Unlock instant, AI-driven research and patent intelligence for your innovation.

Security Monitoring for Optical Networks

A security and monitoring system technology, applied in the field of security monitoring systems, can solve impossible, difficult and other problems

Active Publication Date: 2018-02-23
TELEFON AB LM ERICSSON (PUBL)
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, it becomes difficult or impossible to intercept traffic on the incoming signal or the outgoing signal by tapping on the optical supervisory signal without encryption per wavelength channel

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security Monitoring for Optical Networks
  • Security Monitoring for Optical Networks
  • Security Monitoring for Optical Networks

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0072] figure 1 A schematic diagram of an arrangement in the form of a node 10 of an optical network with an external safety monitoring system 30 is shown. The node has port 40 occupied by links to other ports. For example, the optical branching section 15 is provided in the form of a splitter or a demultiplexer. Therefore, there are two or more light paths. One of these paths leads to an unused output port 20 . The system monitoring component has a blocking component 50 that occupies the unused output port in order to prevent unauthorized access to the optical path of the unused output port. A light detector 60 is provided, coupled to the blocking member and configured to detect light signals passing through the unused port. It can be integrated in a blocking part, or equipped with an optical path (such as a fiber optic flying lead), so that the photodetector can be several meters away from the port. The monitoring system also has an alarm circuit 70 coupled to the light...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A device (10) for an optical communication network, the device having an optical path for optical traffic, and optical ports (20, 40), one of the optical ports being an unused output port (20). A security monitoring system (30) has a blocking member (50) removably coupled to the unused output port to occupy the unused output port to prevent unauthorized access. A light detector (60) is capable of detecting a light signal passing through the unused output port to the blocking component, and has an alarm circuit (70) configured to output an alarm signal based on the detection of the light signal. This monitoring can help protect nodes from interference or eavesdropping. By blocking the port, the monitoring can be independent of the type of signal on the optical path. The system can be passive or active, and requires no changes in the installed node configuration, and can therefore be easily added to existing architectures.

Description

technical field [0001] The invention relates to a security monitoring system for an optical network, a device having such a system, and a corresponding method of monitoring security and installing a security monitoring system. Background technique [0002] As the demand for network capacity grows, the issue of protecting the physical layer security of optical networks cannot be ignored. Optical layer security benefits from electromagnetic immunity, but the optical layer includes not only fiber spans but also network devices that are vulnerable to various attacks. This means that optical networks may be just as vulnerable to eavesdropping or jamming as copper-based networks. [0003] One approach that has been proposed for providing communication security is optical encryption of signals transmitted across optical communication networks, as proposed by Jung et al. l0Gbps all-optical encryption and decryption system utilizing SOA XOR logic gates), Optical and Quantum Electro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04B10/07H04Q11/00H04J14/02
CPCH04J14/0227H04Q11/0062H04Q2011/0079H04Q2011/0083H04B10/85H04J14/0204H04J14/0209H04J14/02122H04L63/1416
Inventor M.科斯坦蒂尼R.马格里
Owner TELEFON AB LM ERICSSON (PUBL)