WO2005112336A1 - 暗号機能付きponシステム及びponシステムの暗号化方法 - Google Patents
暗号機能付きponシステム及びponシステムの暗号化方法 Download PDFInfo
- Publication number
- WO2005112336A1 WO2005112336A1 PCT/JP2004/006897 JP2004006897W WO2005112336A1 WO 2005112336 A1 WO2005112336 A1 WO 2005112336A1 JP 2004006897 W JP2004006897 W JP 2004006897W WO 2005112336 A1 WO2005112336 A1 WO 2005112336A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- encryption key
- subscriber
- encryption
- pon system
- new
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims description 32
- 230000003287 optical effect Effects 0.000 claims description 16
- 238000004364 calculation method Methods 0.000 claims description 9
- 230000001360 synchronised effect Effects 0.000 abstract description 8
- 230000005540 biological transmission Effects 0.000 description 32
- 238000010586 diagram Methods 0.000 description 21
- 238000000605 extraction Methods 0.000 description 5
- 238000011144 upstream manufacturing Methods 0.000 description 4
- 238000013215 result calculation Methods 0.000 description 3
- 238000004891 communication Methods 0.000 description 2
- 239000000284 extract Substances 0.000 description 2
- 239000013307 optical fiber Substances 0.000 description 2
- 230000003111 delayed effect Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 230000000737 periodic effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/12—Transmitting and receiving encryption devices synchronised or initially set up in a particular manner
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
Definitions
- the present invention relates to a PON (Passive Optical Network) system, more specifically, a PON system that transmits a variable-length bucket such as a Gigabit Ethernet (registered trademark) P-ON (Gigabit Ethernet P0N or less GE—PON) system. More particularly, the present invention relates to a method for encrypting a PON system and a P ⁇ N system with a symbol function related to periodic updating of an encryption key.
- a PON Passive Optical Network
- the GE-PON system is currently in the final stage of standardization in IEEE. However, there is no specific provision for encryption at present.
- data is transmitted and received between an optical line terminal (hereinafter referred to as “OLT”) and a subscriber side device (hereinafter referred to as “ONU”).
- OLT optical line terminal
- ONU subscriber side device
- data transmission in the direction from the OLT to the ONU (hereinafter referred to as “down”) is broadcasted, so encryption is considered to be an essential item for ensuring security.
- FIG. 983.1 a broadband PON (Passive Optical Network) system that provides video services using WDM (Wavelength Division Multiplex), a so-called B — Proposals have been made for encryption of PON (Bro adband Passive Optical Network) systems.
- Figure 1 shows the direction from ONU to OLT indicated in Figure 11 (G.983.1-Frame format for 155.5 2 / 155.52 Mbit / s PON) of the above ITU-T recommendation (hereinafter referred to as “uplink”). ”) (The upstream frame).
- uplink The upstream frame.
- the B-PON system has a configuration in which an uplink frame can transmit 53 fixed-length cells (burst data) of 56 bytes.
- One burst data is composed of a 3-byte overhead H and a 53-byte data area (an area for inserting an ATM cell). Therefore, the breaks in the phase of the transmitted data are very clear.
- This uplink data transmission is a method in which transmission of one ONU is permitted in advance by the OLT for each time slot. For this reason, it is very easy to synchronize the switching timing of the No. key between the ONU and the OLT. For example, this can be realized by inserting a message of an instruction to update and change the encryption key such as “switch from the frame after a predetermined number” into the ATM cell (for example, see Non-Patent Reference 1).
- the transmission data is a variable-length packet.
- B The timing cannot be synchronized in the same way as the PON system.
- the present invention has been made in view of the above-described problems of the related art, and in a system in which transmission data is a variable-length bucket, the timing for switching] ⁇ between 0] ⁇ 11 and 0 is set.
- PON system with encryption function that can be synchronized and DISCLOSURE OF THE INVENTION FOR PROVIDING THE ENCRYPTION METHOD OF A PON SYSTEM
- one of the ONU and the OLT in the PON system transmitting variable-length packets, one of the ONU and the OLT generates the time adjusting means for synchronizing the time information of the ONU and the OLT. While transmitting the new encryption key to the other, the encryption means that each of ONU and OLT stores the new encryption key, and one of ONU and OLT transmits the key switching time to the other, Each of O NU and ⁇ LT has a key encryption key switching synchronization means for switching the encryption to a new encryption key at the encryption key switching time, and is variable between ⁇ NU and ⁇ LT while periodically switching the encryption key. The transmission of long packets is performed.
- the ONU and the OLT in a PON system transmitting a variable-length packet, can update the encryption key from the old encryption key to the new encryption key and synchronize the timing of switching to the new encryption key. it can.
- the new encryption key generated by either / is transmitted to the other, and the subscriber unit and the central unit store the new encryption key, respectively.
- One of them transmits the encryption key switching time to the other, and thereafter, the subscriber unit and the optical line terminal each have a key encryption key switching synchronization step of switching the encryption to a new encryption key at the encryption key switching time.
- a special feature is to transmit variable-length packets while selectively switching encryption keys.
- the encryption key can be updated from the old encryption key to the new encryption key between the ONU and the OL of the ⁇ ⁇ ⁇ ⁇ ⁇ system transmitting the variable-length bucket, and the key can be switched to the new key.
- Timing can be synchronized.
- Fig. 1 shows the format of uplink transmission data proposed in ITU-T recommendation G. 983.1
- Fig. 2 shows, for example, the GE-PON of IEEE 802.3aH.
- FIG. 3 is a system diagram showing a network configuration
- FIG. 3 is a diagram showing a protocol reference model of GE-PON
- FIG. 4 is a block diagram for explaining time adjusting means and a time adjusting step of the present invention.
- FIG. 1 shows the format of uplink transmission data proposed in ITU-T recommendation G. 983.1
- Fig. 2 shows, for example, the GE-PON of IEEE 802.3aH.
- FIG. 3 is a system diagram showing a network configuration
- FIG. 3 is a diagram showing
- FIG. 5 is a block diagram illustrating an example of the encryption key updating means and the encryption key updating step of the present invention.
- FIG. 6 is a block diagram illustrating another example of the encryption key updating means and the encryption key updating step of the present invention.
- FIG. 7 is a block diagram and a timing chart for explaining still another example of the encryption key updating means and the encryption key updating step of the present invention, and
- FIG. 8 is an encryption key updating method of the present invention.
- An example of the chain switching synchronization means and the key number key switching synchronization process will be described.
- FIG. 9 is a block diagram and a sequence chart for explaining another example of the encryption key switching synchronization means and the key number key switching synchronization process of the present invention.
- FIG. 11 is a functional block diagram showing the configuration of the PON control unit on the ONU side in the sixth embodiment.
- FIG. 12 is an example of a GATE message transmitted by the OLT 15 to the NU 13;
- FIG. 13 is a block diagram illustrating the operation of the encryption key switching synchronization means and the key encryption key switching synchronization process of the present embodiment. And a sequence chart.
- FIG. 2 is a system diagram showing a GE-PON network form shown in, for example, IEEE 802.3aH.
- Fig. 3 is a diagram showing a GE-PON protocol reference model.
- the PON system accommodates one or more subscriber terminals 11 (only one subscriber terminal 11 is shown in FIG. 2), and accommodates one or more ONUs 13 and is connected to the IP network 17.
- OLT 1 5 has a plurality of PON interfaces 15A, 15B, 15C as shown in Fig. 3, and each PON interface 15A, 15B, 15 has a corresponding ONU 13 Communication control.
- the OLT 15 and the ONU 13 are connected by an optical fiber 14, and the optical fiber 14 is physically split by a splitter 12 and extends to each ONU 13.
- FIG. 4 is a block diagram for explaining the time adjusting means and the time adjusting step of the present invention.
- a media access control client unit (MAC control client, hereinafter referred to as a “client unit”) of the OLT 15 15 .
- the gate message 23 includes information of “start” which is the start timing of using the slot and “length” using the slot.
- start is the start timing of using the slot
- length is the length of the slot.
- a plurality of ONUs 13 are connected to the OLT 15 and one slot is used in a time-sharing manner in correspondence with the plurality of ONUs 13 based on this information.
- the gate message 23 generated by the client unit 15 a is transmitted to a media access control unit (MAC control, hereinafter referred to as “MAC control unit”) 15 b under the gate message 23, where the gate message 23 is transmitted to the clock register 21.
- Clock information time stamp value
- TS time stamp value
- the time when the NU 13 sets the value of the time stamp in the clock register 25 is delayed by a predetermined transmission time difference from the time when the OLT 15 performs the time stamp. This delay time is always constant. Therefore, OLT 15 and ONU13 are always Then, the operation is performed based on the clock information shifted by a predetermined transmission time difference.
- the gate message 23 is periodically notified from the OLT 15 to the ONU 13 at a predetermined time interval. Therefore, even if either clock information comes due to some reason, it will be corrected after a predetermined time.
- the MAC control section 15b of the OLT 15 and the MAC control section 13b of the ONU 13 constitute time adjusting means for synchronizing time information between the OLT 15 and the ONU 13.
- the operation of time adjustment performed by both of them constitutes a time adjustment process.
- FIG. 5 is a block diagram illustrating an example of the encryption key updating means and the encryption key updating step of the present invention.
- a calculation result for example, a hash value of a password
- the encryption key is used as the encryption key.
- the authentication unit 33 of the ONU 13 causes the calculation result calculation unit 27 of the encryption control unit 26 to calculate a new calculation result, and stores this value in the PON control unit 35 of the ONU 13. At the same time, the calculation result is transmitted to the LT 15 via the PON control unit 35 by the authentication frame 41.
- the operation result extraction unit 29 of the encryption control unit 28 extracts the operation result from the authentication frame received by the PIN control unit 37 according to the instruction of the authentication unit 33, and sends it to the PON control unit 37.
- the calculation result transmitted from the ONU 13 to the OLT 15 is used for the operation of the authentication sequence as usual, and the transmission data is transmitted when the control units 35 and 37 transmit and receive the frame. Is used when encrypting and decrypting.
- Calculation result calculation part 27 and request part 31 of ONU13 and calculation result extraction of OLT 15 The unit 29 and the authentication unit 33 constitute an encryption key updating unit. Further, the transmission and storage of the symbol key performed by the operation result calculation unit 27 and the request unit 31, and the operation result extraction unit 29 and the authentication unit 33 constitute an encryption key update process.
- the ONU 13 generates a key and transmits it to the OLT 15.
- the present invention is not limited to this.
- the OLT 15 generates an encryption key and transmits it to the ONU 13. You may make it.
- the encryption key updating means In the PON system with the encryption function having such a configuration, the encryption key updating means generates a new encryption key based on the calculation result of the authentication sequence. Therefore, in a system having an authentication procedure, key information can be exchanged without adding a special frame, and cost can be reduced.
- FIG. 6 is a block diagram and a time chart explaining another ⁇ column> of the encryption key updating means and the encryption key updating step of the present invention.
- extended OAM Operations, Administration & Maintenance
- the procedure for updating the encryption key is performed using the extended OAM message.
- the OAM control unit 43 of the OLT 15 notifies the NU 13 of a message of a new encryption key request to acquire a new encryption key. Specifically, the PON control unit 37 notifies the ONU 13 of the extended OAM message "GetRequest" as the OAM frame 43.
- This message is received by the OAM control unit 41 of the ONU 13. Then, based on an instruction from the OAM control unit 41, the encryption key generation unit 33 of the encryption control unit 26 generates a new encryption key using, for example, a Nosh value. Then, the ONU 13 notifies the OLT 15 of this new key as an OAM frame 44 using the message “GetResponse”. Note that ⁇ does not have to be a hash value, and a special random number is generated. It may be generated based on this.
- the OAM controller 41 of ONU 13 After transmitting “GetResponse”, the OAM controller 41 of ONU 13 sets the new key to the PON controller 35. After receiving "GetResponse", the OAM controller 43 of the OLT 15 sets a new encryption key in the PON controller 37.
- the OAM control unit 43 monitors the reception of "GetResponse" for "GetRequest” with a timer, and performs a transmission retry three times in the case of a time out. After retrying out, wait for the next encryption key update timing and send a new "GetRequest".
- the encryption key generation unit 33 and OAM control unit 41 of ONU 13 and the operation result extraction unit 29 and OAM control unit 43 of OLT 15 constitute a No. key update unit.
- the transmission and storage of the encryption key performed by the encryption key generation unit 33 and the OAM control unit 41, the operation result extraction unit 29, and the OAM control unit 43 constitute an encryption key update process.
- ONU 13 generates an encryption key and transmits it to OLT 15.
- OLT 15 generates an encryption key and generates May be transmitted to O NU 13.
- the key information can be updated even in a system having no authentication function as in the first embodiment. Also, by performing retry transmission, no discrepancy in key information occurs when a frame is lost due to a transmission path error or the like.
- FIG. 7 is a block diagram and a time chart illustrating still another example of the encryption key updating means and the encryption key updating step of the present invention.
- a special message is created by the application, and the procedure for updating the encryption key is performed using the created message.
- the signal controller 28 of the OLT 15 sends this specially created message “new encryption key request” to the key request frame 45 via the PON controller 37 to obtain the encryption key. To notify ONU13. In the ONU 13 receiving this, the signal control unit 26 generates a new encryption key using, for example, a nose value in response thereto. Then, the ONU 13 notifies the OLT 15 of the message “encryption key notification” of the new encryption key as the key notification frame 46.
- the encryption control unit 26 of the ONU 13 After transmitting the “encryption key notification”, the encryption control unit 26 of the ONU 13 sets the new encryption key in the PON control unit 35. After receiving the “encryption key notification”, the encryption control unit 28 of the OLT 15 sets the new encryption key in the PON control unit 37. The encryption control unit 28 of the OLT 15 monitors the reception of the “encryption key notification” for the “new encryption key request” with a timer, and performs a transmission retry three times in the case of a timeout. After retrying out, it waits for the next encryption key update timing and sends a new “new key request”.
- the encryption control unit 26 of the ONU 13 and the encryption control unit 28 of the OLT 15 constitute an encryption key updating means.
- the transmission and storage of the encryption key performed by the B-sound control unit 26 and the encryption control unit 28 constitute an updating process.
- ONU 13 generates an encryption key and transmits it to ⁇ LT15.
- ⁇ LT15 generates an encryption key and sends this to ONU13. It may be transmitted.
- FIG. 8 is a block diagram and a sequence chart illustrating an example of the encryption key switching synchronization means and the key encryption key switching synchronization step of the present invention.
- the time information between the OLT 15 and the ONU 13 has already been synchronized by the time adjusting means of the first embodiment.
- any one of the encryption key updating means according to Embodiments 2 to 4 It is assumed that the new encryption key has already been stored.
- the PON control unit 37 of the OLT 15 transmits the “downlink key update time message”, which is an update time frame 51.
- the “key update time message” includes a “downlink key update time (T1)” for switching to a new encryption key.
- T1 downlink key update time
- the OLT15 and ON Ul 3 are in the downstream direction when they reach this time. However, if this time is just during transmission or reception of a frame, the transmission or reception of that frame is continued as is, and the reception operation is continued, and the next frame is transmitted. When the transmission operation or the reception operation is started, the encryption is switched to the new encryption key.
- the “downlink key update time message” may be transmitted, in which case the switching operation is performed even if the specified time is reached. I can't.
- the encryption mode is changed to the non-encryption mode. It can be used as a switching instruction message.
- This "downlink key update time message" is transmitted three times redundantly for error protection.
- the encryption control unit 26 and the PON control unit 35 of the ONU 13 and the signal control unit 28 and the PON control unit 37 of the OLT 15 constitute a key encryption key switching synchronization unit.
- the switching operation to the new encryption key performed by the encryption control unit 26 and the PON control unit 35 and the encryption control unit 28 and the PON control unit 37 constitutes a key encryption key switching synchronization step.
- the key update time can be synchronized between the OLT 15 and the ONU 13, and no frame loss occurs at the time of key update. In other words, data is not lost.
- three redundant transmissions may cause loss of time message due to transmission path error, deviation of key update time, or non-updateable state None.
- FIG. 9 is a block diagram and a sequence chart for explaining another example of the encryption key switching synchronization means and the key encryption key switching synchronization step of the present invention.
- the ONU 13 notifies the OLT 15 of the encryption key switching time for uplink transmission.
- the time of switching to the new encryption key for upstream transmission from 01 ⁇ 1113 to 0 Notified.
- the notification of the encryption key switching time from ONU 13 to OLT 15 is thus transmitted in three consecutive bursts for error protection.
- this message is not transmitted when the uplink encryption processing is in the non-encryption mode.
- the ONU 13 can notify the OLT 15 of the encryption key switching time. Then, the key update time can be synchronized between the OLT 15 and the ONU 13, and no frame loss occurs at the time of key update. In other words, data is not lost.
- three redundant transmissions do not cause loss of a time message due to a transmission line error, a shift in key update time, or a state in which updating is impossible. Also, by setting the time information to a special value such as "0", it can be used as a mode switching instruction.
- FIG. 10 is a functional block diagram showing a configuration of a PON control section on the OLT side according to a sixth embodiment.
- FIG. 11 is a functional block diagram showing a configuration of a P ⁇ N control unit on the ONU side according to the sixth embodiment.
- the OLT 15 instructs the encryption key switching timing by transmitting to the ONU 13 a message including a flag indicating the timing of switching ⁇ ′′ ⁇ .
- the slot management section 63 determines the timing of switching to the new encryption key.
- the Gate generation unit 62 receives the flag generated by the flag generation unit 61 based on the symbol calculated by the encryption control unit 28 based on the instruction from the slot management unit 63 and the time information managed by the time management unit 64. Create a Gate message and send it to ONU13.
- the slot management section 63 notifies the switching management section 65 of the timing of switching to the new encryption key.
- the switching management unit 65 transmits the new encryption key of the encryption control unit 28 to the decryption unit 66 based on the timing from the slot management unit 63.
- the decryption unit 66 decrypts the cipher text transmitted from ONU 13 equally based on the new encryption key.
- the Gate extractor 71 receives the Gate message, the flag extractor 72 extracts a flag from the Gate message, and stores this in the encryption controller 26.
- the G ate message is also transmitted to the slot management unit 73.
- the slot management unit 73 determines the timing of switching the number key from the time information managed by the time management unit 74 and transmits it to the switching management unit 75.
- the switching management unit 75 transmits the new encryption key from the encryption control unit 26 to the encryption unit 76.
- the encryption unit 76 converts the plaintext transmission data into a ciphertext with a new code " ⁇ " and outputs it.
- Figure 12 is an example of a GATE message sent by OLT 15 to ONU 13.
- the Gate message according to the present embodiment has a “Key update flag” field added to the Gate message specified in IEEE 802.3ah. . This flag indicates a burst for switching the encryption key in the upstream direction.
- FIG. 13 is a block diagram and a sequence chart for explaining the operation of the encryption key switching synchronization means and the key encryption key switching synchronization step of the present embodiment.
- the OLT 15 notifies the ONU 13 of the Gate message shown in FIG. 12 as a Gate frame 55, thereby instructing a burst for switching the encryption key in the upstream direction.
- ONU 13 switches the encryption key to be used in the uplink from the indicated burst.
- the OLT 15 determines the switching timing in consideration of the delay time caused by the transmission delay. In non-encryption mode, this flag is not used.
- the OLT 15 can notify the ONU 13 of the encryption key switching time. Then, the key update time can be synchronized between the OLT 15 and the ONU 13, and no frame loss occurs at the time of key update. In other words, data is not lost.
- the PON system with the encryption function and the encryption method of the PON system according to the present invention are provided for encrypting a PON system transmitting a variable-length bucket such as a Gigabit Ethernet (registered trademark) PON system.
- a variable-length bucket such as a Gigabit Ethernet (registered trademark) PON system.
- This is particularly suitable for a PON system that periodically updates a cryptographic key.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Small-Scale Networks (AREA)
Abstract
Description
Claims
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/587,585 US20080247550A1 (en) | 2004-05-14 | 2004-05-14 | Pon System with Encryption Function and Encryption Method of Pon System |
JP2006513487A JPWO2005112336A1 (ja) | 2004-05-14 | 2004-05-14 | 暗号機能付きponシステム及びponシステムの暗号化方法 |
PCT/JP2004/006897 WO2005112336A1 (ja) | 2004-05-14 | 2004-05-14 | 暗号機能付きponシステム及びponシステムの暗号化方法 |
CN200480042824.XA CN1943162A (zh) | 2004-05-14 | 2004-05-14 | 带加密功能的pon系统和pon系统的加密方法 |
EP04733117A EP1746760A1 (en) | 2004-05-14 | 2004-05-14 | Pon system having encryption function and encryption method of the pon system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/JP2004/006897 WO2005112336A1 (ja) | 2004-05-14 | 2004-05-14 | 暗号機能付きponシステム及びponシステムの暗号化方法 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2005112336A1 true WO2005112336A1 (ja) | 2005-11-24 |
Family
ID=35394502
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2004/006897 WO2005112336A1 (ja) | 2004-05-14 | 2004-05-14 | 暗号機能付きponシステム及びponシステムの暗号化方法 |
Country Status (5)
Country | Link |
---|---|
US (1) | US20080247550A1 (ja) |
EP (1) | EP1746760A1 (ja) |
JP (1) | JPWO2005112336A1 (ja) |
CN (1) | CN1943162A (ja) |
WO (1) | WO2005112336A1 (ja) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2007235371A (ja) * | 2006-02-28 | 2007-09-13 | Sumitomo Electric Ind Ltd | Ponシステムに使用する端末装置とその送信タイミングの制御方法 |
JP2007267301A (ja) * | 2006-03-30 | 2007-10-11 | Fujitsu Access Ltd | 暗号化通信システム及び暗号鍵更新方法 |
JP2008048101A (ja) * | 2006-08-14 | 2008-02-28 | Fujitsu Ltd | データ復号装置およびデータ暗号化装置 |
JP2009201115A (ja) * | 2009-02-24 | 2009-09-03 | Hitachi Communication Technologies Ltd | 暗号化装置を備えた光アクセスシステムおよびその暗号化方法 |
JP2009535943A (ja) * | 2006-04-28 | 2009-10-01 | クゥアルコム・インコーポレイテッド | 暗号化設定における変更中の中断されない送信 |
JP2010183494A (ja) * | 2009-02-09 | 2010-08-19 | Hitachi Ltd | 光ネットワークシステムおよび暗号化鍵の切り替え方法 |
CN101102152B (zh) * | 2006-07-03 | 2011-05-11 | 华为技术有限公司 | 无源光网络中保证数据安全的方法 |
JP2012238991A (ja) * | 2011-05-11 | 2012-12-06 | Sumitomo Electric Ind Ltd | 局側装置、宅側装置、光通信システム、および光通信システムの制御方法 |
CN103138918A (zh) * | 2011-11-28 | 2013-06-05 | 中兴通讯股份有限公司 | 避免gpon系统加密使能瞬间丢包的方法、装置及系统 |
JP2014075661A (ja) * | 2012-10-03 | 2014-04-24 | Mitsubishi Electric Corp | 通信装置、子局装置、制御装置、通信システムおよび通信制御方法 |
Families Citing this family (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR100675836B1 (ko) * | 2004-12-10 | 2007-01-29 | 한국전자통신연구원 | Epon 구간내에서의 링크 보안을 위한 인증 방법 |
JP4596256B2 (ja) * | 2005-08-02 | 2010-12-08 | ソニー株式会社 | 送受信システムおよび方法、送信装置および方法、受信装置および方法、並びにプログラム |
US8069475B2 (en) * | 2005-09-01 | 2011-11-29 | Alcatel Lucent | Distributed authentication functionality |
US8509435B2 (en) * | 2006-12-07 | 2013-08-13 | Broadcom Corporation | Method and system for a transport single key change point for all package identifier channels |
CN101394265B (zh) * | 2007-09-18 | 2012-11-14 | 中兴通讯股份有限公司 | 一种吉比特无源光纤网络系统的加密模式切换方法 |
KR101143810B1 (ko) * | 2007-11-28 | 2012-05-14 | 미쓰비시덴키 가부시키가이샤 | 비트 식별 회로 |
CN101197663B (zh) * | 2008-01-03 | 2010-12-29 | 中兴通讯股份有限公司 | 一种吉比特无源光网络加密业务的保护方法 |
CN101800914B (zh) * | 2009-02-06 | 2014-03-12 | 中兴通讯股份有限公司 | 一种密钥切换方法和系统 |
US8817824B2 (en) * | 2011-12-02 | 2014-08-26 | Ciena Corporation | Optical transport network line management system and methods |
CN103684704B (zh) * | 2012-08-31 | 2018-03-20 | 中兴通讯股份有限公司 | 光网络传输系统端口id加解密使能切换的方法及装置 |
CN103684762A (zh) * | 2012-09-06 | 2014-03-26 | 上海贝尔股份有限公司 | 用于增强无源光网络中的传输安全性的方法 |
US9916567B1 (en) * | 2013-03-15 | 2018-03-13 | Vantiv, Llc | Systems, methods and apparatus for payment terminal management |
US9270651B2 (en) * | 2013-04-05 | 2016-02-23 | Futurewei Technologies, Inc. | Authentication and initial key exchange in ethernet passive optical network over coaxial network |
CN103607277B (zh) * | 2013-11-18 | 2016-08-03 | 中国联合网络通信集团有限公司 | 密钥更新的处理方法、系统和密钥管理平台 |
US9577758B2 (en) * | 2014-04-10 | 2017-02-21 | Tibit Communications, Inc. | Method and system for scheduling cascaded PON |
WO2018052016A1 (ja) * | 2016-09-13 | 2018-03-22 | 日本電信電話株式会社 | Ponシステム、無線ネットワークシステム、データ転送方法、olt、およびonu |
US11678224B2 (en) | 2021-04-28 | 2023-06-13 | Apple Inc. | Aggregating multiple data streams on a communication link |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH07202884A (ja) * | 1993-12-28 | 1995-08-04 | Sony Corp | 送信装置および受信装置 |
JP2000307588A (ja) * | 1999-04-16 | 2000-11-02 | Fujitsu Ltd | 光加入者線終端装置及び光加入者線端局装置 |
JP2003087235A (ja) * | 2001-09-11 | 2003-03-20 | Sony Corp | コンテンツ鍵配信システム、コンテンツ鍵配信方法、および情報処理装置、並びにコンピュータ・プログラム |
JP2003298566A (ja) * | 2002-04-03 | 2003-10-17 | Mitsubishi Electric Corp | 暗号鍵交換システム |
JP2003333023A (ja) * | 2002-05-09 | 2003-11-21 | Toshiba Corp | プラント監視制御用データ中継プログラムおよびシステム |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6185685B1 (en) * | 1997-12-11 | 2001-02-06 | International Business Machines Corporation | Security method and system for persistent storage and communications on computer network systems and computer network systems employing the same |
US20020110245A1 (en) * | 2001-02-13 | 2002-08-15 | Dumitru Gruia | Method and system for synchronizing security keys in a point-to-multipoint passive optical network |
US20020150097A1 (en) * | 2001-02-21 | 2002-10-17 | Wei Yen | Method and apparatus for secured multicasting |
US7301968B2 (en) * | 2001-03-02 | 2007-11-27 | Pmc-Sierra Israel Ltd. | Communication protocol for passive optical network topologies |
US6470032B2 (en) * | 2001-03-20 | 2002-10-22 | Alloptic, Inc. | System and method for synchronizing telecom-related clocks in ethernet-based passive optical access network |
US7260119B2 (en) * | 2001-08-21 | 2007-08-21 | Broadcom Corporation | System, method, and computer program product for ethernet-passive optical networks |
-
2004
- 2004-05-14 US US11/587,585 patent/US20080247550A1/en not_active Abandoned
- 2004-05-14 WO PCT/JP2004/006897 patent/WO2005112336A1/ja not_active Application Discontinuation
- 2004-05-14 CN CN200480042824.XA patent/CN1943162A/zh active Pending
- 2004-05-14 JP JP2006513487A patent/JPWO2005112336A1/ja not_active Withdrawn
- 2004-05-14 EP EP04733117A patent/EP1746760A1/en not_active Withdrawn
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH07202884A (ja) * | 1993-12-28 | 1995-08-04 | Sony Corp | 送信装置および受信装置 |
JP2000307588A (ja) * | 1999-04-16 | 2000-11-02 | Fujitsu Ltd | 光加入者線終端装置及び光加入者線端局装置 |
JP2003087235A (ja) * | 2001-09-11 | 2003-03-20 | Sony Corp | コンテンツ鍵配信システム、コンテンツ鍵配信方法、および情報処理装置、並びにコンピュータ・プログラム |
JP2003298566A (ja) * | 2002-04-03 | 2003-10-17 | Mitsubishi Electric Corp | 暗号鍵交換システム |
JP2003333023A (ja) * | 2002-05-09 | 2003-11-21 | Toshiba Corp | プラント監視制御用データ中継プログラムおよびシステム |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2007235371A (ja) * | 2006-02-28 | 2007-09-13 | Sumitomo Electric Ind Ltd | Ponシステムに使用する端末装置とその送信タイミングの制御方法 |
JP2007267301A (ja) * | 2006-03-30 | 2007-10-11 | Fujitsu Access Ltd | 暗号化通信システム及び暗号鍵更新方法 |
US8948393B2 (en) | 2006-04-28 | 2015-02-03 | Qualcomm Incorporated | Uninterrupted transmission during a change in ciphering configuration |
JP2009535943A (ja) * | 2006-04-28 | 2009-10-01 | クゥアルコム・インコーポレイテッド | 暗号化設定における変更中の中断されない送信 |
JP2012165422A (ja) * | 2006-04-28 | 2012-08-30 | Qualcomm Inc | 暗号化設定における変更中の中断されない送信 |
CN101102152B (zh) * | 2006-07-03 | 2011-05-11 | 华为技术有限公司 | 无源光网络中保证数据安全的方法 |
JP2008048101A (ja) * | 2006-08-14 | 2008-02-28 | Fujitsu Ltd | データ復号装置およびデータ暗号化装置 |
JP2010183494A (ja) * | 2009-02-09 | 2010-08-19 | Hitachi Ltd | 光ネットワークシステムおよび暗号化鍵の切り替え方法 |
JP2009201115A (ja) * | 2009-02-24 | 2009-09-03 | Hitachi Communication Technologies Ltd | 暗号化装置を備えた光アクセスシステムおよびその暗号化方法 |
JP2012238991A (ja) * | 2011-05-11 | 2012-12-06 | Sumitomo Electric Ind Ltd | 局側装置、宅側装置、光通信システム、および光通信システムの制御方法 |
CN103138918A (zh) * | 2011-11-28 | 2013-06-05 | 中兴通讯股份有限公司 | 避免gpon系统加密使能瞬间丢包的方法、装置及系统 |
CN103138918B (zh) * | 2011-11-28 | 2017-11-07 | 中兴通讯股份有限公司 | 避免gpon系统加密使能瞬间丢包的方法、装置及系统 |
JP2014075661A (ja) * | 2012-10-03 | 2014-04-24 | Mitsubishi Electric Corp | 通信装置、子局装置、制御装置、通信システムおよび通信制御方法 |
Also Published As
Publication number | Publication date |
---|---|
EP1746760A1 (en) | 2007-01-24 |
CN1943162A (zh) | 2007-04-04 |
US20080247550A1 (en) | 2008-10-09 |
JPWO2005112336A1 (ja) | 2008-03-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2005112336A1 (ja) | 暗号機能付きponシステム及びponシステムの暗号化方法 | |
TWI472214B (zh) | 用於被動光學網路中之資料隱私的方法及設備 | |
KR101370272B1 (ko) | 광 네트워크 단말 관리 제어 인터페이스에 기초한 수동 광 네트워크 보안성 강화 | |
EP2957053B1 (en) | Authentication and initial key exchange in ethernet passive optical network over coaxial network | |
EP2351311B1 (en) | Method for increasing security in a passive optical network | |
JP4558700B2 (ja) | 認証暗号化を通じて保安伝送を可能にするgponシステム及びその認証暗号化方法 | |
US20020110245A1 (en) | Method and system for synchronizing security keys in a point-to-multipoint passive optical network | |
US20050175183A1 (en) | Method and architecture for secure transmission of data within optical switched networks | |
CN101102152B (zh) | 无源光网络中保证数据安全的方法 | |
KR100594023B1 (ko) | 기가비트 이더넷 수동형 광 가입자망에서의 암호화 방법 | |
JP5571846B2 (ja) | 受動光ネットワーク通信方法、装置およびシステム | |
KR100281402B1 (ko) | 비동기 전송 모드-폰 시스템의 광 선로 종단장치에서의 하향메시지 할당 방법 | |
CN101388765B (zh) | 一种吉比特无源光纤网络系统的加密模式切换方法 | |
JP5670252B2 (ja) | 局側装置、宅側装置、光通信システム、および光通信システムの制御方法 | |
KR100575988B1 (ko) | 기가 비트 수동 광가입자 망에서의 onu의 등록 방법 | |
CN117579182B (zh) | 无源光网络系统的业务加密方法、电子设备及存储介质 | |
CN101394265B (zh) | 一种吉比特无源光纤网络系统的加密模式切换方法 | |
JP2015133610A (ja) | 局側装置、ponシステムおよび局側装置の制御方法 | |
JP5649458B2 (ja) | アクセス制御装置及びプログラム | |
EP2209234A1 (en) | Method and device for data processing in an optical network | |
JP2013072965A (ja) | 共通鍵暗号通信システム |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 200480042824.X Country of ref document: CN |
|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2006513487 Country of ref document: JP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 11587585 Country of ref document: US |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2004733117 Country of ref document: EP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: DE |
|
WWP | Wipo information: published in national office |
Ref document number: 2004733117 Country of ref document: EP |