Cipher consistency detection method and apparatus
A detection method and consistency technology, applied in the field of communication, can solve the problems of current key inconsistency, ONU service abnormality, and no key consistency detection method provided, so as to reduce the risk of abnormal service.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0029]The preferred embodiments of the present invention will be described below in conjunction with the accompanying drawings. It should be understood that the preferred embodiments described here are only used to illustrate and explain the present invention, and are not intended to limit the present invention.
[0030] figure 1 is a flow chart of the key consistency detection method according to the present invention. Such as figure 1 As shown, the method includes the following steps:
[0031] Step S102, the Gigabit PON configures one or more key consistency detection channels between the OLT and one or more ONUs;
[0032] Step S104, the optical line terminal sends the encrypted data to one or more optical network units through one or more key consistency detection channels;
[0033] Step S106, when one or more optical network units receive the encrypted data, use the local key to decrypt the encrypted data, and send the decrypted data to the optical line terminal through...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 