Some content of this application is unavailable at the moment.
If this situation persists, please contact us atFeedback&Contact
1. (US20080165802) Method for controlling direct penetrating communication between two devices under different NATs, and device for the same

Office : United States of America
Application Number: 11885011 Application Date: 23.02.2006
Publication Number: 20080165802 Publication Date: 10.07.2008
Grant Number: 08422486 Grant Date: 16.04.2013
Publication Kind : B2
Prior PCT appl.: Application Number:PCTCN2006000259 ; Publication Number: Click to see the data
IPC:
H04J 3/16
H04L 12/42
H ELECTRICITY
04
ELECTRIC COMMUNICATION TECHNIQUE
J
MULTIPLEX COMMUNICATION
3
Time-division multiplex systems
16
in which the time allocation to individual channels within a transmission cycle is variable, e.g. to accommodate varying complexity of signals, to vary number of channels transmitted
H ELECTRICITY
04
ELECTRIC COMMUNICATION TECHNIQUE
L
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
12
Data switching networks
28
characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
42
Loop networks
Applicants: Tang Ke
Beijing Funshion Online Technologies Ltd.
Inventors: Tang Ke
Agents: Occhiuti Rohlicek & Tsao LLP
Priority Data: 200510008871.9 24.02.2005 CN
Title: (EN) Method for controlling direct penetrating communication between two devices under different NATs, and device for the same
Abstract: front page image
(EN)

The present invention discloses a user device for implementing direct penetrating communication between a user device under a NAT and another user device under a different NAT and a method for the same. Detection message is sent to an auxiliary detecting device in an external network through a selected local port. Then the reply message from said auxiliary detecting device will be received and the NAT-translated NAT source port of said detection message can be obtained. By comparing the NAT source ports of a plurality of detection messages, it can be determined whether or not the selected port is a penetrated port. After that, the corresponding NAT source address and NAT penetrated port will be informed to another user device under a different NAT (also, the NAT penetrated port and NAT source port determined by said another user device will be received via said external-network device).


Also published as:
WO/2006/089481