Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Protection method for Gigabit passive optical network encryption service

A passive optical network, gigabit technology, applied in key distribution, which can solve the problems of ONU's failure to decrypt downlink data, lack of instructions and regulations, and out-of-sync keys.

Inactive Publication Date: 2010-12-29
ZTE CORP
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When the selected frame arrives, because it is not sure whether the ONU will switch the key, no matter whether the OLT switches at this time, there will be a possibility that it will not be synchronized with the actual key used by the ONU, which will cause the ONU to fail to decrypt the downlink data.
At present, in ITU-T G.984.3, there is no description and countermeasures for this risk

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Protection method for Gigabit passive optical network encryption service
  • Protection method for Gigabit passive optical network encryption service
  • Protection method for Gigabit passive optical network encryption service

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The basic idea of ​​the present invention is: in the GPON system, after the OLT sends the Key_switching_time message to the ONU, and receives the Acknowledge message from the ONU, it is ready to switch the key; otherwise, it does not switch the key. After receiving the Key_switching_time message, the ONU performs key switching when the multiframe number of the message arrives. If the verification of the ATM cell header / GEM frame header is correct after switching, and the ATM cell payload / GEM frame payload is decrypted and corrected If there is an error in the verification, take protective measures by yourself: re-enable the key used before the key switch for decryption.

[0024] Utilize the flow process of GPON encryption service protection method of the present invention, comprise the following parts:

[0025] After the OLT sets the protection time and sends the key switching message to the ONU according to the procedure specified in G.984, the OLT determines whether t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for protecting the GPON encryption service. The method comprises the following steps that: after an OLT sends a key switching message to an ONU, whether the key is switched is determined according to the feedback of the key switching message by the ONU; after the ONU switches the key, whether a key before switched is started is determined according to the frame verifying result. The invention which is based on an ITU-T G984.3 has a defense mechanism in the key switching process of a GPON system. The invention sets the guide time of the OLT and the verificationof a frame head and a frame payload by the ONU so that the key before switched by the ONU key is used at the same time when the possible non-synchronization of the key of the OLT and the ONU is determined, thereby reducing the possibility of the non-synchronization of the OLT and the key actually used by the ONU and improving the coherence of the key use and the reliability.

Description

technical field [0001] The invention relates to the field of Gigabit Passive Optical Network (GPON, Gigabit Passive Optical Network), in particular to a method for protecting encrypted services in the GPON system. Background technique [0002] GPON is a new generation broadband passive optical integrated access technology based on the ITU-T G.984.x standard. Optical Network Unit (ONU, Optical Network Unit) / Optical Network Terminal (ONT, Optical Network Termination) and Optical Distribution Network (ODN, Optical Distribution Network). ODN is composed of passive optical components such as single-mode optical fibers, optical splitters, and optical connectors, and provides optical transmission media for the physical connection between OLT and ONU. ODN is usually a point-to-multipoint structure, that is, one OLT is connected to multiple ONUs. The data sent by the OLT to the ONU is called downlink data, and the data sent by the ONU to the OLT is called uplink data. As shown in ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L29/06
Inventor 夏顺东张伟良
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products