Embodiment
In order to make those skilled in the art can further understand feature of the present invention and technology contents, see also following about detailed description of the present invention and accompanying drawing, accompanying drawing only provide with reference to and explanation, be not to be used for limiting the present invention.
Below in conjunction with drawings and Examples, technical scheme of the present invention is described.
With reference to Fig. 1, be the method flow diagram of a kind of VOIP network of the embodiment of the invention.
This method can comprise:
Step 101 receives the request message that lands that client sends.
Land to the VOIP network in client, all need the authentication of elder generation by authentication server, in the prior art, this authentication server only is used for the authentication to client, in embodiments of the present invention, also be used for returning the landing approach that suitable this client is landed the VOIP network, to save test and the select time of client to landing approach to client.
Client can adopt and normally land flow process, also promptly sending sip message to authentication server lands with request, authentication server receive client land request message after, can carry out authentication to the information that comprises in the request message earlier, this information can be to allocate in advance to authentication random number of client etc., be prior art herein, repeat no more.After authentication is passed through, directly change next step over to after perhaps receiving request message, the identification information that comprises client in this request message so that authentication server according to this identification information inquiry survey record, identification information can be the cell-phone number of client or ID etc.
Step 102, inquiry and the described corresponding detection record of identification information that lands in the request message.
Detection is recorded as in advance and is obtained by authentication server, the corresponding informance that has write down the identification information of some detecting customer terminals and be used to show the detecting customer terminal landing approach in this detection record, for example can directly record some client identification information and be fit to the landing approach that these clients are landed the VOIP network respectively, perhaps record client identification information and the network scenarios corresponding with these clients, wherein, the network scenarios of client has also just determined the adoptable landing approach of client.This detection record can be to be stored in the landing approach database or java vector objects of authentication server with tables of data or other form.The concrete acquisition of this detection record can be after authentication server passes through to receive the probe messages of detecting customer terminal transmission in advance, the corresponding detection record of the client identification information with in the probe messages of foundation, and detailed process sees also the description of subsequent embodiment.
Authentication server is after receiving the request message of client, the identification information that is used to identify this client that obtains to comprise in this request message, for example the cell-phone number of this client, identify label ID or Email E-mail address etc. go inquiry to survey record according to this identification information then.
Step 103 writes down the landing approach that returns client according to Query Result and detection, so that client is landed the network to VOIP according to landing approach.
In this step, whether the authentication server basis inquires the detection record of this client, and if after inquiring, survey the information that is used to show this client landing approach in the record, the final landing approach of determining to be fit to this customer end adopted, return this client then, thereby client can be used this landing approach and lands the network to VOIP.
In the prior art, client need be in multiple landing approach be selected in the time can't adopting normal landing approach to land the VOIP network one by one, lands until can realizing, this method efficient is extremely low, has wasted landing time greatly, has reduced customer experience.And in the embodiment of the invention,, can be directly provide suitable landing approach to land network to VOIP to client by the detection record in the authentication server, and saved client to land to the time of VOIP network, improved and landed efficient, improved user experience.
Below by instantiation said method is described.
Referring to Fig. 2, be the method flow diagram of the embodiment of the invention one.
In the present embodiment, customer end A will be landed the network to VOIP, and login method can comprise:
Step 201, detecting customer terminal sends the invite message to authentication server.
In the present embodiment, detecting customer terminal is by sending the invite message as probe messages to authentication server, come whether to have SIP ALG between detecting customer terminal and the authentication server, thereby can determine the network scenarios of detecting customer terminal, and then can determine to be fit to the landing approach of detecting customer terminal.
Because SIP LAG equipment can be made amendment the address to IP in the message body, finishing private network passes through, so when invite message process SIP LAG equipment, the cryptographic Hash of message can change, if so the invite message from client transmissions to authentication server, the hash value of message changes, then illustrate and have SIPALG in the transmission course, so, in the present embodiment, can be by first cryptographic Hash of client to authentication server transmission invite message, the transmission of this message first cryptographic Hash can realize in the following manner.
At first, detecting customer terminal is its identification information, and for example cell-phone number etc. is added into and generates the invite message in the invite source template.Concrete, detecting customer terminal can use a common invite source template to package, it at branch first cryptographic Hash of calculating invite message payload under 0 the situation, this cryptographic Hash can also be put into the branch value then preceding 16, the random value that detecting customer terminal uses is inserted in the back when authentication server authenticates.
Step 202, authentication server receives the invite message that detecting customer terminal sends.
Step 203, authentication server are set up and the corresponding detection record of identification information in the invite message.
After authentication server receives the invite message of detecting customer terminal transmission, in database, set up and survey record, at first, with the cell-phone number of detecting customer terminal in this message and the source IP address inscription record of this message, take out the branch value then preceding 16, the branch value is filled out second cryptographic Hash that the payload of message is calculated in 0 back, compare first cryptographic Hash and second cryptographic Hash then, to determine the residing network scenarios of detecting customer terminal, if two values are identical, then explanation, this invite message does not pass through SIP ALG equipment in transmission course, then, record is used for showing that there is not the information of SIPALG equipment in the invite message transmission procedure in surveying record; If different, also be that the cryptographic Hash of message changes, illustrate then in transmission course, to have SIP ALG equipment that then, record is used for showing that there is the information of SIPALG equipment in the invite message transmission procedure in surveying record.
In the present embodiment, the field by mark invite right value in database shows whether there is SIPALG equipment, and for example, if two cryptographic Hash are identical, then there is not SIPALG equipment in explanation, is 1 with the field mark of invite right value; If different, then there is SIPALG equipment in explanation, is 0 with the field mark of invite right value.
The detection record of a plurality of detecting customer terminals that authentication server is set up in the present embodiment can for:
The cell-phone number of detecting customer terminal 1--invite right value field " 1 "
The cell-phone number of detecting customer terminal 2--invite right value field " 0 "
The cell-phone number of detecting customer terminal 3--invite right value field " 1 "
......
Above step 201~203 are the probe messages of authentication server by the reception detecting customer terminal, set up the process of the detection record of this detecting customer terminal then.The order of above step and subsequent step can be adjusted as required.
Step 204, authentication server receive the request message that lands of customer end A transmission.
Customer end A initiates to land normally flow process to authentication server, can send to authentication server by sip message and land request, has comprised the identification information that is used to identify this customer end A in this request, can be the cell-phone number etc. of customer end A in the present embodiment.
Step 205, the detection record that the authentication server inquiry is corresponding with identification information.
Authentication server is inquired about corresponding detection record, the detection record as shown in step 203 according to the phone number of customer end A in database.
Step 206 is returned corresponding landing approach according to Query Result and detection record to customer end A.
If customer end A was not initiated probe messages to authentication server before step 204, then in this step, authentication server can't inquire the detection record corresponding with the customer end A cell-phone number, in this case, authentication server can send the landing approach that uses the SVN tunnel to land to customer end A, and customer end A can be landed the network to VOIP according to this landing approach.
If customer end A had sent probe messages by step 201 before step 204, and authentication server has been set up the detection record of customer end A by step 202~203, then in this step, be recorded as if inquire to survey: the cell-phone number of customer end A--invite right value field " 1 ", then illustrate in customer end A to there not being SIP ALG between the authentication server, then authentication server can return the SIP landing approach to customer end A, and customer end A can be landed the network to VOIP according to this landing approach.
If the detection that inquires is recorded as the cell-phone number of customer end A--invite right value field " 0 ", then illustrate in customer end A to there being SIP ALG between the authentication server, then authentication server can return the HTTP+RTP landing approach to customer end A, and customer end A can be landed the network to VOIP according to this landing approach.
Present embodiment sends the invite message as probe messages by detecting customer terminal, can be so that authentication server be directly judged the residing network environment of present client, treat that client sends when landing request, authentication server can be according to surveying record, directly provide suitable landing approach to land network to VOIP to client, with time of client detection network environment from before be reduced in the 1s and can finish in more than ten second, having saved client landed to the time of VOIP network, improved and landed efficient, improved user experience.
With reference to Fig. 3, be the method flow diagram of the embodiment of the invention two.
In the present embodiment, customer end B will be landed the network to VOIP, and login method can comprise:
Step 301, detecting customer terminal a sends RTP (Real-time TransportProtocol, RTP) message to authentication server.
In the present embodiment, detecting customer terminal a is by sending the RTP message as probe messages to authentication server, come media channel UDP (the User Datagram Protocol in the detection network, User Datagram Protocol) whether port is open mode, thereby can determine the network scenarios of detecting customer terminal a, and then can determine to be fit to the landing approach of detecting customer terminal a.
Because udp port is a lot, for example the voice flow port of IMS use is from 10000-65534, fire compartment wall not necessarily can all be opened these ports, so before detecting customer terminal a sends the RTP message, at first detecting customer terminal a and authentication server are held consultation, and to determine to send the port of RTP message, the identification information that can also write down the detecting customer terminal a that consults in authentication server is as prestoring identification information, in the present embodiment, the identification information that prestores is the cell-phone number of detecting customer terminal a.Be example as the udp port of consulting to determine with port one 5000,30000,45000 in the present embodiment.
At first, detecting customer terminal a is added into identification information in the general RTP message, and in the present embodiment, probe value is the cell-phone number of detecting customer terminal a.Concrete, detecting customer terminal a adopts general RTP message, in the payload of this message, preceding 15 cell-phone numbers of inserting detecting customer terminal a, remaining bit is inserted the random value that detecting customer terminal a uses when authentication server authenticates, detecting customer terminal a is sent to the RTP message that generates respectively in the port one 5000,30000,45000 then.
Step 302, the authentication server monitoring is consulted definite udp port with detecting customer terminal a.
Step 303, authentication server receives the RTP message that detecting customer terminal a sends at udp port.
Step 304, authentication server set up with the RTP message in the corresponding detection record of identification information of detecting customer terminal.
In the present embodiment, suppose that authentication server does not receive the RTP message at port one 5000, illustrate that then this port is in closed state, then in authentication server, can write down the information that is used to show this udp port sealing, be 0 by the authenticator segment value that port numbers is set in the present embodiment, represent closed state, the detection of this detecting customer terminal a of foundation is recorded as:
Detecting customer terminal a cell-phone number--port one 5000 verifying fields " 0 "
If at port 30000, can receive the RTP message in 45000, can also judge further whether the RTP message that receives is the message of the detecting customer terminal a transmission of negotiation, concrete can judge whether the identification information in the RTP message is identical with the identification information that prestores in the authentication server, also promptly in the cell-phone number of the detecting customer terminal a of the negotiation of authentication server record, search whether the cell-phone number that carries in this RTP message is arranged in the present embodiment, if have, illustrate that then this port is an open state to this detecting customer terminal a, then in authentication server, write down the information that is used to show this udp port opening, be 1 by the authenticator segment value that port numbers is set in the present embodiment, represent open state, the detection of this detecting customer terminal a that then sets up in this step is recorded as:
Detecting customer terminal a cell-phone number--port 30000 verifying fields " 1 "
Detecting customer terminal a cell-phone number--port 45000 verifying fields " 1 "
If in the cell-phone number of the detecting customer terminal a of the negotiation of authentication server record, search less than the cell-phone number that carries in this RTP message, promptly do not receive the RTP message of detecting customer terminal a at port 30000,45000 yet, the RTP message that receives simultaneously is the message that another detecting customer terminal b sends, and then is recorded as except the detection that can write down this detecting customer terminal a in this step:
Detecting customer terminal a cell-phone number--port 30000 verifying fields " 0 "
Detecting customer terminal a cell-phone number--port 45000 verifying fields " 0 " can also be created and the corresponding detection record of identification information in the RTP message, also promptly create the detection record of detecting customer terminal b:
Detecting customer terminal b cell-phone number--port 30000 verifying fields " 1 "
Detecting customer terminal b cell-phone number--port 45000 verifying fields " 1 "
So that detecting customer terminal b when landing demand, directly is back to detecting customer terminal b according to this detection record with the corresponding landing mode by authentication server.
Above step 301~304 are the probe messages of authentication server by the reception detecting customer terminal, set up the process of the detection record of this detecting customer terminal then.The order of above step and subsequent step can be adjusted as required.
Step 305, authentication server receive the request message that lands of customer end B transmission.
Customer end B initiates to land normally flow process to authentication server, can send to authentication server by sip message and land request, has comprised the identification information that is used to identify this customer end B in this request, can be the cell-phone number of customer end B in the present embodiment.
Step 306, the detection record that the authentication server inquiry is corresponding with identification information.
Authentication server is inquired about corresponding detection record, the detection record as shown in step 304 according to the phone number of customer end B in database.
Step 307 is returned corresponding landing approach according to Query Result and detection record to customer end B.
If customer end B was not initiated probe messages to authentication server before step 305, then in this step, authentication server can't inquire the detection record corresponding with the customer end B cell-phone number, in this case, authentication server can send the landing approach that uses the SVN tunnel to land to customer end B, and customer end B can be landed the network to VOIP according to this landing approach.
If customer end B had sent probe messages by step 301 before step 305, and authentication server has been set up the detection record of customer end B by step 302~304, then in this step, be recorded as if inquire to survey: the cell-phone number of customer end B--port 30000 verifying fields " 1 ", then illustrate in 30000 pairs of customer end B of port open, then authentication server can return SIP landing approach (normal mode) to customer end B, can also comprise open port numbers in this landing approach, so that customer end B is landed the network to VOIP according to this landing approach from open port numbers.
Present embodiment sends the RTP message as probe messages by detecting customer terminal, can be so that authentication server be directly judged the open state of present udp port to client, treat that client sends when landing request, authentication server can be according to surveying record, directly provide suitable landing approach to land network to VOIP to client, with time of client detection network environment from before be reduced in the 1s and can finish in more than ten second, having saved client landed to the time of VOIP network, improved and landed efficient, improved user experience.
With reference to Fig. 4, be the method flow diagram of the embodiment of the invention three.
In the present embodiment, client C will land the network to VOIP, and login method can comprise:
Step 401, detecting customer terminal sends the invite message of Session Initiation Protocol as probe messages to authentication server.
Step 201 in this step and the previous embodiment is similar, repeats no more herein.
Step 402, detecting customer terminal sends the RTP message as probe messages to authentication server.
Step 301 in this step and the previous embodiment is similar, repeats no more herein.
Step 403, authentication server receive probe messages, and establishment and the corresponding detection record of identification information in the probe messages.
This step is similar with step 202~203 and step 302~304 in the previous embodiment, repeats no more herein.
Can be when in this step, the detection of establishment is write down according to the detection record of invite message that receives and RTP message establishment detecting customer terminal.
If first cryptographic Hash of the invite message that receives is different with second cryptographic Hash of the invite message of subsequent calculations, then record is used for showing that there is the information of SIPALG equipment in the invite message transmission procedure in surveying record; If first cryptographic Hash is identical with second cryptographic Hash, then record is used for showing that there is not the information of SIPALG equipment in the invite message transmission procedure.
If receive the RTP message at the udp port of consulting, and the identification information in the RTP message is identical with the identification information that prestores, then record is used to the information that shows that udp port is opened in surveying record; If do not receive the RTP message at the udp port of consulting, or the identification information in the RTP message that receives is different with the identification information that prestores, then in surveying record, write down the information that is used to show the udp port sealing.
Suppose that the detection that authentication server has been created a plurality of detecting customer terminals by above-mentioned steps is recorded as:
Detecting customer terminal c cell-phone number--invite right value field " 1 "--port 30000 verifying fields " 1 ";
Detecting customer terminal d cell-phone number--invite right value field " 0 "--port 45000 verifying fields " 0 ";
Detecting customer terminal e cell-phone number--invite right value field " 1 "--port 30000 verifying fields " 0 ";
Detecting customer terminal f cell-phone number--invite right value field " 0 "--port 45000 verifying fields " 1 ";
......
Above step 401~403 are the probe messages of authentication server by the reception detecting customer terminal, set up the process of the detection record of this detecting customer terminal then.The order of above step and subsequent step can be adjusted as required.
Step 404, authentication server receive the request message that lands of client C transmission.
Client C initiates to land normally flow process to authentication server, can send to authentication server by sip message and land request, has comprised the identification information that is used to identify this client C in this request, can be the cell-phone number of client C in the present embodiment.
Step 405, the detection record that the authentication server inquiry is corresponding with identification information.
Authentication server is inquired about corresponding detection record, the detection record as shown in step 403 according to the phone number of client C in database.
Step 406 is returned corresponding landing approach according to Query Result and detection record to client C.
If client C did not initiate probe messages to authentication server before step 403, then in this step, authentication server can't inquire the detection record corresponding with the cell-phone number of client C, in this case, authentication server can send the landing approach that uses the SVN tunnel to land to client C, and client C can land the network to VOIP according to this landing approach.
If client C had sent probe messages by step 401 before step 403, and authentication server has been set up the detection record of client C by step 402~403, then in this step, authentication server can return suitable landing approach to client C according to surveying record, so that client C lands the network to VOIP.
If inquire the detection record corresponding with the cell-phone number of client C, and comprise in the detection record and be used for showing that there is the information of SIP ALG equipment in the invite message transmission procedure, and/or comprise the information that shows described udp port sealing in the detection record, then return and use SVN tunnel landing approach to client C; If inquire the detection record corresponding with the cell-phone number of client C, and comprise in the detection record and be used for showing that there is not the information of SIP ALG equipment in the invite message transmission procedure, and/or comprise the information that is used to show described udp port opening in the detection record, then return and use the SIP landing approach to client C; If inquire the detection record corresponding with the cell-phone number of client C, and comprise in the detection record and be used for showing that there is not the information of SIPALG equipment in the invite message transmission procedure, and also comprise the information that shows the udp port sealing in the detection record, then return and use the SVN landing approach to client C.
According to the detection record in the step 403, in the present embodiment, the landing approach that specifically returns is as follows:
Be recorded as if inquire to survey: the cell-phone number of client C--invite right value field " 1 "--port 30000 verifying fields " 0 "; Then authentication server can return the SVN landing approach to client C;
Be recorded as if inquire to survey: the cell-phone number of client C--invite right value field " 0 "--port 30000 verifying fields " 1 "; Then authentication server can return the HTTP+RTP landing approach to client C;
Be recorded as if inquire to survey: the cell-phone number of client C--invite right value field " 1 "--port 30000 verifying fields " 1 "; Then authentication server can return normal landing approach (SIP) to client C;
Be recorded as if inquire to survey: the cell-phone number of client C--invite right value field " 0 "--port 30000 verifying fields " 0 "; Then authentication server can return SVN tunnel landing approach to client C.
Present embodiment sends probe messages by detecting customer terminal, can be so that authentication server be directly judged the residing network environment of present client, treat that client sends when landing request, authentication server can be according to surveying record, directly provide suitable landing approach to land network to VOIP to client, with time of client detection network environment from before be reduced in the 1s and can finish in more than ten second, having saved client landed to the time of VOIP network, improved and landed efficient, improved user experience.And, make the process of selecting landing approach to user transparent, also avoided all private users all to adopt SVN or SVN tunnel style to land, thereby alleviated requirement tunnel and network performance.
More than be the detailed description to the method for landing the VOIP network, equipment or the system to using said method is introduced below.
With reference to Fig. 5, be the structural representation of a kind of authentication server of the embodiment of the invention.
This authentication server can comprise:
Message sink unit 501 is used to receive the request message that lands that client sends, and comprises the identification information of described client in this request message.
Record queries unit 502 is used to inquire about the detection record corresponding with identification information, surveys the corresponding informance that comprises the identification information of detecting customer terminal in the record and be used to show the detecting customer terminal landing approach.
Feedback unit 503 as a result, are used for writing down the landing approach that returns client according to Query Result and detection, so that client is landed the network to VOIP according to landing approach.
The message sink unit 501 of authentication server receive client land request message after, can carry out authentication to the information that comprises in the request message earlier, the identification information that comprises client in this request message, so that authentication server according to this identification information inquiry survey record, identification information can be the cell-phone number of client or ID etc.The message sink unit 501 of authentication server is after receiving the request message of client, the identification information that is used to identify this client that obtains to comprise in this request message, for example the cell-phone number of this client or ID etc. go inquiry to survey record by record queries unit 502 according to this identification information then.This detection is recorded as in advance and is obtained by authentication server, the corresponding informance that has write down the identification information of some detecting customer terminals and be used to show the detecting customer terminal landing approach in this detection record, for example can directly record some client identification information and be fit to the landing approach that these clients are landed the VOIP network respectively, perhaps record client identification information and the network scenarios corresponding with these clients, wherein, the network scenarios of client has also just determined the adoptable landing approach of client.This detection record can be to be stored in the landing approach database or java vector objects of authentication server with tables of data or other form.The concrete acquisition of this detection record can be after authentication server passes through to receive the probe messages of detecting customer terminal transmission in advance, the corresponding detection record of the client identification information with in the probe messages of foundation.Whether feedback unit 503 bases inquire the detection record of this client as a result, and if after inquiring, survey the information that is used to show this client landing approach in the record, the final landing approach of determining to be fit to this customer end adopted, return this client then, thereby client can be used this landing approach and lands the network to VOIP.
In the embodiment of the invention,, can be directly provide suitable landing approach to land network, saved client and landed, improved and landed efficient, improved user experience to the time of VOIP network to VOIP to client by the said units of authentication server.
Referring to Fig. 6, be the structural representation of the another kind of authentication server of the embodiment of the invention.
This authentication server is except comprising message sink unit 601, record queries unit 602 and as a result the feedback unit 603, can also comprising:
Message receiving element 604 is used to receive the probe messages that detecting customer terminal sends, and comprises the identification information of described detecting customer terminal in the described probe messages.
Unit 605 set up in record, is used to set up the detection record corresponding with the identification information of described detecting customer terminal.
In the present embodiment, message receiving element 604 specifically is used to receive first cryptographic Hash of the invite message that detecting customer terminal sends.
Record is set up unit 605 and is comprised:
Computation subunit 6051 is used to calculate second cryptographic Hash of described invite message.
Record subelement 6052, be used for working as described first cryptographic Hash and described second cryptographic Hash not simultaneously, write down the detection record corresponding, comprise in the described detection record being used for showing that there is the information of SIP ALG equipment in described invite message transmission procedure with the identification information of described detecting customer terminal; When described first cryptographic Hash is identical with described second cryptographic Hash, write down the detection record corresponding with the identification information of described detecting customer terminal, comprise in the described detection record being used for showing that there is not the information of SIPALG equipment in described invite message transmission procedure.
In the present embodiment, detecting customer terminal is by sending the invite message as probe messages to authentication server, come whether to have sip lag between detecting customer terminal and the authentication server, thereby can determine the network scenarios of detecting customer terminal, and then can determine to be fit to the landing approach of detecting customer terminal.After the message receiving element 604 of authentication server receives first cryptographic Hash of the invite message that detecting customer terminal sends, set up unit 605 by record and in database, set up the detection record, concrete, calculate second cryptographic Hash of invite message by computation subunit 6051, by the comparative result of record subelement 6052, set up and survey record then according to first cryptographic Hash and second cryptographic Hash.The message sink unit 601 of authentication server receive client land request message after, go inquiry to survey record by record queries unit 602 according to this identification information.Whether feedback unit 603 bases inquire the detection record of this client as a result, and if after inquiring, survey the information that is used to show this client landing approach in the record, the final landing approach of determining to be fit to this customer end adopted, return this client then, thereby client can be used this landing approach and lands the network to VOIP.
Present embodiment can directly be judged the residing network environment of present client by said units, treat that client sends when landing request, authentication server can be according to surveying record, directly provide suitable landing approach to land network to VOIP to client, with time of client detection network environment from before be reduced in the 1s and can finish in more than ten second, saved client and landed, improved and landed efficient, improved user experience to the time of VOIP network.
Referring to Fig. 7, be the structural representation of the another kind of authentication server of the embodiment of the invention.
This authentication server also can comprise message sink unit 701, record queries unit 702, unit 705 set up in feedback unit 703, message receiving element 704 and record as a result.
In the present embodiment, message receiving element 704 comprises:
Monitoring subelement 7041 is used to monitor with detecting customer terminal and consults definite udp port.
Receive subelement 7042, be used for receiving the RTP message that described detecting customer terminal sends at described udp port.
Unit 705 set up in record, specifically be used for when receiving described RTP message, and when the described identification information in the described RTP message is identical with the identification information that prestores, then the corresponding detection record of identification information in record and the described RTP message comprises the information that is used to show described udp port opening in the described detection record; When not receiving described RTP message, or the described identification information in the RTP message that receives with prestore identification information not simultaneously, the corresponding detection record of described identification information in record and the described RTP message then comprises in the described detection record being used to the information that shows that described udp port seals.
In the present embodiment, detecting customer terminal is by sending the RTP message as probe messages to authentication server, come whether the media channel udp port in the detection network is open mode, thereby can determine the network scenarios of detecting customer terminal, and then can determine to be fit to the landing approach of detecting customer terminal.Monitoring subelement 7041 is monitored the udp port of consult determining with detecting customer terminal, after receiving the udp port of subelement 7042 in monitoring and receiving the RTP message that detecting customer terminal sends, sets up unit 705 by record and sets up and survey records.The message sink unit 701 of authentication server receive client land request message after, go inquiry to survey record by record queries unit 702 according to this identification information.Whether feedback unit 703 bases inquire the detection record of this client as a result, and if after inquiring, survey the information that is used to show this client landing approach in the record, the final landing approach of determining to be fit to this customer end adopted, return this client then, thereby client can be used this landing approach and lands the network to VOIP.
Present embodiment is directly judged the open state of present udp port to client by said units, treat that client sends when landing request, authentication server can be according to surveying record, directly provide suitable landing approach to land network to VOIP to client, with time of client detection network environment from before be reduced in the 1s and can finish in more than ten second, saved client and landed, improved and landed efficient, improved user experience to the time of VOIP network.
The specific implementation process of each unit sees also the description of appropriate section among the preceding method embodiment among the said apparatus embodiment, repeats no more herein.
Above-described embodiment of the present invention does not constitute the qualification to protection range of the present invention.Any modification of being done within the spirit and principles in the present invention, be equal to and replace and improvement etc., all should be included within the claim protection range of the present invention.