Method for cryptographic key exchange of passive optical network system

A passive optical network and system key technology, which is applied in the field of PON system key exchange, can solve problems such as high risk of failure and key exchange failure, and achieve the effects of improving efficiency, reducing time, and saving resources

Active Publication Date: 2008-08-20
ZTE CORP
View PDF0 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The loss of each PLOAM message in the interaction process may lead to the failure of the key exchange. Therefore, when using this method in the prior art for key exchange, the risk of failure is relatively large

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for cryptographic key exchange of passive optical network system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The basic idea of ​​the present invention is: after the first key exchange of the PON system is successful, the random number generated by the OLT and the key switching time are encrypted using the key (current key) generated by the last key exchange, and at the same time Send it to the ONU, and then the OLT and the ONU simultaneously generate a new round of encrypted keys based on the random number and the current key, and switch the key at the specified time at the same time.

[0038] The specific implementation of the present invention will be described in further detail below in conjunction with the accompanying drawings.

[0039] When the first key update period arrives, the PON system first performs the first key exchange according to the ITU-T G.984.3 key exchange method in the prior art;

[0040]Here, the PON system generally performs the first key exchange according to the ITU-T G.984.3 key exchange method in the prior art. The reason why the first key exchange...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a switching method of passive optical network (PON) system cipher key, which includes the following steps: cipher key is generated according to standard cipher key exchange method executing first cipher key exchange when arriving first cipher key exchange periods, optical line terminal (OLT) sends encrypting random number and cipher key switching time using last time cipher key exchange generating cipher key to optical network unit (ONU) when the new cipher key renewal cycle arrives, after ONU receives the message, ONU transmits affirmation reply message to OLT, then OLT and ONU generate new cipher key at the same time; when OLT receives affirmation reply message from, as well as arriving cipher key switching time, OLT and ONU switch to new cipher key at the same time. Using the invention can reduces cipher key exchange failing risks base on cipher key exchange safety by decreasing number of descending physical layer operations management maintenance (PLOM) interactive message in cipher key exchange process.

Description

technical field [0001] The invention relates to a passive optical network (PON) key exchange technology, in particular to a PON system key exchange method. Background technique [0002] With the development of broadband access technology, PON is regarded as a very important broadband access technology, and its biggest advantage is that no active devices are needed between the local exchange office and users. A PON system usually consists of an optical line terminal (OLT) on the office side, an optical network unit (ONU) / optical network terminal (ONT) on the user side, and an optical distribution network (ODN), and usually adopts a point-to-multipoint network structure. Among them, ODN is composed of passive optical devices such as single-mode optical fibers, optical splitters, and optical connectors, and provides optical transmission media for the physical connection between OLT and ONU. In the PON system, the downlink data is broadcast to all ONUs on the PON. If a maliciou...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/18H04L12/28
Inventor 孙智溢
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products