Unlock instant, AI-driven research and patent intelligence for your innovation.

Cipher consistency detection method and apparatus

A detection method and consistency technology, applied in the field of communication, can solve the problems of current key inconsistency, ONU service abnormality, and no key consistency detection method provided, so as to reduce the risk of abnormal service.

Active Publication Date: 2009-03-18
ZTE CORP
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] An abnormal key switch may cause the current key inconsistency between the OLT and the ONU, and the inconsistency of the current key between the OLT and the ONU will directly cause the encrypted data sent by the OLT to be unable to be correctly decrypted by the ONU, and further cause ONU-related business abnormalities
ITU-T G.984.x does not describe the inconsistency of the current key between the OLT and the ONU, nor does it provide a method for detecting the consistency of the current key between the OLT and the ONU

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cipher consistency detection method and apparatus
  • Cipher consistency detection method and apparatus
  • Cipher consistency detection method and apparatus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029]The preferred embodiments of the present invention will be described below in conjunction with the accompanying drawings. It should be understood that the preferred embodiments described here are only used to illustrate and explain the present invention, and are not intended to limit the present invention.

[0030] figure 1 is a flow chart of the key consistency detection method according to the present invention. Such as figure 1 As shown, the method includes the following steps:

[0031] Step S102, the Gigabit PON configures one or more key consistency detection channels between the OLT and one or more ONUs;

[0032] Step S104, the optical line terminal sends the encrypted data to one or more optical network units through one or more key consistency detection channels;

[0033] Step S106, when one or more optical network units receive the encrypted data, use the local key to decrypt the encrypted data, and send the decrypted data to the optical line terminal through...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and a device for detecting the consistency of keys, wherein the method comprises the following steps: allocating one or more than one channels for detecting the consistency of the keys between the terminal of an optical line and one or more than one optical network units by a gigabit passive optical network, sending encrypted data to one or more than one of the optical network units through one or more than one of the channels for detecting the consistency of the keys by the optical line, when one or more than one of the optical network units receive the encrypted data, decrypting the encrypted data with local keys, and sending the decrypted data to the terminal of the optical line through one or more than one of the channels for detecting the consistency of the keys, when the terminal of the optical line receives the response information which is returned by the optical network units, extracting the decrypting data from the response information and comparing decrypting data with the data before the encrypting, thereby detecting whether the current keys between the terminal of the optical line and the optical network units are consistent.

Description

technical field [0001] The present invention relates to the technical field of communication, and more specifically, relates to a method between an optical line terminal (optical line terminal) and an optical network unit (optical network unit) in a gigabit passive optical network (Gigabit Passive Optical Network, GPON). A key consistency detection method and device for detecting whether the current key is consistent. Background technique [0002] GPON is a new generation of broadband passive optical integrated access technology based on the ITU-T G.984.x standard. The system usually consists of an OLT on the office side and an ONU (Optical Network Unit, Optical Network Unit) / ONT (Optical Network Termination) on the user side. , Optical Network Terminal) and ODN (Optical Distribution Network, Optical Distribution Network). ODN is composed of single-mode optical fiber, optical splitter, optical connector and other passive optical components, providing optical transmission me...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/26H04L9/08H04L12/28H04B10/08H04B10/079
Inventor 张伟良夏顺东
Owner ZTE CORP