to the network communication circuit;

所述处理器用于运行第三代理,以通过所述通信网络电路与第一通信方的第一代理建立第二P2P穿透连接;The processor is configured to run a third proxy to establish a second P2P penetration connection with the first agent of the first communication party through the communication network circuit;

所述处理器还用于运行第三应用,以通过第二P2P穿透连接接收第一通信方发送的第一可操作对象的获取方式,其中所述第一可操作对象的获取方式是所述第一通信方检测到将第一窗口中的所述第一可操作对象复制或移动到第二窗口中的指令时,通过所述第二P2P穿透连接向所述第三通信方发送的,所述第一窗口内通过所述第一通信方的第一代理与所述第二通信方的第二代理之间的第一P2P穿透连接显示所述第二通信方中的所述第一可操作对象;The processor is further configured to run a third application, to receive, by using the second P2P penetration connection, an acquisition manner of the first operable object sent by the first communication party, where the acquiring manner of the first operable object is the When the first communication party detects an instruction to copy or move the first operable object in the first window to the second window, and sends the second P2P through the second P2P through the connection, Displaying the first one of the second communication parties by the first P2P penetration connection between the first agent of the first communication party and the second agent of the second communication party in the first window Operational object

所述处理器还用于运行第四应用,以从所述第三应用接收所述第一可操作对象的获取方式,根据所述获取方式通过所述网络通信电路向第二通信方发送获取所述第一可操作对象的请求,并通过所述网络通信电路接收所述第二通信方响应所述请求发送的第一可操作对象;The processor is further configured to run a fourth application, to receive an acquisition manner of the first operable object from the third application, and send, by using the network communication circuit, an acquisition location to the second communication party according to the acquiring manner Determining, by the network communication circuit, a first operable object that is sent by the second communication party in response to the request;

其中所述第三代理独立于所述第三应用及第四应用。The third agent is independent of the third application and the fourth application.

本发明的有益效果是:区别于现有技术,第一通信方通过独立运行的代理程序分别与第二通信方和第三通信方建立P2P穿透连接,第一通信方作为客户端可以访问第二通信方和第三通信方两个服务端提供的资源。第一通信方的第一窗口中显示第二通信方的第一可操作对象,通过在第一通信方中将第一可操作对象复制或移动到第二窗口,将第一可操作对象从第二通信方发送到第三通信方。即通过在客户端上的复制或移动操作,实现不同服务端之间的资源传输,操作简单。The beneficial effects of the present invention are: different from the prior art, the first communication party establishes a P2P penetration connection with the second communication party and the third communication party respectively through the independently running agent program, and the first communication party can access the first party as the client. The resources provided by the two servers of the second party and the third party. Displaying, in a first window of the first communicating party, a first operable object of the second communicating party, by copying or moving the first operable object to the second window in the first communicating party, the first operable object is from the first The two communicating parties are sent to the third communicating party. That is, the resource transmission between different servers is realized by copying or moving operations on the client, and the operation is simple.

【附图说明】 [Description of the Drawings]

图1是本发明的网络通信方法的第一实施例的流程图;1 is a flow chart of a first embodiment of a network communication method of the present invention;

图2是本发明的网络通信方法的第二实施例的流程图;2 is a flow chart of a second embodiment of the network communication method of the present invention;

图3是本发明的网络通信方法的第三实施例的流程图;Figure 3 is a flow chart showing a third embodiment of the network communication method of the present invention;

图4是本发明的网络通信方法的第四实施例的流程图;4 is a flow chart showing a fourth embodiment of the network communication method of the present invention;

图5是本发明的网络通信方法的第五实施例的流程图;Figure 5 is a flow chart showing a fifth embodiment of the network communication method of the present invention;

图6是本发明的网络通信方法的第六实施例的流程图;Figure 6 is a flowchart of a sixth embodiment of the network communication method of the present invention;

图7是本发明的网络通信方法的第七实施例的流程图;Figure 7 is a flowchart of a seventh embodiment of the network communication method of the present invention;

图8是本发明的设备的第一实施例的示意图;Figure 8 is a schematic illustration of a first embodiment of the apparatus of the present invention;

图9是本发明的设备的第二实施例的示意图;Figure 9 is a schematic illustration of a second embodiment of the apparatus of the present invention;

图10是本发明的设备的第三实施例的示意图。Figure 10 is a schematic illustration of a third embodiment of the apparatus of the present invention.

【具体实施方式】【detailed description】

下面结合附图和实施例对本发明进行详细说明。The invention will now be described in detail in conjunction with the drawings and embodiments.

如图1所示,本发明的网络通信方法的第一实施例包括:As shown in FIG. 1, the first embodiment of the network communication method of the present invention includes:

S101,第一通信方的第一代理分别与第二通信方的第二代理和第三通信方的第三代理建立第一、第二P2P穿透连接。S101. The first agent of the first communication party establishes a first and a second P2P penetration connection with the second agent of the second communication party and the third agent of the third communication party, respectively.

第一代理、第二代理及第三代理均为独立运行的程序,是本机各个程序与其他设备之间进行P2P穿透连接的桥梁、中介,当然,也可以理解为一种通信接口。第一代理、第二代理及第三代理可以被本机程序调用与其他设备上的代理建立P2P穿透连接,并为本机应用程序提供数据分发和接收。The first agent, the second agent, and the third agent are all independently running programs, and are a bridge and an intermediary for P2P penetration between the programs of the machine and other devices. Of course, it can also be understood as a communication interface. The first agent, the second agent, and the third agent can be called by the native program to establish a P2P penetration connection with the agent on the other device, and provide data distribution and reception for the native application.

第一通信方、第二通信方及第三通信方可以在不同的内网中;或其中一通信方在内网中,其它二通信方在公网;或其中一通信方在公网,其它二通信方在内网中。The first communication party, the second communication party and the third communication party may be in different intranets; or one of the communication parties is in the internal network, the other two communication parties are on the public network; or one of the communication parties is on the public network, and the other communication party is on the public network, and the other The second communication party is in the internal network.

S102,在第一通信方的显示屏中展示第一窗口和第二窗口,其中第一窗口内通过第一P2P穿透连接显示第二通信方中的第一可操作对象。S102. Display a first window and a second window in a display screen of the first communication party, wherein the first operable object in the second communication party is displayed in the first window by the first P2P penetration connection.

可以理解,第一窗口为第一通信方的第一应用的显示界面,第二窗口为第一通信方的第二应用的显示界面。第一代理独立于第一应用及第二应用。第一应用及第二应用可为浏览器端或FTP客户端。第一应用用于通过第一P2P穿透连接显示第二通信方提供的资源,第二应用用于通过第二P2P穿透连接显示第三通信方提供的资源。第一通信方作为客户端同时查看两个服务端,即第二通信方和第三通信方提供的资源。It can be understood that the first window is a display interface of the first application of the first communication party, and the second window is a display interface of the second application of the first communication party. The first agent is independent of the first application and the second application. The first application and the second application may be a browser side or an FTP client. The first application is configured to display resources provided by the second communication party through the first P2P penetration connection, and the second application is configured to display resources provided by the third communication party through the second P2P penetration connection. The first communication party serves as a client to simultaneously view the resources provided by the two servers, that is, the second communication party and the third communication party.

可以理解,第一可操作对象为第二通信方所提供的资源,资源可以是若干个文件、文件夹或两者的组合。It can be understood that the first operable object is a resource provided by the second communication party, and the resource may be several files, folders or a combination of the two.

S103,当检测到将第一窗口中的第一可操作对象复制或移动到第二窗口中的指令时,将第二通信方的第一可操作对象发送到第三通信方。S103. When detecting an instruction to copy or move the first operable object in the first window to the second window, send the first operable object of the second communication party to the third communication party.

可以理解,当未检测到第一窗口中的第一可操作对象复制或移动到第二窗口时,或者有对象复制或移动到第二窗口,但是该对象不是来自第一窗口时,第一窗口及第二窗口所显示的内容保持不变。It can be understood that when the first operable object in the first window is not detected to be copied or moved to the second window, or there is an object copied or moved to the second window, but the object is not from the first window, the first window And the content displayed in the second window remains unchanged.

通过上述实施例的实施,第一通信方通过独立运行的代理程序分别与第二通信方和第三通信方建立P2P穿透连接,第一通信方作为客户端可以访问第二通信方和第三通信方两个服务端提供的资源。第一通信方的第一窗口中显示第二通信方的第一可操作对象,通过在第一通信方中将第一可操作对象复制或移动到第二窗口,将第一可操作对象从第二通信方发送到第三通信方。即通过在客户端上的复制或移动操作,实现不同服务端之间的资源传输,操作简单。Through the implementation of the foregoing embodiment, the first communication party establishes a P2P penetration connection with the second communication party and the third communication party respectively through the independently running agent, and the first communication party can access the second communication party and the third as the client. The resources provided by the two servers of the communicating party. Displaying, in a first window of the first communicating party, a first operable object of the second communicating party, by copying or moving the first operable object to the second window in the first communicating party, the first operable object is from the first The two communicating parties are sent to the third communicating party. That is, the resource transmission between different servers is realized by copying or moving operations on the client, and the operation is simple.

参照图2,本发明网络通信方法的第二实施例,在本发明网络通信方法第一实施例的基础上,将第二通信方的第一可操作对象发送到第三通信方的步骤包括:Referring to FIG. 2, a second embodiment of the network communication method of the present invention, based on the first embodiment of the network communication method of the present invention, the step of transmitting the first operable object of the second communication party to the third communication party includes:

S201,当检测到将第一窗口中的第一可操作对象复制或移动到第二窗口中的指令时,第二窗口向第一窗口请求第一可操作对象的获取方式。S201. When detecting an instruction to copy or move the first operable object in the first window to the second window, the second window requests the first window to acquire the first operable object.

S202,第一窗口响应第二窗口发送的请求以读取第一可操作对象的获取方式并将第一可操作对象的获取方式发送给第二窗口。S202. The first window responds to the request sent by the second window to read the acquiring manner of the first operable object and sends the acquiring manner of the first operable object to the second window.

可以理解,第一可操作对象的获取方式包括第一可操作对象的名称、存放路径和第二通信方的访问方式。It can be understood that the manner of obtaining the first operable object includes the name of the first operable object, the storage path, and the access manner of the second communication party.

S203,第一通信方通过第二P2P穿透连接将第一可操作对象的获取方式发给第三通信方。S203. The first communication party sends the acquiring manner of the first operable object to the third communicating party by using the second P2P penetration connection.

S204,第三通信方的第三代理与第二通信方的第二代理之间建立第三P2P穿透连接。S204. A third P2P penetration connection is established between the third agent of the third communication party and the second agent of the second communication party.

S205,第三通信方通过第三P2P穿透连接向第二通信方发送获取第一可操作对象的请求。S205. The third communication party sends a request for acquiring the first operable object to the second communication party by using the third P2P penetration connection.

S206,第二通信方响应请求将第一可操作对象通过第三P2P穿透连接发送到第三通信方。S206. The second communication party sends the first operable object to the third communication party through the third P2P penetration connection in response to the request.

通过上述实施例的实施,通过在第一通信方中将第一窗口中的第一可操作对象复制或移动到第二窗口,使得作为服务端的第二通信方和第三通信方之间建立P2P穿透连接,并通过P2P穿透连接传输第一可操作对象,,操作简单且传输过程不占用第一通信方的网络资源。With the implementation of the above embodiment, the P2P is established between the second communication party and the third communication party as the server by copying or moving the first operable object in the first window to the second window in the first communication party. The connection is penetrated, and the first operable object is transmitted through the P2P penetration connection, and the operation is simple and the transmission process does not occupy the network resources of the first communication party.

参照图3,本发明网络通信方法的第三实施例,在本发明网络通信方法第二实施例的基础上,包括:Referring to FIG. 3, a third embodiment of the network communication method of the present invention, based on the second embodiment of the network communication method of the present invention, includes:

S301,第一通信方的第二应用获取第一可操作对象的获取方式并通过第二P2P穿透连接将其发给第三通信方的第三应用。S301. The second application of the first communication party acquires the acquisition manner of the first operable object and sends it to the third application of the third communication party through the second P2P penetration connection.

第三应用为服务端程序,用于提供资源以供客户端访问,第一通信方的第二应用通过第二P2P穿透连接访问第三通信方的第三应用。The third application is a server program for providing resources for client access, and the second application of the first communication party accesses the third application of the third communication party through the second P2P penetration connection.

S302,第三通信方的第三应用接收第一可操作对象的获取方式并将其发给第三通信方的第四应用。S302. The third application of the third communication party receives the acquisition manner of the first operable object and sends it to the fourth application of the third communication party.

第四应用为客户端程序,用于根据第一可操作对象的获取方式访问第二通信方并请求获取第一可操作对象。The fourth application is a client program, configured to access the second communication party according to the acquiring manner of the first operable object and request to acquire the first operable object.

S303,第三通信方的第三代理与第二通信方的第二代理之间建立第三P2P穿透连接。S303. Establish a third P2P penetration connection between the third agent of the third communication party and the second agent of the second communication party.

S304,第三通信方的第四应用通过第三P2P穿透连接,向第二通信方的第五应用发送获取第一可操作对象的请求。S304. The fourth application of the third communication party sends a request for acquiring the first operable object to the fifth application of the second communication party by using the third P2P penetration connection.

S305,第二通信方的第五应用接收第三通信方的第四应用所发送的获取请求,并响应获取请求将第一可操作对象通过第三P2P穿透连接发给第三通信方的第四应用。S305. The fifth application of the second communication party receives the acquisition request sent by the fourth application of the third communication party, and sends the first operable object to the third communication party through the third P2P penetration connection in response to the acquisition request. Four applications.

第五应用为服务端程序,用于提供资源以供客户端访问,第一通信方的第一应用通过第一P2P穿透连接访问第二通信方的第五应用。第三通信方的第四应用访问第二通信方时,第五应用也向其提供资源。The fifth application is a server program for providing resources for client access, and the first application of the first communication party accesses the fifth application of the second communication party through the first P2P penetration connection. When the fourth application of the third communication party accesses the second communication party, the fifth application also provides resources to it.

S306,第三通信方的第四应用接收并存储第一可操作对象。S306. The fourth application of the third communication party receives and stores the first operable object.

第四应用根据第一可操作对象从第一通信方的第一窗口移动或复制到第二窗口时第二窗口中显示的第三通信方的资源的存放路径来存储第一可操作对象。该存放路径是由第三应用发给第四应用的。The fourth application stores the first operable object according to a storage path of resources of the third communication party displayed in the second window when the first operable object is moved or copied from the first window of the first communication party to the second window. The storage path is sent by the third application to the fourth application.

可以理解,第三通信方的第三代理独立于第三应用及第四应用,第二通信方的第二代理独立于第五应用。由于第二通信方和第三通信方之间资源的传输不一定是单向的,第二通信方可以进一步包括一客户端程序,用于访问第三通信方并向其请求获取资源。It can be understood that the third agent of the third communicating party is independent of the third application and the fourth application, and the second agent of the second communicating party is independent of the fifth application. Since the transmission of resources between the second communication party and the third communication party is not necessarily unidirectional, the second communication party may further include a client program for accessing the third communication party and requesting acquisition of resources therefrom.

通过上述实施例的实施,作为服务端的第二通信方与作为客户端的第三通信方之间建立P2P穿透连接后,第三通信方通过客户端程序第四应用来向第二通信方请求获取第一可操作对象,并通过P2P穿透连接传输第一可操作对象。在第二通信方向第三通信方传输第一可操作对象的过程中,第二通信方作为服务端,第三通信方作为客户端。After the P2P penetration connection is established between the second communication party as the server and the third communication party as the client, the third communication party requests the second communication party through the fourth application of the client program. The first operable object transmits the first operable object through the P2P through connection. In the process of transmitting the first operable object by the third communication party in the second communication direction, the second communication party acts as the server and the third communication party acts as the client.

在本发明网络通信方法的一个实施例中,第三通信方的第四应用接收第一可操作对象时,进一步将接收第一可操作对象的进度通过第三应用反馈至第一通信方的第二应用,且第一通信方的第二窗口显示接收第一可操作对象的进度。In an embodiment of the network communication method of the present invention, when the fourth application of the third communication party receives the first operable object, the process of receiving the first operable object is further fed back to the first communication party by using the third application. The second application, and the second window of the first communication party displays the progress of receiving the first operable object.

可以理解,第一通信方显示接收第一可操作对象的进度可通过进度条进行显示。It can be understood that the progress of the first communication party showing that the first operable object is received can be displayed through the progress bar.

参照图4,本发明网络通信方法的第四实施例,在本发明网络通信方法第三实施例的基础上,包括:Referring to FIG. 4, a fourth embodiment of the network communication method of the present invention, based on the third embodiment of the network communication method of the present invention, includes:

S401,第三通信方的第四应用将基于第一协议的获取请求发给第三通信方的第一环回端口。S401. The fourth application of the third communication party sends the acquisition request based on the first protocol to the first loopback port of the third communication party.

S402,第三通信方的第六应用从第一环回端口获得基于第一协议的获取请求并转换为基于第二协议的获取请求,并将基于第二协议的获取请求发给第二通信方的第二代理。S402. The sixth application of the third communication party obtains the acquisition request based on the first protocol from the first loopback port and converts the request to the second protocol based acquisition request, and sends the second protocol based acquisition request to the second communication party. The second agent.

其中第三代理独立于第六应用,第六应用是一种转换程序,用于对基于不同的协议的访问数据进行相互转换。The third agent is independent of the sixth application, and the sixth application is a conversion program for mutually converting access data based on different protocols.

S403,由第三通信方的第三代理将基于第二协议的获取请求发送给第二通信方的第二代理。S403. Send, by the third agent of the third communication party, the acquisition request based on the second protocol to the second agent of the second communication party.

S404,第二通信方的第二代理接收基于第二协议的获取请求。S404. The second agent of the second communication party receives the acquisition request based on the second protocol.

S405,将来自于第二通信方的第二代理的基于第二协议的获取请求转换为基于第三协议的获取请求。S405. Convert a second protocol-based acquisition request from the second agent of the second communication party to a third protocol-based acquisition request.

S406,第二通信方的第五应用接收基于第三协议的获取请求,并响应基于第三协议的获取请求发送基于第三协议的第一可操作对象。S406. The fifth application of the second communication party receives the acquisition request based on the third protocol, and sends the first operable object based on the third protocol in response to the third protocol-based acquisition request.

其中第二代理独立于第五应用,第五应用为服务程序。The second agent is independent of the fifth application, and the fifth application is a service program.

S407,将来自于第二通信方的第五应用的基于第三协议的第一可操作对象转换为基于第二协议的第一可操作对象。S407. Convert a third protocol-based first operable object from the fifth application of the second communication party to a first operable object based on the second protocol.

S408,由第二通信方的第二代理将基于第二协议的第一可操作对象发给第三通信方的第三代理。S408. Send, by the second agent of the second communication party, the first operable object based on the second protocol to the third agent of the third communication party.

S409,第三通信方的第三代理接收基于第二协议的第一可操作对象。S409. The third agent of the third communication party receives the first operable object based on the second protocol.

S410,第三通信方的第三代理将基于第二协议的第一可操作对象发给第三通信方的第六应用。S410. The third agent of the third communication party sends the first operable object based on the second protocol to the sixth application of the third communication party.

S411,第六应用将基于第二协议的第一可操作对象转换为基于第一协议的第一可操作对象并发给第三通信方的第二环回端口。S411. The sixth application converts the first operable object based on the second protocol into a second loopback port based on the first operable object of the first protocol and sent to the third communication party.

S412,第三通信方的第四应用从第三通信方的第二环回端口接收基于第一协议的第一可操作对象。S412. The fourth application of the third communication party receives the first operable object based on the first protocol from the second loopback port of the third communication party.

可以理解,第一协议为第四应用所能识别和使用的协议,第二协议为P2P穿透连接所能支持的协议,由于P2P穿透连接不支持直接传输基于第一协议的访问数据,所以需要经过转换变成基于第二协议的访问数据,第三协议为第五应用所能识别和使用的协议,由于P2P穿透连接不支持直接传输基于第三协议的访问数据,所以需要经过转换将基于第二协议的访问数据变成基于第三协议的访问数据再发送给第五应用。It can be understood that the first protocol is a protocol that can be identified and used by the fourth application, and the second protocol is a protocol that can be supported by the P2P penetrating connection. Since the P2P penetrating connection does not support direct transmission of the access data based on the first protocol, It needs to be converted into access data based on the second protocol. The third protocol is a protocol that can be identified and used by the fifth application. Since the P2P penetration connection does not support direct transmission of access data based on the third protocol, it needs to be converted. The access data based on the second protocol becomes the access data based on the third protocol and is retransmitted to the fifth application.

可以理解,环回端口是设备上的虚拟端口,地址范围为127.0.0.1至127.255.255.254,发送给环回端口的获取请求或第一可操作对象不会通过外部网络接口。It can be understood that the loopback port is a virtual port on the device, and the address range is 127.0.0.1 to 127.255.255.254, and the acquisition request or the first operable object sent to the loopback port does not pass through the external network interface.

通过上述实施例的实施,不在同一内网的设备之间通过独立运行的代理程序建立P2P穿透连接,通过对基于不同协议的访问数据的相互转换,使得基于不同协议的网络传输服务可以在P2P穿透连接下使用。Through the implementation of the foregoing embodiment, the P2P penetration connection is not established between the devices of the same intranet through the independently running agent, and the network transmission service based on different protocols can be in the P2P by mutually converting the access data based on different protocols. Use under penetration.

本发明网络通信方法的一个实施例中,第二通信方的第二代理将第二通信方的访问方式和访问第二通信方时第三通信方使用的第一环回端口、第二环回端口绑定,并将绑定的第二通信方的访问方式和第一环回端口、第二环回端口通过管理第二通信方和第三通信方的服务器发送给第三通信方的第三代理。In an embodiment of the network communication method of the present invention, the second agent of the second communication party accesses the second communication party and the first loopback port and the second loopback used by the third communication party when accessing the second communication party The port is bound, and the bounded second communication party access mode and the first loopback port and the second loopback port are sent to the third communication party by the server managing the second communication party and the third communication party. proxy.

本发明网络通信方法的一个实施例中,第一协议为TCP协议,第二协议为UDP协议,第三协议为TCP协议。In an embodiment of the network communication method of the present invention, the first protocol is a TCP protocol, the second protocol is a UDP protocol, and the third protocol is a TCP protocol.

本发明网络通信方法的其它实施例中,第三协议还可以是DCCP协议、SCTP协议RTP协议。In other embodiments of the network communication method of the present invention, the third protocol may also be a DCCP protocol or an SCTP protocol RTP protocol.

如图5,本发明的网络通信方法的第五实施例,包括:As shown in FIG. 5, a fifth embodiment of the network communication method of the present invention includes:

S501,第一通信方的第一代理分别与第二通信方的第二代理和第三通信方的第三代理建立第一、第二P2P穿透连接。S501. The first agent of the first communication party establishes a first and a second P2P penetration connection with the second agent of the second communication party and the third agent of the third communication party, respectively.

S502,在第一通信方的显示屏中展示第一窗口和第二窗口,其中第一窗口内通过第一P2P穿透连接显示第二通信方中的第一可操作对象。S502. Display a first window and a second window in a display screen of the first communication party, wherein the first operable object in the second communication party is displayed in the first window by the first P2P penetration connection.

第一窗口为第一通信方的第一应用的显示界面,第二窗口为第一通信方的第二应用的显示界面。第一代理独立于第一应用及第二应用。第一应用及第二应用可为浏览器端或FTP客户端。第一应用用于通过第一P2P穿透连接显示第二通信方提供的资源,第二应用用于通过第二P2P穿透连接显示第三通信方提供的资源。第一通信方作为客户端同时查看两个服务端,即第二通信方和第三通信方提供的资源。The first window is a display interface of the first application of the first communication party, and the second window is a display interface of the second application of the first communication party. The first agent is independent of the first application and the second application. The first application and the second application may be a browser side or an FTP client. The first application is configured to display resources provided by the second communication party through the first P2P penetration connection, and the second application is configured to display resources provided by the third communication party through the second P2P penetration connection. The first communication party serves as a client to simultaneously view the resources provided by the two servers, that is, the second communication party and the third communication party.

S503,当检测第一窗口中的第一可操作对象复制或移动到第二窗口时,第一通信方通过第二P2P穿透连接将第一可操作对象的获取方式发送至第三通信方,以使得第三通信方根据获取方式从第二通信方获取第一可操作对象。S503, when detecting that the first operable object in the first window is copied or moved to the second window, the first communication party sends the acquiring manner of the first operable object to the third communicating party by using the second P2P through connection, So that the third communication party acquires the first operable object from the second communication party according to the acquisition manner.

可以理解,当未检测第一窗口中的第一可操作对象复制或移动到第二窗口时,第一窗口及第二窗口所显示的内容保持不变。It can be understood that when the first operable object in the first window is not detected to be copied or moved to the second window, the content displayed by the first window and the second window remains unchanged.

通过上述实施例的实施,第一通信方通过独立运行的代理程序分别与第二通信方和第三通信方建立P2P穿透连接,第一通信方作为客户端可以访问第二通信方和第三通信方两个服务端提供的资源。第一通信方的第一窗口中显示第二通信方的第一可操作对象,通过在第一通信方中将第一可操作对象复制或移动到第二窗口,将第一可操作对象从第二通信方发送到第三通信方。即通过在客户端上的复制或移动操作,实现不同服务端之间的资源传输,操作简单。Through the implementation of the foregoing embodiment, the first communication party establishes a P2P penetration connection with the second communication party and the third communication party respectively through the independently running agent, and the first communication party can access the second communication party and the third as the client. The resources provided by the two servers of the communicating party. Displaying, in a first window of the first communicating party, a first operable object of the second communicating party, by copying or moving the first operable object to the second window in the first communicating party, the first operable object is from the first The two communicating parties are sent to the third communicating party. That is, the resource transmission between different servers is realized by copying or moving operations on the client, and the operation is simple.

请参图6,本发明的网络通信方法的第六实施例,包括:Referring to FIG. 6, a sixth embodiment of the network communication method of the present invention includes:

S601,第二通信方的第二代理与第一通信方的第一代理建立第一P2P穿透连接。S601. The second agent of the second communication party establishes a first P2P penetration connection with the first agent of the first communication party.

S602,第二通信方的第一可操作对象通过第一P2P穿透连接显示于第一通信方的第一窗口内。S602. The first operable object of the second communication party is displayed in the first window of the first communication party by using the first P2P penetration connection.

S603,第二通信方的第二代理与第三通信方的第三代理建立第三P2P穿透连接。S603. The second proxy of the second communication party establishes a third P2P penetration connection with the third proxy of the third communication party.

S604,第二通信方通过第三P2P穿透连接接收第三通信方发送的获取第一可操作对象的请求。S604. The second communication party receives, by using the third P2P penetration connection, a request for acquiring the first operable object sent by the third communication party.

其中,获取第一可操作对象的请求是第三通信方根据第一可操作对象的获取方式是第一通信方检测到将第一窗口中的第一可操作对象复制或移动到第二窗口中的指令时,通过第一通信方的第一代理与第三通信方的第三代理之间的第二P2P穿透连接向第三通信方发送的。The request for acquiring the first operable object is that the third communicating party obtains, according to the acquiring manner of the first operable object, that the first communicating party detects that the first operable object in the first window is copied or moved to the second window. The instruction is sent to the third communication party through a second P2P penetration connection between the first agent of the first communication party and the third agent of the third communication party.

S605,第二通信方响应请求通过第三P2P穿透连接将第一可操作对象发送到第三通信方。S605. The second communication party sends the first operable object to the third communication party through the third P2P penetration connection in response to the request.

通过上述实施例的实施,第二通信方通过独立运行的代理程序分别与第一通信方和第三通信方建立P2P穿透连接,第一通信方作为客户端可以访问第二通信方和第三通信方两个服务端提供的资源。第二通信方的第一可操作对象可显示于第一通信方的第一窗口中,通过在第一通信方中将第一可操作对象复制或移动到第二窗口,将第一可操作对象从第二通信方发送到第三通信方。即通过在客户端上的复制或移动操作,实现不同服务端之间的资源传输,操作简单。Through the implementation of the foregoing embodiment, the second communication party establishes a P2P penetration connection with the first communication party and the third communication party respectively through the independently running agent, and the first communication party can access the second communication party and the third as the client. The resources provided by the two servers of the communicating party. The first operable object of the second communicating party may be displayed in the first window of the first communicating party, and the first operable object is copied or moved to the second window in the first communicating party Transmitted from the second communicating party to the third communicating party. That is, the resource transmission between different servers is realized by copying or moving operations on the client, and the operation is simple.

请参图7,本发明网络通信方法的第七实施例,包括:Referring to FIG. 7, a seventh embodiment of the network communication method of the present invention includes:

S701,第三通信方的第三代理与第一通信方的第一代理建立第二P2P穿透连接。S701. The third agent of the third communication party establishes a second P2P penetration connection with the first agent of the first communication party.

S702,第三通信方通过第二P2P穿透连接获取第一可操作对象的获取方式。 S702. The third communication party obtains an acquisition manner of the first operable object by using the second P2P penetration connection.

其中第一可操作对象的获取方式是第一通信方检测到将第一窗口中的第一可操作对象复制或移动到第二窗口中的指令时,通过第二P2P穿透连接向第三通信方发送的,第一窗口内通过第一通信方的第一代理与第二通信方的第二代理之间的第一P2P穿透连接显示第二通信方中的第一可操作对象。The first operable object is obtained by the first communication party detecting the copying or moving the first operable object in the first window to the second window, and connecting to the third communication through the second P2P through the connection The first P2P penetration connection between the first agent of the first communication party and the second agent of the second communication party in the first window is displayed by the party, and the first operable object in the second communication party is displayed.

S703,第三通信方的第三代理与第二通信方的第二代理建立第三P2P穿透连接。S703. The third agent of the third communication party establishes a third P2P penetration connection with the second agent of the second communication party.

S704,第三通信方的第三代理通过第三P2P穿透连接向第二通信方的第二代理发送获取第一可操作对象的请求。S704. The third agent of the third communication party sends a request for acquiring the first operable object to the second agent of the second communication party by using the third P2P penetration connection.

S705,第三通信方接收第二通信方响应获取第一可操作对象的请求发送的第一可操作对象。S705. The third communication party receives the first operable object sent by the second communication party in response to the request for acquiring the first operable object.

通过上述实施例的实施,第三通信方通过独立运行的代理程序分别与第一通信方和第二通信方建立P2P穿透连接,第一通信方作为客户端可以访问第二通信方和第三通信方两个服务端提供的资源。第一通信方的第一窗口中显示第二通信方的第一可操作对象,通过在第一通信方中将第一可操作对象复制或移动到第二窗口,将第一可操作对象从第二通信方发送到第三通信方。即通过在客户端上的复制或移动操作,实现不同服务端之间的资源传输,操作简单。Through the implementation of the foregoing embodiment, the third communication party establishes a P2P penetration connection with the first communication party and the second communication party respectively by the independently running agent, and the first communication party can access the second communication party and the third as the client. The resources provided by the two servers of the communicating party. Displaying, in a first window of the first communicating party, a first operable object of the second communicating party, by copying or moving the first operable object to the second window in the first communicating party, the first operable object is from the first The two communicating parties are sent to the third communicating party. That is, the resource transmission between different servers is realized by copying or moving operations on the client, and the operation is simple.

请参图8,本发明的设备的第一实施例,包括处理器及网络通信电路,处理器与网络通信电路连接;Referring to FIG. 8, a first embodiment of the device of the present invention includes a processor and a network communication circuit, and the processor is connected to a network communication circuit;

处理器用于运行第一代理11,以通过网络通信电路分别与第二通信方的第二代理和第三通信方的第三代理建立第一、第二P2P穿透连接;The processor is configured to run the first proxy 11 to establish first and second P2P penetration connections with the second proxy of the second communication party and the third proxy of the third communication party respectively through the network communication circuit;

处理器还用于运行第一窗口12,以通过第一P2P穿透连接显示第二通信方中的第一可操作对象。可以理解,第一可操作对象以图示15的方式显示于第一窗口12内。The processor is further configured to run the first window 12 to display the first operable object of the second communication party through the first P2P penetration connection. It will be appreciated that the first operable object is displayed within the first window 12 in the manner of FIG.

处理器还用于运行第二窗口13,以当检测到第一窗口12中的第一可操作对象复制或移动到第二窗口13中的指令,以将第一可操作对象的获取方式通过第二P2P穿透连接发送至第三通信方,以使得第三通信方根据获取方式从第二通信方获取第一可操作对象。The processor is further configured to run the second window 13 to detect when the first operable object in the first window 12 is copied or moved to the instruction in the second window 13 to pass the first operable object through the first The two P2P penetration connection is sent to the third communication party, so that the third communication party acquires the first operable object from the second communication party according to the acquisition manner.

可以理解,第一窗口12为第一应用(未图示)的显示界面,第二窗口13为第二应用(未图示)的显示界面。第一代理独立于第一应用及第二应用。第一应用及第二应用可为浏览器端或FTP客户端。第一应用用于通过第一P2P穿透连接显示第二通信方提供的资源,第二应用用于通过第二P2P穿透连接显示第三通信方提供的资源。本设备作为客户端同时查看两个服务端,即第二通信方和第三通信方提供的资源。It can be understood that the first window 12 is a display interface of a first application (not shown), and the second window 13 is a display interface of a second application (not shown). The first agent is independent of the first application and the second application. The first application and the second application may be a browser side or an FTP client. The first application is configured to display resources provided by the second communication party through the first P2P penetration connection, and the second application is configured to display resources provided by the third communication party through the second P2P penetration connection. The device as a client simultaneously views the two servers, that is, the resources provided by the second communication party and the third communication party.

其中第一代理11独立于第一应用和第二应用。The first agent 11 is independent of the first application and the second application.

通过上述实施例的实施,本设备通过独立运行的代理程序分别与第二通信方和第三通信方建立P2P穿透连接,并作为客户端同时访问第二通信方和第三通信方两个服务端提供的资源。第一窗口中显示第二通信方的第一可操作对象,通过将第一可操作对象复制或移动到第二窗口的操作,将第一可操作对象从第二通信方发送到第三通信方。即通过在作为客户端的本设备上的复制或移动操作,实现不同服务端之间的资源传输,操作简单。Through the implementation of the foregoing embodiment, the device establishes a P2P penetration connection with the second communication party and the third communication party respectively through the independently running agent, and simultaneously accesses the second communication party and the third communication party as the client. Resources provided by the end. Displaying a first operable object of the second communicating party in the first window, and transmitting the first operable object from the second communicating party to the third communicating party by copying or moving the first operable object to the second window . That is, the resource transmission between different server ends is realized by copying or moving operations on the device as a client, and the operation is simple.

请参图9,本发明的设备的第二实施例,包括:处理器及网络通信电路,处理器与网络通信电路连接。Referring to FIG. 9, a second embodiment of the device of the present invention includes a processor and a network communication circuit, and the processor is connected to a network communication circuit.

处理器用于运行第二代理21,以通过网络通信电路与第一通信方的第一代理之间建立第一P2P穿透连接。The processor is configured to run the second agent 21 to establish a first P2P through connection between the first communication agent and the first agent of the first communication party.

处理器还用于运行第五应用22,以通过第一P2P穿透连接将第一可操作对象显示于第一通信方的第一窗口内,并通过网络通信电路接收第三通信方发送的获取第一可操作对象的请求,并响应请求将第一可操作对象通过网络通信电路发送至第三通信方,其中获取第一可操作对象的请求是第三通信方根据第一可操作对象的获取方式向第五应用22发送的,第一可操作对象的获取方式是第一通信方检测到将第一窗口中的第一可操作对象复制或移动到第二窗口中的指令时,通过第一通信方的第一代理与第三通信方的第三代理之间的第二P2P穿透连接向第三通信方发送的。The processor is further configured to run the fifth application 22 to display the first operable object in the first window of the first communication party through the first P2P penetration connection, and receive the acquisition sent by the third communication party through the network communication circuit a first operable object request, and transmitting the first operable object to the third communication party through the network communication circuit in response to the request, wherein the request to acquire the first operable object is the third communication party acquiring according to the first operable object The manner of obtaining the first operable object sent by the first application 22 is when the first communication party detects an instruction to copy or move the first operable object in the first window to the second window, by using the first A second P2P penetration connection between the first agent of the communicating party and the third agent of the third communicating party is sent to the third communicating party.

其中第二代理21独立于第五应用22。The second agent 21 is independent of the fifth application 22.

通过上述实施例的实施,本设备通过独立运行的代理程序与第一通信方建立P2P穿透连接,并作为服务端向第一通信方提供资源。第一通信方的第一窗口中显示本设备的第一可操作对象,通过在第一通信方将第一可操作对象复制或移动到第二窗口的操作,本设备将第一可操作对象发送到第三通信方。即通过在客户端上的复制或移动操作,实现不同服务端之间的资源传输,操作简单。Through the implementation of the foregoing embodiment, the device establishes a P2P penetration connection with the first communication party through the independently running agent, and provides resources to the first communication party as a server. The first operable object of the first communication party displays the first operable object of the device, and the device sends the first operable object by the operation of copying or moving the first operable object to the second window by the first communication party. To the third party. That is, the resource transmission between different servers is realized by copying or moving operations on the client, and the operation is simple.

请参图10,本发明的设备的第三实施例,包括:处理器及网络通信电路,处理器与网络通信电路连接。Referring to FIG. 10, a third embodiment of the device of the present invention includes a processor and a network communication circuit, and the processor is connected to the network communication circuit.

处理器用于运行第三代理31,以通过通信网络电路与第一通信方的第一代理之间建立第二P2P穿透连接。The processor is operative to run the third agent 31 to establish a second P2P through connection between the communication network circuit and the first agent of the first correspondent.

处理器还用于运行第三应用32,以通过第二P2P穿透连接接收第一通信方发送的第一可操作对象的获取方式,其中第一可操作对象的获取方式是第一通信方检测到将第一窗口中的第一可操作对象复制或移动到第二窗口中的指令时,通过第二P2P穿透连接向第三通信方发送的,第一窗口内通过第一通信方的第一代理与第二通信方的第二代理之间的第一P2P穿透连接显示第二通信方中的第一可操作对象。The processor is further configured to run the third application 32, to receive, by the second P2P penetration connection, an acquisition manner of the first operable object sent by the first communication party, where the first operable object is acquired by the first communication party. When the first operable object in the first window is copied or moved to the instruction in the second window, the second P2P through the connection is sent to the third communication party, and the first window passes through the first communication party. A first P2P penetration connection between an agent and a second agent of the second communication party displays the first operable object of the second communication party.

处理器还用于运行第四应用33,以从第三应用32接收第一可操作对象的获取方式,并根据获取方式通过网络通信电路向第二通信方发送获取第一可操作对象的请求,并通过网络通信电路接收第二通信方响应请求发送的第一可操作对象。The processor is further configured to run the fourth application 33 to receive the acquisition manner of the first operable object from the third application 32, and send a request for acquiring the first operable object to the second communication party through the network communication circuit according to the obtaining manner, And receiving, by the network communication circuit, the first operable object sent by the second communication party in response to the request.

其中第三代理31独立于第三应用32及第四应用33。The third agent 31 is independent of the third application 32 and the fourth application 33.

通过上述实施例的实施,本设备通过独立运行的代理程序与第一通信方建立P2P穿透连接,并作为服务端向第一通信方提供资源。通过在第一通信方将第一可操作对象复制或移动到第二窗口的操作,本设备从第一通信方接收第一可操作对象的获取方式并据此向第二通信方请求获取第一可操作对象。即通过在客户端上的复制或移动操作,实现不同服务端之间的资源传输,操作简单。Through the implementation of the foregoing embodiment, the device establishes a P2P penetration connection with the first communication party through the independently running agent, and provides resources to the first communication party as a server. The device receives the acquisition manner of the first operable object from the first communication party by requesting the first communication party to copy or move the first operable object to the second window, and requests the second communication party to obtain the first Operable objects. That is, the resource transmission between different servers is realized by copying or moving operations on the client, and the operation is simple.

以上所述仅为本发明的实施方式,并非因此限制本发明的专利范围,凡是利用本发明说明书及附图内容所作的等效结构或等效流程变换,或直接或间接运用在其他相关的技术领域,均同理包括在本发明的专利保护范围内。The above is only the embodiment of the present invention, and is not intended to limit the scope of the invention, and the equivalent structure or equivalent process transformations made by the description of the invention and the drawings are directly or indirectly applied to other related technologies. The fields are all included in the scope of patent protection of the present invention.

Claims (15)

一种网络通信方法,其中,包括:A network communication method, including: 第一通信方的第一代理分别与第二通信方的第二代理和第三通信方的第三代理建立第一、第二P2P穿透连接;The first agent of the first communication party establishes a first and second P2P penetration connection with the second agent of the second communication party and the third agent of the third communication party, respectively; 在所述第一通信方的显示屏中展示第一窗口和第二窗口,其中所述第一窗口内通过所述第一P2P穿透连接显示所述第二通信方中的第一可操作对象;Displaying a first window and a second window in a display screen of the first communication party, wherein the first operable object in the second communication party is displayed by the first P2P penetration connection in the first window ; 当检测到将所述第一窗口中的所述第一可操作对象复制或移动到所述第二窗口中的指令时,将所述第二通信方的第一可操作对象发送到所述第三通信方。Sending a first operable object of the second communicating party to the first when detecting an instruction to copy or move the first operable object in the first window into the second window Three communication parties. 根据权利要求1所述的方法,其中,The method of claim 1 wherein 所述将所述第二通信方的第一可操作对象发送到所述第三通信方包括:The sending the first operable object of the second communication party to the third communication party includes: 通过所述第二P2P穿透连接将所述第一可操作对象的获取方式发给所述第三通信方,以使得所述第三通信方的第三代理与所述第二通信方的第二代理之间建立第三P2P穿透连接,并且将所述第二通信方的第一可操作对象通过所述第三P2P穿透连接发送到所述第三通信方。Transmitting the acquisition manner of the first operable object to the third communication party by using the second P2P penetration connection, so that the third proxy of the third communication party and the second communication party A third P2P penetration connection is established between the two agents, and the first operable object of the second communication party is sent to the third communication party through the third P2P penetration connection. 根据权利要求2所述的方法,其中,The method of claim 2, wherein 所述第一窗口为所述第一通信方的第一应用的显示界面,所述第二窗口为所述第一通信方的第二应用的显示界面;The first window is a display interface of the first application of the first communication party, and the second window is a display interface of the second application of the first communication party; 所述通过所述第二P2P穿透连接将所述第一可操作对象的获取方式发给所述第三通信方的步骤包括:The step of sending the acquiring manner of the first operable object to the third communicating party by using the second P2P penetration connection includes: 所述第一通信方的第二应用获取所述第一可操作对象的获取方式并通过所述第二P2P穿透连接将其发给所述第三通信方的第三应用,所述第三通信方的第三应用接收所述第一可操作对象的获取方式并将其发给所述第三通信方的第四应用;Obtaining, by the second application of the first communication party, the acquiring manner of the first operable object, and sending the third operable object to the third application of the third communication party by using the second P2P penetration connection, the third The third application of the communication party receives the acquisition manner of the first operable object and sends it to the fourth application of the third communication party; 所述将所述第二通信方的第一可操作对象通过所述第三P2P穿透连接发送到所述第三通信方的步骤包括:The step of transmitting the first operable object of the second communication party to the third communication party through the third P2P penetration connection comprises: 所述第三通信方的第四应用通过所述第三P2P穿透连接,向所述第二通信方的第五应用发送获取所述第一可操作对象的请求;The fourth application of the third communication party sends a request for acquiring the first operable object to the fifth application of the second communication party by using the third P2P penetration connection; 所述第二通信方的第五应用接收所述第三通信方的第四应用所发送的获取请求,并响应所述获取请求将所述第一可操作对象通过所述第三P2P穿透连接发给所述第三通信方的第四应用;The fifth application of the second communication party receives the acquisition request sent by the fourth application of the third communication party, and connects the first operable object through the third P2P through the connection request a fourth application sent to the third communication party; 所述第三通信方的第四应用接收并存储所述第一可操作对象。The fourth application of the third communication party receives and stores the first operable object. 根据权利要求3所述的方法,其中,The method of claim 3, wherein 所述第三通信方的第四应用通过所述第三P2P穿透连接向所述第二通信方的第五应用发送获取所述第一可操作对象的请求的步骤包括:The step of the fourth application of the third communication party sending a request for acquiring the first operable object to the fifth application of the second communication party by using the third P2P penetration connection comprises: 将来自于所述第三通信方的第四应用的基于第一协议的获取请求转换为基于第二协议的获取请求;Transmitting a first protocol-based acquisition request from the fourth application of the third communication party to an acquisition request based on the second protocol; 由所述第三通信方的第三代理将所述基于第二协议的获取请求发送给所述第二通信方的第二代理;Sending, by the third agent of the third communication party, the second protocol based acquisition request to the second agent of the second communication party; 所述第二通信方的第五应用接收所述第三通信方的第四应用所发送的获取请求,并响应所述获取请求将所述第一可操作对象通过所述第三P2P穿透连接发给所述第三通信方的第四应用的步骤包括:The fifth application of the second communication party receives the acquisition request sent by the fourth application of the third communication party, and connects the first operable object through the third P2P through the connection request The step of sending the fourth application to the third communication party includes: 所述第二通信方的第二代理接收所述基于第二协议的获取请求;Receiving, by the second agent of the second communication party, the acquisition request based on the second protocol; 将来自于所述第二通信方的第二代理的基于第二协议的获取请求转换为基于第三协议的获取请求;Transmitting a second protocol-based acquisition request from the second agent of the second communication party to a third protocol-based acquisition request; 所述第二通信方的第五应用接收所述基于第三协议的获取请求,并响应所述基于第三协议的获取请求发送基于第三协议的所述第一可操作对象;The fifth application of the second communication party receives the third protocol-based acquisition request, and sends the first operable object based on the third protocol in response to the third protocol-based acquisition request; 将来自于所述第二通信方的第五应用的所述基于第三协议的所述第一可操作对象转换为基于第二协议的所述第一可操作对象;Converting the first operable object based on the third protocol from the fifth application of the second communicating party to the first operable object based on the second protocol; 由所述第二通信方的第二代理将所述基于第二协议的所述第一可操作对象发给所述第三通信方的第三代理;Sending, by the second agent of the second communication party, the first operable object based on the second protocol to a third agent of the third communication party; 所述第三通信方的第三代理接收所述基于第二协议的所述第一可操作对象;The third agent of the third communication party receives the first operable object based on the second protocol; 将来自于所述第三通信方的第三代理的所述基于第二协议的所述第一可操作对象转换为基于第一协议的所述第一可操作对象;Converting the first operable object based on the second protocol from the third agent of the third communicating party to the first operable object based on the first protocol; 所述第三通信方的第四应用接收所述基于第一协议的所述第一可操作对象。The fourth application of the third communication party receives the first operable object based on the first protocol. 根据权利要求4所述的方法,其中,The method of claim 4, wherein 将来自于所述第三通信方的第四应用的基于第一协议的获取请求转换为基于第二协议的获取请求的步骤包括:The step of converting the first protocol-based acquisition request of the fourth application from the third communication party to the acquisition request based on the second protocol includes: 所述第三通信方的第四应用将所述基于第一协议的获取请求发给所述第三通信方的第一环回端口;The fourth application of the third communication party sends the first protocol-based acquisition request to the first loopback port of the third communication party; 所述第三通信方的第六应用从所述第一环回端口获得所述基于第一协议的获取请求并转换为所述基于第二协议的获取请求,并将所述基于第二协议的获取请求发给所述第二通信方的第二代理;The sixth application of the third communication party obtains the first protocol-based acquisition request from the first loopback port and converts to the second protocol-based acquisition request, and the second protocol-based acquisition request Obtaining a second proxy requesting to be sent to the second correspondent party; 所述将来自于所述第三通信方的第三代理的基于第二协议的所述第一可操作对象转换为基于第一协议的所述第一可操作对象的步骤包括:The step of converting the first operable object based on the second protocol from the third agent of the third communicating party to the first operable object based on the first protocol comprises: 所述第三通信方的第三代理将所述基于第二协议的所述第一可操作对象发给所述第三通信方的第六应用,所述第六应用将所述基于第二协议的所述第一可操作对象转换为所述基于第一协议的所述第一可操作对象并发给所述第三通信方的第二环回端口;The third agent of the third communication party sends the first operable object based on the second protocol to the sixth application of the third communication party, and the sixth application applies the second protocol based Translating the first operable object into the second loopback port of the third communicator based on the first operable object of the first protocol; 所述第三通信方的第四应用接收所述基于第一协议的所述第一可操作对象的步骤包括:The step of receiving, by the fourth application of the third communication party, the first operable object based on the first protocol comprises: 所述第三通信方的第四应用从所述第三通信方的第二环回端口接收所述基于第一协议的所述第一可操作对象。The fourth application of the third communication party receives the first operable object based on the first protocol from a second loopback port of the third communication party. 根据权利要求5所述的方法,其中,The method of claim 5, wherein 所述第二通信方的第二代理将所述第二通信方的访问方式和访问所述第二通信方时所述第三通信方使用的第一环回端口、第二环回端口绑定,并将所述绑定的所述第二通信方的访问方式和所述第一环回端口、所述第二环回端口通过管理所述第二通信方和所述第三通信方的服务器发送给所述第三通信方的第三代理。The second agent of the second communication party binds the access mode of the second communication party to the first loopback port and the second loopback port used by the third communication party when accessing the second communication party And the access mode of the bound second communication party and the first loopback port and the second loopback port are used to manage the server of the second communication party and the third communication party A third agent sent to the third communicating party. 如权利要求5所述的方法,其中,The method of claim 5, wherein 所述第一协议为TCP协议,所述第二协议为UDP协议,所述第三协议为TCP协议。The first protocol is a TCP protocol, the second protocol is a UDP protocol, and the third protocol is a TCP protocol. 根据权利要求3所述的方法,其中,The method of claim 3, wherein 所述第三通信方的第四应用接收所述第一可操作对象时,进一步将接收所述第一可操作对象的进度通过第三应用反馈至第一通信方的第二应用。When the fourth application of the third communication party receives the first operable object, the progress of receiving the first operable object is further fed back to the second application of the first communication party by using the third application. 根据权利要求2所述的方法,其中,The method of claim 2, wherein 当检测到将所述第一窗口中的所述第一可操作对象复制或移动到所述第二窗口中的指令时,所述第二窗口向第一窗口请求所述第一可操作对象的获取方式,以触发所述第一窗口响应所述第二窗口发送的请求读取所述第一可操作对象的获取方式并将所述第一可操作对象的获取方式发送给所述第二窗口。The second window requests the first window to request the first operable object when an instruction to copy or move the first operable object in the first window into the second window is detected Obtaining a method for triggering the first window to read the first operable object in response to the request sent by the second window, and sending the first operable object to the second window . 一种通信方法,其中,包括:A communication method, including: 第一通信方的第一代理分别与第二通信方的第二代理和第三通信方的第三代理建立第一、第二P2P穿透连接;The first agent of the first communication party establishes a first and second P2P penetration connection with the second agent of the second communication party and the third agent of the third communication party, respectively; 在所述第一通信方的显示屏中展示第一窗口和第二窗口,其中所述第一窗口内通过所述第一P2P穿透连接显示所述第二通信方中的第一可操作对象;Displaying a first window and a second window in a display screen of the first communication party, wherein the first operable object in the second communication party is displayed by the first P2P penetration connection in the first window ; 当检测到将所述第一窗口中的所述第一可操作对象复制或移动到所述第二窗口中的指令时,所述第一通信方通过第二P2P穿透连接将所述第一可操作对象的获取方式发送至所述第三通信方,以使得所述第三通信方根据所述获取方式从所述第二通信方获取所述第一可操作对象。When detecting an instruction to copy or move the first operable object in the first window into the second window, the first communication party will connect the first through a second P2P through connection The obtaining manner of the operable object is sent to the third communicating party, so that the third communicating party acquires the first operable object from the second communicating party according to the acquiring manner. 一种通信方法,其中,包括:A communication method, including: 第二通信方的第二代理与第一通信方的第一代理建立第一P2P穿透连接;The second agent of the second communication party establishes a first P2P penetration connection with the first agent of the first communication party; 所述第二通信方的第一可操作对象通过所述第一P2P穿透连接显示于所述第一通信方的第一窗口内;The first operable object of the second communication party is displayed in the first window of the first communication party through the first P2P penetration connection; 当所述第二通信方接收到所述第三通信方发送的获取所述第一可操作对象的请求时,所述第二通信方向所述第三通信方发送所述第一可操作对象,其中所述获取所述第一可操作对象的请求是所述第三通信方根据所述第一可操作对象的获取方式向所述第二通信方发送的,所述第一可操作对象的获取方式是所述第一通信方检测到将所述第一窗口中的第一可操作对象复制或移动到第二窗口中的指令时,通过所述第一通信方的第一代理与所述第三通信方的第三代理之间的第二P2P穿透连接向所述第三通信方发送的。When the second communication party receives the request for acquiring the first operable object sent by the third communication party, the second communication direction sends the first operable object to the third communication party, The request for acquiring the first operable object is sent by the third communication party to the second communication party according to the acquiring manner of the first operable object, and the acquiring of the first operable object The first proxy and the first communication party are configured by the first communication party when the first communication party detects an instruction to copy or move the first operable object in the first window into the second window. A second P2P penetration connection between the third agents of the three communicating parties is sent to the third communicating party. 一种通信方法,其中,包括:A communication method, including: 第三通信方的第三代理与第一通信方的第一代理建立第二P2P穿透连接;The third agent of the third communication party establishes a second P2P penetration connection with the first agent of the first communication party; 所述第三通信方通过第二P2P穿透连接接收第一可操作对象的获取方式,并根据所述获取方式向所述第二通信方发送获取所述第一可操作对象的请求,其中所述第一可操作对象的获取方式是所述第一通信方检测到将第一窗口中的所述第一可操作对象复制或移动到第二窗口中的指令时,通过所述第二P2P穿透连接向所述第三通信方发送的,所述第一窗口内通过所述第一通信方的第一代理与所述第二通信方的第二代理之间的第一P2P穿透连接显示所述第二通信方中的所述第一可操作对象;The third communication party receives the acquisition manner of the first operable object by using the second P2P penetration connection, and sends a request for acquiring the first operable object to the second communication party according to the obtaining manner, where The obtaining manner of the first operable object is when the first communication party detects an instruction to copy or move the first operable object in the first window into the second window, and wears through the second P2P Transmitting to the third communication party, the first P2P penetration connection between the first agent of the first communication party and the second agent of the second communication party is displayed in the first window The first operable object in the second communication party; 所述第三通信方接收所述第二通信方响应所述获取所述第一可操作对象的请求发送的第一可操作对象。The third communication party receives the first operable object sent by the second communication party in response to the request to acquire the first operable object. 一种设备,其中,包括:A device comprising: 处理器及网络通信电路,所述处理器与所述网络通信电路连接;a processor and a network communication circuit, wherein the processor is connected to the network communication circuit; 所述处理器用于运行第一代理,以通过所述网络通信电路分别与第二通信方的第二代理和第三通信方的第三代理建立第一、第二P2P穿透连接;The processor is configured to run a first proxy to establish a first and a second P2P penetration connection with the second proxy of the second communication party and the third proxy of the third communication party by the network communication circuit, respectively; 所述处理器还用于运行第一窗口,以通过所述第一P2P穿透连接显示所述第二通信方中的第一可操作对象;The processor is further configured to run a first window to display the first operable object of the second communication party by using the first P2P penetration connection; 所述处理器还用于运行第二窗口,以当检测到所述第一窗口中的所述第一可操作对象复制或移动到所述第二窗口中的指令时,将所述第一可操作对象的获取方式通过所述第二P2P穿透连接发送至所述第三通信方。The processor is further configured to run a second window to: when the first operable object in the first window is detected to be copied or moved to an instruction in the second window, the first The manner of acquiring the operation object is sent to the third communication party through the second P2P penetration connection. 一种设备,其中,包括:A device comprising: 处理器及网络通信电路,所述处理器与所述网络通信电路连接;a processor and a network communication circuit, wherein the processor is connected to the network communication circuit; 所述处理器用于运行第二代理,以通过所述网络通信电路与第一通信方的第一代理建立第一P2P穿透连接;The processor is configured to run a second proxy to establish a first P2P penetration connection with the first agent of the first communication party by using the network communication circuit; 所述处理器还用于运行第五应用,以通过第一P2P穿透连接将第一可操作对象显示于第一通信方的第一窗口内,并通过所述网络通信电路接收第三通信方发送的获取所述第一可操作对象的请求,并响应所述请求通过所述网络通信电路将所述第一可操作对象发送至所述第三通信方,其中所述获取所述第一可操作对象的请求是所述第三通信方根据所述第一可操作对象的获取方式向所述第五应用发送的,所述第一可操作对象的获取方式是所述第一通信方检测到将所述第一窗口中的第一可操作对象复制或移动到第二窗口中的指令时,通过所述第一通信方的第一代理与所述第三通信方的第三代理之间的第二P2P穿透连接向所述第三通信方发送的;The processor is further configured to run a fifth application to display the first operable object in the first window of the first communication party through the first P2P penetration connection, and receive the third communication party through the network communication circuit Transmitting a request to acquire the first operable object, and transmitting, by the network communication circuit, the first operable object to the third communication party in response to the request, wherein the acquiring the first The request of the operation object is sent by the third communication party to the fifth application according to the acquisition manner of the first operable object, and the acquiring manner of the first operable object is that the first communication party detects When copying or moving the first operable object in the first window to an instruction in the second window, between the first agent of the first communication party and the third agent of the third communication party Transmitting, by the second P2P, the third communication party; 其中,所述第二代理独立于所述第五应用。The second agent is independent of the fifth application. 一种设备,其中,包括:A device comprising: 处理器及网络通信电路,所述处理器与所述网络通信电路连接;a processor and a network communication circuit, wherein the processor is connected to the network communication circuit; 所述处理器用于运行第三代理,以通过所述通信网络电路与第一通信方的第一代理建立第二P2P穿透连接;The processor is configured to run a third proxy to establish a second P2P penetration connection with the first agent of the first communication party through the communication network circuit; 所述处理器还用于运行第三应用,以通过第二P2P穿透连接接收第一通信方发送的第一可操作对象的获取方式,其中所述第一可操作对象的获取方式是所述第一通信方检测到将第一窗口中的所述第一可操作对象复制或移动到第二窗口中的指令时,通过所述第二P2P穿透连接向所述第三通信方发送的,所述第一窗口内通过所述第一通信方的第一代理与所述第二通信方的第二代理之间的第一P2P穿透连接显示所述第二通信方中的所述第一可操作对象;The processor is further configured to run a third application, to receive, by using the second P2P penetration connection, an acquisition manner of the first operable object sent by the first communication party, where the acquiring manner of the first operable object is the When the first communication party detects an instruction to copy or move the first operable object in the first window to the second window, and sends the second P2P through the second P2P through the connection, Displaying the first one of the second communication parties by the first P2P penetration connection between the first agent of the first communication party and the second agent of the second communication party in the first window Operational object 所述处理器还用于运行第四应用,以从所述第三应用接收所述第一可操作对象的获取方式,根据所述获取方式通过所述网络通信电路向第二通信方发送获取所述第一可操作对象的请求,并通过所述网络通信电路接收所述第二通信方响应所述请求发送的第一可操作对象;The processor is further configured to run a fourth application, to receive an acquisition manner of the first operable object from the third application, and send, by using the network communication circuit, an acquisition location to the second communication party according to the acquiring manner Determining, by the network communication circuit, a first operable object that is sent by the second communication party in response to the request; 其中所述第三代理独立于所述第三应用及第四应用。The third agent is independent of the third application and the fourth application.
PCT/CN2016/081483 2015-09-30 2016-05-10 A method and device for network communications WO2017054456A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510638648.6 2015-09-30
CN201510638648.6A CN105227659B (en) 2015-09-30 2015-09-30 A kind of network communication method and equipment

Publications (1)

Publication Number Publication Date
WO2017054456A1 true WO2017054456A1 (en) 2017-04-06

Family

ID=54996329

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/081483 WO2017054456A1 (en) 2015-09-30 2016-05-10 A method and device for network communications

Country Status (2)

Country Link
CN (1) CN105227659B (en)
WO (1) WO2017054456A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105227659B (en) * 2015-09-30 2018-12-28 深圳市先河系统技术有限公司 A kind of network communication method and equipment

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7325251B1 (en) * 2003-12-16 2008-01-29 Symantec Corporation Method and system to prevent peer-to-peer (P2P) worms
CN101150465A (en) * 2006-09-22 2008-03-26 腾讯科技(深圳)有限公司 A method for obtaining seed information and supernode and common nodes in P2P network
CN103024082A (en) * 2013-01-04 2013-04-03 福建星网视易信息系统有限公司 Point-to-point communication method used for digital media distribution
CN103873515A (en) * 2012-12-13 2014-06-18 联想(北京)有限公司 Infor Information processing method, electronic device and movable electronic device
CN104426895A (en) * 2013-09-09 2015-03-18 联想(北京)有限公司 Information processing method and terminal equipment
CN105227659A (en) * 2015-09-30 2016-01-06 深圳市先河系统技术有限公司 A kind of network communication method and equipment

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100810759B1 (en) * 2006-02-17 2008-03-07 엔에이치엔(주) P2P file transfer system and method
CN101937310B (en) * 2010-09-06 2014-07-16 宇龙计算机通信科技(深圳)有限公司 File copying method and terminal
CN102858025A (en) * 2011-06-29 2013-01-02 北京三星通信技术研究有限公司 Method and device of point-to-point interactive operation
CN103294474A (en) * 2013-05-31 2013-09-11 北京奇虎科技有限公司 Browser operation synchronizing method and device for performing browser operation synchronization
CN104010001B (en) * 2014-06-17 2015-11-11 合一网络技术(北京)有限公司 In mobile terminal, the method and system connecting communication is carried out in similar networking request

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7325251B1 (en) * 2003-12-16 2008-01-29 Symantec Corporation Method and system to prevent peer-to-peer (P2P) worms
CN101150465A (en) * 2006-09-22 2008-03-26 腾讯科技(深圳)有限公司 A method for obtaining seed information and supernode and common nodes in P2P network
CN103873515A (en) * 2012-12-13 2014-06-18 联想(北京)有限公司 Infor Information processing method, electronic device and movable electronic device
CN103024082A (en) * 2013-01-04 2013-04-03 福建星网视易信息系统有限公司 Point-to-point communication method used for digital media distribution
CN104426895A (en) * 2013-09-09 2015-03-18 联想(北京)有限公司 Information processing method and terminal equipment
CN105227659A (en) * 2015-09-30 2016-01-06 深圳市先河系统技术有限公司 A kind of network communication method and equipment

Also Published As

Publication number Publication date
CN105227659A (en) 2016-01-06
CN105227659B (en) 2018-12-28

Similar Documents

Publication Publication Date Title
WO2018076841A1 (en) Data sharing method, apparatus, storage medium and server
WO2014010992A1 (en) Communication method between content requester and content provider for providing content and real-time streaming content in content name-based content centric network
WO2020125251A1 (en) Federated learning-based model parameter training method, device, apparatus, and medium
WO2014051367A1 (en) User terminal apparatus, electronic device, and method for controlling the same
WO2012124985A2 (en) Method and apparatus for synchronizing personal inforamtion
WO2018076889A1 (en) Data backup method, device, system, storage medium and server
WO2017054443A1 (en) Remote control method, server and network attached storage
WO2014189325A1 (en) Apparatus and method for controlling transparent tunnel mode operation in communication system supporting wireless docking protocol
WO2017054446A1 (en) Network communication method, device, and network attached storage device
WO2014168335A1 (en) Method and apparatus for calculating distance in contents delivery network
WO2018076873A1 (en) Data sharing method, apparatus, medium, electronic device and system
WO2014077458A1 (en) Method for distinguishing type of communication network and method for providing content using same
WO2016021773A1 (en) Qos guaranteed video stream method and system, and transmission server
WO2019223600A1 (en) Bluetooth audio transmission method, device, and computer readable storage medium
WO2017185647A1 (en) Softsim-based imsi number management and calling methods, server and network side device
WO2022102949A1 (en) Edge setup server, edge enable server, and operation method therefor
WO2015093640A1 (en) User terminal device and method for providing interaction service therefor
WO2017054456A1 (en) A method and device for network communications
WO2017113976A1 (en) Wireless local area network communication method, terminal, and system
WO2014186936A1 (en) Policy control method, related apparatus, and system
WO2021194114A1 (en) Electronic wallet and method for atomic swapping of two different blockchain tokens by using electronic wallet
WO2022035161A1 (en) Computer network hacking prevention system and method
WO2015100537A1 (en) Transmission device, user plane node and control plane node, and data transmission method
WO2014205778A1 (en) Data transmission method and gateway
WO2015012668A1 (en) Method and apparatus for communication using ip address exchanged via nfc

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16850081

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16850081

Country of ref document: EP

Kind code of ref document: A1