CN102237999A - Message processing method and message transmitter - Google Patents

Message processing method and message transmitter Download PDF

Info

Publication number
CN102237999A
CN102237999A CN2010101650441A CN201010165044A CN102237999A CN 102237999 A CN102237999 A CN 102237999A CN 2010101650441 A CN2010101650441 A CN 2010101650441A CN 201010165044 A CN201010165044 A CN 201010165044A CN 102237999 A CN102237999 A CN 102237999A
Authority
CN
China
Prior art keywords
message
territory
recipient
transmit leg
sent
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2010101650441A
Other languages
Chinese (zh)
Other versions
CN102237999B (en
Inventor
张伟良
张德智
马瑞克·海德杰尼
耿丹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201010165044.1A priority Critical patent/CN102237999B/en
Publication of CN102237999A publication Critical patent/CN102237999A/en
Application granted granted Critical
Publication of CN102237999B publication Critical patent/CN102237999B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention discloses a message processing method and a message transmitter. The method comprises steps as follows: a transmitting end writes a variable value into an undefined domain and/or reserved domain of the message and encrypts the message; and the transmitting end transmits the message to a receiving end. The invention solves the problem of low security in the correlation technique since the uplink/downlink data can be easily intercepted, and enhances the security of the service transmission system.

Description

Message treatment method and message dispensing device
Technical field
The present invention relates to the communications field, in particular to a kind of message treatment method and message dispensing device.
Background technology
EPON (Passive Optical Network, abbreviate PON as) be a kind of passive light access technology that a little arrives the multidrop topology structure that adopts, wherein gigabit passive optical network (Gigabit-Capable Passive Optical Network abbreviates GPON as) technology is important techniques branch in EPON (PON) family.
GPON is by optical line terminal (the Optical Line Terminal of office's side, abbreviate OLT as), optical network unit (the Optical Network Unit of user side, abbreviate ONU as) and Optical Distribution Network (Optical Distributio Network, abbreviate ODN as) form, adopt the network configuration of point usually to multiple spot.ODN is made up of Passive Optical Components such as monomode fiber, optical branching device, optical connectors, for the physical connection between OLT and the ONU provides light-transmitting medium.
In order to realize the part management function of OLT to ONU, the G.984.3 standard definition of ITU-T physical layer operations management maintenance (Physical layer Operations, Administration and Maintenance, be called for short PLOAM) passage, GPON utilizes PLOAM channel transfer PLOAM message, realization is to the management of transmission convergence layer, and for example, ONU activates, foundation, encryption configuration and the key management etc. of ONU management control channel.
At the down direction of GPON system (promptly, direction from OLT to ONU) on, because PLOAM message is to send with form expressly, and the transmission of message is undertaken by natural broadcast mode, therefore each ONU can both receive the PLOAM message of issuing all ONU, and obtain one's own PLOAM message according to ONU-ID, abandon the PLOAM message that sends to other ONU.If there is the malice ONU that is reprogrammed in the network, this malice ONU will monitor the PLOAM message that OLT issues other ONU.If malice ONU listens to the sequence number of the legal ONU that carries in certain descending PLOAM message, then it can be after legal ONU power down, utilize the sequence number of legal ONU to finish the registration activation of self, cause illegal ONU can be linked in the PON system, and stop the successfully registration once more of legal ONU.
On the up direction of GPON system, there are two kinds of threats that are illegally listened in the PLOAM message that ONU sends:
One. what if the optical branching device among the GPON used is the optical splitter of 2:N, and as shown in Figure 1, illegal user can monitor the content of the PLOAM message of all ONU transmissions by B port as shown in Figure 1;
Two. when optical fiber bends, understand some light and leak from optical fiber, illegal user can survey upward signal light by the mode of bending optical fiber, thereby monitors the content of up PLOAM message.
As seen, existence for above-mentioned reasons, the up-downgoing safety of PON system all has been subjected to threat, and, in other service transmission system, also there is same problem, in the correlation technique, effective solution is not proposed as yet.
Summary of the invention
Main purpose of the present invention is to provide a kind of message treatment method and message dispensing device, to address the above problem at least.
According to an aspect of the present invention, provide a kind of message treatment method, may further comprise the steps: transmit leg is in the undefined territory of message and/or keep in the territory and write variable value and encrypting messages; Transmit leg is sent to the recipient with message.
According to another aspect of the present invention, provide a kind of message treatment method, may further comprise the steps: transmit leg is with the content-encrypt in the territory except that undefined territory and/or reservation territory in the message to be sent; Message after transmit leg will be encrypted is sent to the recipient.
According to a further aspect of the invention, provide a kind of message dispensing device, having comprised: writing module is used for writing variable value in the undefined territory and/or the reservation territory of message; Encrypting module is used for encrypting messages; Sending module is used to send message.
According to a further aspect of the invention, provide a kind of message dispensing device, having comprised: encrypting module is used for the content-encrypt with message to be sent territory except that undefined territory and/or reservation territory; Sending module is used for the message after encrypting is sent to the recipient.
By the present invention, employing is in the undefined territory of message and/or keep in the territory and write variable value, perhaps, method of encrypting is not carried out in the undefined territory of message and/or the content that keeps in the territory, solved that the up-downgoing data are easily caused the lower problem of fail safe, the fail safe that has improved service transmission system by intercepting in the correlation technique.
Description of drawings
Accompanying drawing described herein is used to provide further understanding of the present invention, constitutes the application's a part, and illustrative examples of the present invention and explanation thereof are used to explain the present invention, do not constitute improper qualification of the present invention.In the accompanying drawings:
Fig. 1 is the topology diagram of the GPON system in the correlation technique;
Fig. 2 is the flow chart according to a kind of message treatment method of the embodiment of the invention;
Fig. 3 is the detail flowchart according to the message treatment method of the embodiment of the invention;
Fig. 4 is the structured flowchart according to a kind of message dispensing device of the embodiment of the invention;
Fig. 5 is the PLOAM message format schematic diagram according to the embodiment of the invention 1;
Fig. 6 is the flow chart according to the another kind of message treatment method of the embodiment of the invention;
Fig. 7 is the structured flowchart according to the another kind of message dispensing device of the embodiment of the invention;
Fig. 8 is the another detail flowchart according to the message treatment method of the embodiment of the invention; And
Fig. 9 is the structured flowchart according to another message dispensing device of the embodiment of the invention.
Embodiment
Hereinafter will describe the present invention with reference to the accompanying drawings and in conjunction with the embodiments in detail.Need to prove that under the situation of not conflicting, embodiment and the feature among the embodiment among the application can make up mutually.
Fig. 2 is the flow chart according to a kind of message treatment method of the embodiment of the invention, and this method may further comprise the steps:
Step S202, transmit leg are in the undefined territory of message and/or keep and write variable value in the territory and message is encrypted;
Step S204, transmit leg is sent to the recipient with this message.
In the correlation technique, the partial bytes in the message that transmit leg sends does not wherein comprise significant content for keeping territory or undefined territory, and general way is that this territory is all filled out 0.If to value is that encrypt in zero reservation territory or undefined territory, malicious user by disclosed cryptographic algorithm, encrypt before and encrypt after content may calculate the value of encryption key, thereby utilize encryption key that the other guide of message is decrypted, make that the fail safe of system is lower.In the method that the embodiment of the invention provides,, make malicious user can't learn the content before encrypting, thereby can't go out encryption key by backstepping, improved the fail safe of system by with writing variable value in undefined territory and/or the reservation territory.
Preferably, the process of transmit leg encrypting messages can include but not limited to one of following:
(1) content in the part or all of territory except that undefined territory and/or reservation territory in the transmit leg encrypting messages.
Wherein, the process of the content in the whole territories except that undefined territory and/or reservation territory can realize by one of following dual mode in the transmit leg encrypting messages:
1. variable value is inserted in all territories of transmit leg general, then data encrypted is write the whole territories except that undefined territory and/or reservation territory.
2. the content after transmit leg will be encrypted writes in the message except that undefined territory and/or keeps whole territories the territory, will keep the territory then and/or undefined territory writes variable value.
Because what write in undefined territory and/or the reservation territory is variable value, malicious user can't be learnt content wherein, therefore, can the content in these two territories not encrypted, and,, also can only encrypt important territory for the territory except that undefined territory and/or reservation territory, so that reduce the workload of transmit leg, improve the treatment effeciency of transmit leg.
(2) content in the whole territories in the transmit leg encrypting messages.
As a kind of optional mode, the content in the whole territories in also can encrypting messages makes the recipient only need whole territories of decrypt, has reduced the process that recipient and transmit leg carry out the agreement of encrypted domain, has improved the treatment effeciency of system from another angle.In actual applications, can be according to the content choice that message is carried concrete cipher mode.
Fig. 3 is the detail flowchart according to the message treatment method of the embodiment of the invention, preferably, after the step S204, can also comprise:
Step S306, the recipient is decrypted message;
Step S308, recipient obtain the content that carry in the territory except that undefined territory and/or reservation territory in the message according to the type of message.
Therefore variable value can, in order to reduce recipient's processing load, can only obtain the content that carry in the territory except that undefined territory and/or reservation territory in the message for not containing meaningful content.Certainly, variable value also can be significant content, and correspondingly, the recipient should obtain the content that carry in each territory of comprising undefined territory and/or keeping the territory.
Preferably, transmit leg also is sent to the recipient with the cipher key index of the key correspondence that encrypting messages adopted, and correspondingly, step S306 can comprise: the recipient obtains corresponding key according to cipher key index, and adopts key that message is decrypted.In this preferred implementation, transmit leg and recipient place store a plurality of keys and corresponding cipher key index thereof, transmit leg is except sending message, also send cipher key index, so that inform the key that the recipient adopts, can further increase the difficulty that cracks key, thus the fail safe that improves system further.
Need to prove that represent when the value of cipher key index is a preset value outside the cipher key index value span that this message do not encrypt, at this moment, the recipient need not to be decrypted.
Preferably, transmit leg is sent to the recipient with the cipher key index of the key correspondence that encrypting messages adopted and comprises: transmit leg is carried on cipher key index in other message outside the message, is sent to the recipient by mode expressly; Perhaps transmit leg with cipher key index write message be used for carry cipher key index and the unencrypted territory is sent to the recipient.
In order to make the recipient can obtain cipher key index, can be sent to the recipient by this cipher key index was carried or carried in the unencrypted territory to other message in this message mode, to guarantee that the recipient can obtain this cipher key index, and, because malicious user can't obtain a plurality of keys of recipient and the storage of transmit leg place, therefore, though send cipher key index by mode expressly, malicious user still can't obtain key, has guaranteed the fail safe of system.
Preferably, variable value comprises the business information of arranging between random number, transmit leg and the recipient.Wherein, random number can be that transmit leg produces in this locality.Adopt the method for random number fairly simple; The method of the business information of arranging between employing transmit leg and the recipient can leave the space of setting, the flexibility that has improved function to the user.
Preferably, transmit leg is an optical line terminal OLT, and the recipient is an optical network unit ONU; Perhaps transmit leg is ONU, and the recipient is OLT, can adopt this method to guarantee the fail safe of PON system.
Preferably, message is physical layer operations management maintenance PLOAM message or ONU management control interface OMCI message.These two kinds of message all contain above-mentioned undefined territory and/or keep the territory, still, need to prove that any message that comprises the territory of immobilized substance all is applicable to said method, is not limited to PLOAM message or OMCI message.
Fig. 4 is that it comprises according to the structured flowchart of a kind of message dispensing device of the embodiment of the invention:
Writing module 42 is used for writing variable value in the undefined territory and/or the reservation territory of message;
Encrypting module 44 is coupled in writing module 42, is used for message is encrypted;
Sending module 46 is coupled in encrypting module 44, is used to send this message.
Also has another coupled structure between each module of this message dispensing device, Fig. 9 is the structured flowchart according to another message dispensing device of the embodiment of the invention, as shown in Figure 9, in this message dispensing device, writing module 42 is coupled in encrypting module 44, and sending module 46 is coupled in writing module 42.
The message dispensing device that the embodiment of the invention provides, makes malicious user can't learn the content before encrypting, thereby can't go out encryption key by backstepping writing variable value in undefined territory and/or the reservation territory by writing module 42, has improved the fail safe of system.Need to prove that in the PON system, this message dispensing device can be ONU, the recipient can be OLT, and perhaps, the message dispensing device can be OLT, and the recipient can be ONU.
The technical scheme that following embodiment 1 and embodiment 2 combine above-mentioned a plurality of preferred embodiments.
Embodiment 1
OLT and ONU place have stored key, the key of encrypted group broadcast PLOAM message and the key of broadcast encryption PLOAM message of encrypting clean culture PLOAM message.When the PLOAM message that OLT (ONU) sends for ONU (OLT) need be encrypted, OLT and ONU adopted following step to finish the encryption and decryption of PLOAM message:
Step 1, the form that OLT (ONU) gives the PLOAM message that ONU (OLT) sends as shown in Figure 5, cipher key index can be between ONU-ID and Message ID, also can be between Message ID and Data, also can be between Data and CRC.If this PLOAM message does not need to encrypt, then OLT (ONU) is filled to the value in cipher key index territory complete 0, and the value of this PLOAM message each several part is inserted respectively in the corresponding territory; If this PLOAM message needs to encrypt, then OLT (ONU) at first produces random number in this locality, and all territories of this PLOAM message are all inserted random number, OLT (ONU) is with the ONU-ID in the PLOAM message then, the cipher key index of type of message and this PLOAM message of encryption is inserted respectively in the corresponding domain of this PLOAM message, and utilize this encryption key that the data division of PLOAM message is encrypted, remove the value of other parts that keep territory and undefined territory in the PLOAM message data territory after OLT (ONU) will encrypt and insert respectively in the corresponding data field, last OLT (ONU) inserts checking data and sends to ONU (OLT) in the checking data territory.
In step 1, if this PLOAM message needs to encrypt, OLT (ONU) judges that according to the type of message of described PLOAM message described PLOAM message is clean culture, multicast or broadcasting PLOAM message, and adopt the encryption key of clean culture, multicast or broadcasting that the content of described PLOAM message is encrypted, and the cipher key index of correspondence is written to the cipher key index territory of PLOAM message according to judged result.
Step 2:ONU (OLT) receives the PLOAM message that OLT (ONU) sends in step 1 after, at first this PLOAM message is carried out verification, if described PLOAM message check results mistake, then abandon this PLOAM message, otherwise ONU (OLT) judges according to the ONU-ID of this PLOAM message whether this PLOAM message sends to oneself, if this PLOAM message does not send to oneself, then abandon this PLOAM message, otherwise ONU (OLT) judges according to the value of cipher key index whether this PLOAM message is to encrypt PLOAM message, if the value of cipher key index is 0, then ONU (OLT) judges that described PLOAM message does not have to encrypt and directly obtain the content of PLOAM message, otherwise ONU (OLT) obtains to encrypt the encryption key of described PLOAM message according to the value of cipher key index, and utilizing described encryption key that the content of PLOAM message is decrypted, last ONU (OLT) obtains to remove in the described PLOAM message content of other parts that keep territory and undefined territory according to the type of message of described PLOAM message.
In the present embodiment, adopt OLT (ONU) that random number is inserted in all territories of PLOAM message, to in the data field non-reservation territory and non-undefined territory data encrypted be write in the territory corresponding in the data field then, in other embodiment, the content in the PLOAM message data territory after also can adopting OLT (ONU) to encrypt writes data field, then reservation territory in the data field and undefined territory is write random number.
Present embodiment is encrypted the data division of PLOAM message, also can encrypt the other guide of PLOAM message.
Present embodiment is the encryption and decryption method that example has illustrated the PLOAM message that the present invention proposes with GPON, and the present invention also can be used for based on the of future generation PON technology of GPON technology for the basis.
Embodiment 2
When the OMCI message that OLT (ONU) sends for ONU (OLT) need be encrypted, OLT and ONU adopted following step to finish the encryption and decryption of OMCI message:
Step 1, OLT (ONU) at first writes OMCI message with the business tine of itself and ONU (OLT) agreement to be kept in territory and the undefined territory, OLT (ONU) inserts the each several part content of OMCI in other territories of this OMCI message then, and utilize encryption key that the whole territories of OMCI message are encrypted, and the cipher key index of OMCI message after will encrypting and encryption key correspondence is sent to ONU (OLT).
Step 2:ONU (OLT) receives the OMCI message that OLT (ONU) sends in step 1 after, obtain to encrypt the encryption key of described OMCI message according to the value of cipher key index, and utilize described encryption key that the content of OMCI message is decrypted, and obtain the content in the described OMCI message.
Present embodiment is the encryption and decryption method that example has illustrated the OMCI message that the present invention proposes with GPON, and the present invention is used for based on the of future generation PON technology of GPON technology for the basis.
Fig. 6 is the flow chart according to the another kind of message treatment method of the embodiment of the invention, and this method may further comprise the steps:
Step S602, transmit leg is with the content-encrypt in the territory except that undefined territory and/or reservation territory in the message to be sent;
Step S604, the message after transmit leg will be encrypted is sent to the recipient.
In the correlation technique, the partial bytes in the message that transmit leg sends does not wherein comprise significant content for keeping territory or undefined territory, and general way is that this territory is all filled out 0.If to value is that encrypt in zero reservation territory or undefined territory, malicious user by disclosed cryptographic algorithm, encrypt before and encrypt after content may calculate the value of encryption key, thereby utilize encryption key that the other guide of message is decrypted, make that the fail safe of system is lower.In the method that the embodiment of the invention provides, by content-encrypt with the territory except that undefined territory and/or reservation territory in the message to be sent, the content in undefined territory and/or reservation territory is not encrypted, make malicious user can't learn the content after encrypt in undefined territory and/or reservation territory, thereby can't go out encryption key by backstepping, improve the fail safe of system.
Fig. 8 is the another detail flowchart according to the message treatment method of the embodiment of the invention, preferably, after the step S604, can also comprise:
Step S806, the recipient is decrypted message;
Step S808, recipient obtain the content that carry in the territory except that undefined territory and/or reservation territory in the message according to the type of message.
Owing to do not contain meaningful content in undefined territory and/or the reservation territory, therefore,, can only obtain the content that carry in the territory except that undefined territory and/or reservation territory in the message in order to reduce recipient's processing load.
Preferably, transmit leg also is sent to the recipient with the cipher key index of the key correspondence that encrypting messages adopted, and correspondingly, step S806 can comprise: the recipient obtains corresponding key according to cipher key index, and adopts key that message is decrypted.In this preferred implementation, transmit leg and recipient place store a plurality of keys and corresponding cipher key index thereof, transmit leg is except sending message, also send cipher key index, so that inform the key that the recipient adopts, can further increase the difficulty that cracks key, thus the fail safe that improves system further.
Need to prove that represent when the value of cipher key index is a preset value outside the cipher key index value span that this message do not encrypt, at this moment, the recipient need not to be decrypted.
Preferably, transmit leg is sent to the recipient with the cipher key index of the key correspondence that encrypting messages adopted and comprises: transmit leg is carried on cipher key index in other message outside the message, is sent to the recipient by mode expressly; Perhaps transmit leg with cipher key index write message be used for carry cipher key index and the unencrypted territory is sent to the recipient.
In order to make the recipient can obtain cipher key index, can be sent to the recipient by this cipher key index was carried or carried in the unencrypted territory to other message in this message mode, to guarantee that the recipient can obtain this cipher key index, and, because malicious user can't obtain a plurality of keys of recipient and the storage of transmit leg place, therefore, though send cipher key index by mode expressly, malicious user still can't obtain key, has guaranteed the fail safe of system.
Preferably, transmit leg is an optical line terminal OLT, and the recipient is an optical network unit ONU; Perhaps transmit leg is ONU, and the recipient is OLT, can adopt this method to guarantee the fail safe of GPON system.
Preferably, message is physical layer operations management maintenance PLOAM message or ONU management control interface OMCI message.These two kinds of message all contain above-mentioned undefined territory and/or keep the territory, still, need to prove that any message that comprises the territory of immobilized substance all is applicable to said method, is not limited to PLOAM message or OMCI message.
Fig. 7 is that it comprises according to the structured flowchart of the another kind of message dispensing device of the embodiment of the invention:
Encrypting module 72 is used for the content-encrypt with message to be sent territory except that undefined territory and/or reservation territory;
Sending module 74 is coupled to encrypting module 72, is used for the message after encrypting is sent to the recipient.
The message dispensing device that the embodiment of the invention provides, by the content-encrypt of encrypting module 72 with the territory except that undefined territory and/or reservation territory in the message to be sent, the content in undefined territory and/or reservation territory is not encrypted, make malicious user can't learn the content after encrypt in undefined territory and/or reservation territory, thereby can't go out encryption key by backstepping, improve the fail safe of system.
Following embodiment 3 combines the technical scheme of above-mentioned a plurality of preferred embodiments.
Embodiment 3
When the OMCI message that OLT (ONU) sends for ONU (OLT) need be encrypted, OLT and ONU adopted following step to finish the encryption and decryption of OMCI message:
Step 1, OLT (ONU) utilizes encryption key that the content in the territory except that keeping territory and undefined territory in the OMCI message is encrypted, the content that keeps in territory and the undefined territory is not encrypted, and the cipher key index of OMCI message after will encrypting and encryption key correspondence is sent to ONU (OLT).
Step 2:ONU (OLT) receives the OMCI message that OLT (ONU) sends in step 1 after, obtain to encrypt the encryption key of described OMCI message according to the value of cipher key index, and utilize described encryption key that the content of OMCI message is decrypted, and obtain the content in the described OMCI message.
Present embodiment is the encryption and decryption method that example has illustrated the OMCI message that the present invention proposes with GPON, and the present invention also can be used for based on the of future generation PON technology of GPON technology for the basis.
In sum, the scheme that the embodiment of the invention provides has solved that the up-downgoing data are easily caused the lower problem of fail safe, the fail safe that has improved service transmission system by intercepting in the correlation technique.
Need to prove, can in computer system, carry out in the step shown in the flow chart of accompanying drawing such as a set of computer-executable instructions, and, though there is shown logical order in flow process, but in some cases, can carry out step shown or that describe with the order that is different from herein.
Obviously, those skilled in the art should be understood that, above-mentioned each module of the present invention or each step can realize with the general calculation device, they can concentrate on the single calculation element, perhaps be distributed on the network that a plurality of calculation element forms, alternatively, they can be realized with the executable program code of calculation element, thereby, they can be stored in the storage device and carry out by calculation element, perhaps they are made into each integrated circuit modules respectively, perhaps a plurality of modules in them or step are made into the single integrated circuit module and realize.Like this, the present invention is not restricted to any specific hardware and software combination.
The above is the preferred embodiments of the present invention only, is not limited to the present invention, and for a person skilled in the art, the present invention can have various changes and variation.Within the spirit and principles in the present invention all, any modification of being done, be equal to replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (11)

1. message treatment method is characterized in that may further comprise the steps:
Transmit leg is in the undefined territory of message and/or keep in the territory and write variable value and encrypt described message;
Described transmit leg is sent to the recipient with described message.
2. method according to claim 1 is characterized in that, described transmit leg is encrypted described message and comprised:
Described transmit leg is encrypted the content in the part or all of territory except that described undefined territory and/or described reservation territory in the described message; Perhaps
Described transmit leg is encrypted the content in the whole territories in the described message.
3. method according to claim 1 is characterized in that, described message is sent to after the recipient, also comprises:
Described recipient is decrypted described message;
Described recipient obtains the content that carry in the territory except that described undefined territory and/or described reservation territory in the described message according to the type of described message.
4. method according to claim 3, it is characterized in that, the cipher key index of the key correspondence that the described message of also will encrypting described transmit leg adopts is sent to described recipient, described recipient is decrypted described message and comprises: described recipient obtains corresponding key according to described cipher key index, and adopts described key that described message is decrypted.
5. method according to claim 4 is characterized in that, the cipher key index that described transmit leg will be encrypted the key correspondence that described message adopts is sent to described recipient and comprises:
Described transmit leg is carried on described cipher key index in other message outside the described message, is sent to described recipient by mode expressly; Perhaps
Described transmit leg with described cipher key index write described message be used for carry described cipher key index and the unencrypted territory is sent to described recipient.
6. method according to claim 1 is characterized in that, described variable value comprises the business information of arranging between random number, described transmit leg and the described recipient.
7. according to each described method in the claim 1 to 6, it is characterized in that described transmit leg is an optical line terminal OLT, described recipient is an optical network unit ONU; Perhaps described transmit leg is ONU, and described recipient is OLT.
8. method according to claim 7 is characterized in that, described message is physical layer operations management maintenance PLOAM message or ONU management control interface OMCI message.
9. a message treatment method is characterized in that, may further comprise the steps:
Transmit leg is with the content-encrypt in the territory except that undefined territory and/or reservation territory in the message to be sent;
The message of described transmit leg after with described encryption is sent to the recipient.
10. a message dispensing device is characterized in that, comprising:
Writing module is used for writing variable value in the undefined territory and/or the reservation territory of message;
Encrypting module is used to encrypt described message;
Sending module is used to send described message.
11. a message dispensing device is characterized in that, comprising:
Encrypting module is used for the content-encrypt with message to be sent territory except that undefined territory and/or reservation territory;
Sending module is used for the message after the described encryption is sent to the recipient.
CN201010165044.1A 2010-04-23 2010-04-23 Message treatment method and message dispensing device Expired - Fee Related CN102237999B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201010165044.1A CN102237999B (en) 2010-04-23 2010-04-23 Message treatment method and message dispensing device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201010165044.1A CN102237999B (en) 2010-04-23 2010-04-23 Message treatment method and message dispensing device

Publications (2)

Publication Number Publication Date
CN102237999A true CN102237999A (en) 2011-11-09
CN102237999B CN102237999B (en) 2016-04-13

Family

ID=44888256

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201010165044.1A Expired - Fee Related CN102237999B (en) 2010-04-23 2010-04-23 Message treatment method and message dispensing device

Country Status (1)

Country Link
CN (1) CN102237999B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110557680A (en) * 2019-07-30 2019-12-10 视联动力信息技术股份有限公司 Audio and video data frame transmission method and system
CN113395615A (en) * 2021-06-10 2021-09-14 烽火通信科技股份有限公司 Message processing method and device, electronic equipment and readable storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1633069A (en) * 2004-12-09 2005-06-29 中国电子科技集团公司第三十研究所 An encryption method applicable to SDH
CN1759585A (en) * 2003-04-04 2006-04-12 艾利森电话股份有限公司 Method for provision of access
CN101140778A (en) * 2006-09-07 2008-03-12 国际商业机器公司 Method and system for recovering remnant encrypted data on a removable storage media
CN101150391A (en) * 2006-09-20 2008-03-26 华为技术有限公司 A method, system and device for preventing optical network unit in passive optical network from being counterfeiting
CN101246615A (en) * 2008-03-07 2008-08-20 北京握奇数据系统有限公司 System and device for long-range managing electronic purse state

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1759585A (en) * 2003-04-04 2006-04-12 艾利森电话股份有限公司 Method for provision of access
CN1633069A (en) * 2004-12-09 2005-06-29 中国电子科技集团公司第三十研究所 An encryption method applicable to SDH
CN101140778A (en) * 2006-09-07 2008-03-12 国际商业机器公司 Method and system for recovering remnant encrypted data on a removable storage media
CN101150391A (en) * 2006-09-20 2008-03-26 华为技术有限公司 A method, system and device for preventing optical network unit in passive optical network from being counterfeiting
CN101246615A (en) * 2008-03-07 2008-08-20 北京握奇数据系统有限公司 System and device for long-range managing electronic purse state

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110557680A (en) * 2019-07-30 2019-12-10 视联动力信息技术股份有限公司 Audio and video data frame transmission method and system
CN110557680B (en) * 2019-07-30 2020-11-27 视联动力信息技术股份有限公司 Audio and video data frame transmission method and system
CN113395615A (en) * 2021-06-10 2021-09-14 烽火通信科技股份有限公司 Message processing method and device, electronic equipment and readable storage medium

Also Published As

Publication number Publication date
CN102237999B (en) 2016-04-13

Similar Documents

Publication Publication Date Title
JP5366108B2 (en) Passive optical network security enhancement based on optical network terminator management control interface
CN100596060C (en) A method, system and device for preventing optical network unit in passive optical network from being counterfeiting
JP3774455B2 (en) Data transfer method in Ethernet (registered trademark) passive optical network system
CN101998193B (en) The cryptographic key protection method of EPON and system
CN101183934A (en) Cipher key updating method in passive optical network
CN103023579A (en) Method for conducting quantum secret key distribution on passive optical network and passive optical network
US20110167487A1 (en) Method, system and device for enabling user side terminal to obtain password
CN203251308U (en) Passive optical network
US8942378B2 (en) Method and device for encrypting multicast service in passive optical network system
CN101247220B (en) Method for cryptographic key exchange of passive optical network system
CN101778311A (en) Distribution method of optical network unit marks and optical line terminal
CN101282177B (en) Data transmission method and terminal
CN102237999B (en) Message treatment method and message dispensing device
CN101499898A (en) Method and apparatus for cipher key interaction
CN101998180B (en) Method and system for supporting version compatibility between optical line terminal and optical network unit
WO2014101084A1 (en) Authentication method, device and system
CN101388806B (en) Cipher consistency detection method and apparatus
CN102148682B (en) A kind of method and system that the abnormal optical network unit of luminescence is correctly located
CN101998188A (en) Encryption/decryption method and system for passive optical network
CN103684762A (en) Method for enhancing transmission security in PON (Passive Optical Network)
CN102130825B (en) Data processing method for passive optical network system, optical line terminal and system
CN220421835U (en) Quantum key distribution system for safe transmission
CN117748480A (en) Quantum-safe power load management system
CN102036128A (en) Method and system for realizing information interaction security in Gigabit-capable passive optical network

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20160413

Termination date: 20190423