Unlock instant, AI-driven research and patent intelligence for your innovation.

Key protection method and system for passive optical network

A passive optical network and key protection technology, applied in key distribution, can solve the security threats of PON system and other issues, and achieve the effect of efficient encryption process

Active Publication Date: 2011-03-30
ZTE CORP
View PDF6 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the existence of the above reasons, the security of the PON system is threatened

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key protection method and system for passive optical network
  • Key protection method and system for passive optical network
  • Key protection method and system for passive optical network

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0051] Example 1 Encryption of PLOAM messages

[0052] This embodiment illustrates a method and a system for transmitting key-related information by using an extended PLOAM message (that is, using an increased byte of the PLOAM message).

[0053] In the GPON system of the present embodiment, an identical pre-shared key seed is stored at the OLT and the ONU place, and the pre-shared key seed is also referred to as the No. 1 key seed for generating an encryption key (Key); OLT The algorithm used to calculate the Key is stored at the and ONU; the format of the extended PLOAM message is shown in Table 1, Table 2 and Table 3. In Table 1, the key-related information, also referred to as the second key seed used to generate the encryption key, is located between the ONU-ID and the Message ID. In Table 2, the second key seed can also be located between Message ID and Data. In Table 3, the second key seed can also be located between Data and CRC.

[0054] Table 1 The first extended ...

example 2

[0069] This embodiment illustrates a method and system for transmitting key-related information by using a newly created PLOAM message.

[0070] In the GPON system of the present embodiment, an identical pre-shared key seed is stored at the OLT and the ONU place, and the pre-shared key seed is also referred to as the No. 1 key seed for generating an encryption key (Key); OLT The same algorithm used to calculate the Key is stored at the ONU; the name of the newly created PLOAM message used to transmit key-related information is Ralative_information_Key, and the format is shown in Table 4. In the table, key-related information, also known as the second key seed used to generate the encryption key.

[0071] Table 4 Format of the Ralative_information_Key message

[0072]

[0073] When the PLOAM information sent by the OLT (ONU) to the ONU (OLT) needs to be encrypted, the OLT (ONU) locally generates a key-related information, which is the second key seed used to generate the ke...

example 3

[0083] This embodiment describes the method and system for transmitting key-related information by extending the bytes of the GEM frame header (that is, adding a field in the GEM frame header).

[0084] In the GPON system of the present embodiment, an identical pre-shared key seed is stored at the OLT and the ONU place, and the pre-shared key seed is also referred to as the No. 1 key seed for generating an encryption key (Key); OLT The algorithm used to calculate the Key is stored at the and ONU; the format of the extended GEM frame header is shown in Table 5, and the GEM frame header is composed of five parts, which are respectively PLI (payload length indication), Port ID (port identification), PTI (Payload Type Indication), RIK (Key Related Information) and HEC (Frame Header Error Control). After the GEM frame header is Payload (payload). The RIK field in the GEM frame header is used to carry key-related information, and the above-mentioned key-related information is also ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a key protection method and a key protection system for a passive optical network (PON). The key protection system comprises an optical line terminal and an optical network unit. The method comprises that: when sending encryption information to the optical network unit / optical line terminal, the optical line terminal / optical network unit sends the encryption information and key related information to the optical network unit / optical line terminal. The method and the system makes the PON system safer through mutual independence of encryption information; and extra key exchange process and key update mechanism are not needed, so the encryption process is more efficient.

Description

technical field [0001] The invention relates to the communication field, in particular to a key protection method and system for a passive optical network. Background technique [0002] Gigabit-Capable Passive Optical Network (GPON) technology is an important technical branch of the passive optical network (PON) family, similar to other PON technologies, GPON is also a point-to-multipoint Topological passive optical access technology. [0003] GPON is composed of an optical line terminal (Optical Line Terminal, OLT for short), an Optical Network Unit (ONU for short) on the user side, and an Optical Distribution Network (ODN for short). Point-to-multipoint network structure. ODN is composed of passive optical components such as single-mode optical fibers, optical splitters, and optical connectors, and provides optical transmission media for the physical connection between OLT and ONU. [0004] In order to realize the partial management function of the ONU by the OLT, the G...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04Q11/00H04L9/08
Inventor 张伟良耿丹张德智马瑞克.海德杰尼
Owner ZTE CORP