WO2009009999A1 - Terminal detection authentication method, device and operational management system in passive optical network - Google Patents

Terminal detection authentication method, device and operational management system in passive optical network Download PDF

Info

Publication number
WO2009009999A1
WO2009009999A1 PCT/CN2008/071619 CN2008071619W WO2009009999A1 WO 2009009999 A1 WO2009009999 A1 WO 2009009999A1 CN 2008071619 W CN2008071619 W CN 2008071619W WO 2009009999 A1 WO2009009999 A1 WO 2009009999A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
registration code
onu
code
logical registration
Prior art date
Application number
PCT/CN2008/071619
Other languages
English (en)
French (fr)
Inventor
Wei Wu
Hai Gao
Original Assignee
Huawei Technologies Co., Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co., Ltd. filed Critical Huawei Technologies Co., Ltd.
Priority to EP08773171.7A priority Critical patent/EP2073444B1/en
Priority to PL08773171T priority patent/PL2073444T3/pl
Priority to ES08773171.7T priority patent/ES2437328T3/es
Publication of WO2009009999A1 publication Critical patent/WO2009009999A1/zh
Priority to US12/604,085 priority patent/US8406628B2/en
Priority to US13/770,743 priority patent/US8774629B2/en
Priority to US14/282,642 priority patent/US9397777B2/en
Priority to US15/184,661 priority patent/US9674172B2/en
Priority to US15/497,029 priority patent/US9942634B2/en
Priority to US15/925,091 priority patent/US10455304B2/en
Priority to US16/592,123 priority patent/US10986427B2/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q11/00Selecting arrangements for multiplex systems
    • H04Q11/0001Selecting arrangements for multiplex systems using optical switching
    • H04Q11/0062Network aspects
    • H04Q11/0067Provisions for optical access or distribution networks, e.g. Gigabit Ethernet Passive Optical Network (GE-PON), ATM-based Passive Optical Network (A-PON), PON-Ring
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B10/00Transmission systems employing electromagnetic waves other than radio-waves, e.g. infrared, visible or ultraviolet light, or employing corpuscular radiation, e.g. quantum communication
    • H04B10/25Arrangements specific to fibre transmission
    • H04B10/2589Bidirectional transmission
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B10/00Transmission systems employing electromagnetic waves other than radio-waves, e.g. infrared, visible or ultraviolet light, or employing corpuscular radiation, e.g. quantum communication
    • H04B10/27Arrangements for networking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04JMULTIPLEX COMMUNICATION
    • H04J14/00Optical multiplex systems
    • H04J14/02Wavelength-division multiplex systems
    • H04J14/0227Operation, administration, maintenance or provisioning [OAMP] of WDM networks, e.g. media access, routing or wavelength allocation
    • H04J14/0238Wavelength allocation for communications one-to-many, e.g. multicasting wavelengths
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04JMULTIPLEX COMMUNICATION
    • H04J3/00Time-division multiplex systems
    • H04J3/16Time-division multiplex systems in which the time allocation to individual channels within a transmission cycle is variable, e.g. to accommodate varying complexity of signals, to vary number of channels transmitted
    • H04J3/1694Allocation of channels in TDM/TDMA networks, e.g. distributed multiplexers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q11/00Selecting arrangements for multiplex systems
    • H04Q11/0001Selecting arrangements for multiplex systems using optical switching
    • H04Q11/0062Network aspects
    • H04Q2011/0079Operation or maintenance aspects

Definitions

  • Terminal detection and authentication method device and operation management system in passive optical network
  • the present invention relates to the field of network communication technologies, and in particular, to a terminal detection and authentication method, device and operation management system in a passive optical network.
  • PON Passive Optical Network
  • OLT optical network unit / optical network terminal, ONU/ONT
  • ODN Optical Distribution Network
  • One PON port of the OLT can access multiple ONU/O NTs.
  • the difference between ONU/ONT is that the ONT is directly at the user end, and other networks such as Ethernet between the ONU and the user.
  • step 1 The OLT sends a request to each ONU/ONT. ONU/ONT reports Serial.
  • Step 2 The ONU/ONT receiving the above information reports its SN to the OLT.
  • Step 3 The OLT receives the SN and detects the SN, that is, detects the ONU/ONT.
  • the detection process is
  • the OLT is pre-configured with an SN.
  • the OLT matches the received SN with the pre-configured SN. If it matches, the ONU/ONT detection succeeds. If it does not match, the ONU/ONT detection fails.
  • the OLT sends the ONU-ID corresponding to the SN to the successfully detected ONU/ON T according to the pre-configured relationship between the SN and the ONU-ID.
  • the ONU-ID here is unique under a PON port.
  • Step 4 The OLT performs ranging on the ONU/ONT to which the ONU-ID is assigned.
  • Step 5 The OLT sends a request message to the ONU/ONT that completes the ranging, and requests the ONU/ONT to report the Passw ord (password).
  • Step 6 The ONU/ONT that received the request information reports its own password to the OLT.
  • Step 7 The OLT authenticates the ONU/ONT according to the received password. After the authentication succeeds, the ON U/ONT is successfully registered.
  • the correspondence between the SN and the ONU-ID needs to be statically set in the OLT in advance. Therefore, the OLT cannot automatically detect and authenticate the ONU/ONT, so that the ONU The flexibility of the /ONT detection and certification is poor.
  • the SN in the OLT is usually managed by the operations management system.
  • the operation management system issues an ONU/ONT to the user, records the SN of the issued ONU/ONT, and performs SN pre-configuration in the OLT. After the ONU/ONT needs to be replaced due to equipment failure, the operation management system updates its record. SN, and update the SN in the OLT.
  • the operation management system uses the static management mode for its recorded SN and SN in the OLT.
  • the static management mode increases the maintenance cost of the operation management system, OLT, and ONU/ONT, thereby reducing the maintainability of the operation management system, OLT, and ONU/ONT.
  • An embodiment of the present invention provides a terminal detection and authentication method, a device, and an operation management system in a passive optical network, which can implement automatic detection and authentication of a terminal, improve flexibility of terminal detection and authentication, and a central office. The maintainability of the terminal.
  • a terminal detection and authentication method in a passive optical network according to an embodiment of the present invention, where the terminal has a logical registration code, and the method includes the following steps:
  • the central office determines whether the logical registration code sent by the terminal matches the logical registration code stored by the central office, and if yes, determines that the terminal is a legal terminal;
  • the central office records the terminal sequence code from the legal terminal, and records the terminal identifier allocated to the legal terminal.
  • the embodiment of the present invention further provides a network device, which is applied to a central office of a passive optical network, where the network device includes:
  • a first storage module configured to store a logical registration code of the terminal
  • a receiving module configured to receive a logical registration code sent by the terminal, and a terminal sequence code
  • a determining module configured to determine whether a logical registration code received by the receiving module matches a logical registration code stored in the first storage module, and output a determination result
  • an allocation module configured to allocate a terminal identifier to the terminal, and output;
  • the second storage module is configured to store the terminal sequence code received by the receiving module and the terminal identifier output by the distribution module after the determining module outputs the matching judgment result information.
  • An embodiment of the present invention further provides an operation management system, which is applied to a central office of a passive optical network, where the operation management system includes:
  • a logic registration code module for storing a logical registration code, assigning a logical registration code to the user, and transmitting the logical registration code assigned to the user to the optical line terminal;
  • the sequence code module is configured to receive a sequence code of a legal terminal transmitted by the optical line terminal, and store the code.
  • the embodiment of the present invention further provides a terminal device, which is applied to a user side of a passive optical network, where the terminal device includes:
  • receiving a storage module configured to receive and store a logical registration code of the terminal device where the terminal device is located;
  • the sending module is configured to send, according to the request of the central office received by the terminal device, the logical registration code stored in the receiving storage module to the central office.
  • the embodiment of the present invention can statically configure the terminal serial code in the central office, and use the logical registration code in the detection and authentication process.
  • the record is obtained from the legal terminal.
  • the terminal sequence code is recorded and the terminal identifier is assigned to the legal terminal, so that the central office can automatically detect and authenticate the terminal; the central office records the sequence code obtained from the legal terminal and the terminal allocated by the central office as the legal terminal.
  • the identifier enables the central office to dynamically manage the terminal sequence code and the terminal identifier, which reduces the maintenance cost of the central office and the terminal; thereby improving the flexibility of the terminal detection and authentication and the central office by the technical solution provided by the present invention.
  • the maintainability of the terminal is provided by the present invention.
  • FIG. 1 is a schematic diagram of a registration process of an ONU/ONT in the prior art
  • FIG. 2 is a schematic flowchart of a terminal detection and authentication method according to an embodiment of the present invention
  • FIG. 3 is a sequence diagram 1 of a terminal detection and authentication method according to an embodiment of the present invention.
  • FIG. 4 is a second diagram of a terminal detection and authentication method according to an embodiment of the present invention.
  • the embodiment of the present invention utilizes the logical registration code of the terminal to implement automatic detection and authentication of the terminal.
  • the terminal detection and authentication method provided by the embodiment of the present invention is described in detail below.
  • the terminal such as the ONU/ONT, corresponds to a logical registration code.
  • the logical registration code of the terminal may be allocated by the central office for the terminal during the service application process. After assigning a logical registration code to the terminal, the central office needs to record the logical registration code assigned to the terminal. For example, the operation management system of the central office allocates a logical registration code for the terminal, and saves the assigned logical registration code, and the operation management system can also The logical registration code assigned to the terminal is transmitted to the OLT of the central office, and the OLT stores the logical registration code received by the OLT.
  • the logical registration code can be dynamically generated by the central office.
  • the logical registration code should be unique within a certain area.
  • the logical registration code of the terminal should be unique.
  • the logical registration code of the terminal can also be unique within the global scope. The embodiment of the present invention does not limit the area where the logical registration code of the terminal has uniqueness, nor does it limit the specific expression form of the logical registration code, nor does it restrict which device of the central office generates the logical registration code.
  • the terminal should first obtain its logical registration code and transmit the acquired logical registration code to the central office.
  • the manner in which the terminal obtains its logical registration code may be that the terminal receives the logical registration code of the external input.
  • the terminal can provide a local command line, a web page, or other means to receive an externally entered logical registration code.
  • the terminal may also generate a logical registration code according to a predetermined rule according to externally input information, and the logical registration code generated by the terminal should be the same as the logical registration code saved by the central office.
  • the terminal detection and authentication process can be completed during the terminal registration process. Specifically, the terminal can transmit its logical registration code to the central office during the registration process.
  • Embodiments of the present invention do not preclude the possibility of terminal detection and authentication processes being implemented independently, and terminal detection and authentication processes being implemented in other processes.
  • the terminal can transmit its logical registration code to the central office by using the existing message, and the terminal can also transmit its logical registration code to the central office by using a message newly defined for transmitting the logical registration code. Moreover, during the logical registration code transmission, the terminal can transmit the logical registration code by using the encryption method, or can transmit the logical registration code without using the encryption method.
  • the embodiments of the present invention do not limit the specific expression of the existing message, nor do they limit the specific structure of the newly defined message.
  • the central office After receiving the logical registration code transmitted by the terminal, the central office authenticates the terminal by using its pre-stored logical registration code and the logical registration code transmitted by the terminal. For example, the central office transmits the logical registration of the terminal. The code matches its pre-stored logical registration code. If the match is confirmed, the terminal is confirmed to be If the terminal does not match, the terminal is confirmed as an illegal terminal.
  • the central office After confirming that the terminal is a legitimate terminal, the central office records the terminal sequence code obtained from the legal terminal and the terminal identifier assigned by the central office to the legal terminal.
  • the terminal sequence code of the legal terminal recorded by the central office is obtained from the legal terminal. It can be seen that the embodiment of the present invention does not need to pre-configure the terminal sequence code at the central office.
  • the embodiment of the present invention needs to pre-configure the logical registration code of the terminal at the central office, if the terminal needs to be replaced due to a failure or the like, the replaced terminal can still use the logical registration code used by the terminal before the replacement, and the central office is The terminal is authenticated according to the logical registration code. Therefore, the central office can automatically detect the legal terminal, automatically obtain the terminal sequence code of the legal terminal, and the terminal identifier, thereby avoiding the need for static configuration replacement in the process of replacing the terminal. The process of the terminal serial number after.
  • the process of implementing the terminal identifier of the central office recording terminal may be various.
  • the central office may allocate the terminal identifier to the terminal before confirming that the terminal is a legal terminal, and record the legal terminal after confirming that the terminal is a legal terminal.
  • the central office may assign a terminal identifier to the terminal after confirming that the terminal is a legal terminal, and record the terminal identifier of the legal terminal; and, the central office may allocate a temporary terminal to the terminal before confirming that the terminal is a legal terminal.
  • the identifier is used to assign a formal terminal identifier to the terminal after confirming that the terminal is a legal terminal, and record the official terminal identifier of the legal terminal.
  • the temporary terminal identifier assigned to the terminal herein may meet some implementation requirements of the terminal in the registration or ranging process; for example, in the case that the terminal transmits the logical registration identifier through the message reporting the password, the terminal may be first allocated to the terminal. The identifier is used to complete the subsequent ranging process, and then the terminal transmits the logical registration identifier to the central office by using a message for reporting the password.
  • the process of recording the terminal sequence code of the legal terminal by the central office may be: the OLT records the terminal serial code of the legal terminal; or: the OLT and other devices at the central office, such as the operation management system, record the terminal serial code of the legal terminal.
  • the OLT can obtain and record the terminal sequence code of the legal terminal by receiving the terminal sequence code transmitted by the legal terminal.
  • the OLT can transmit the terminal sequence code of the legal terminal of the record to the other network device of the central office, such as the operation management system, so that the operation management system can obtain and record the automatic detection by receiving the terminal serial code of the legal terminal transmitted by the OLT. Terminal serial code.
  • the operation management system can manage the terminal serial code and the terminal identifier recorded by the operation management system, and the operation management system can perform maintenance and management on the OLT and the terminal according to the terminal serial code and the terminal identifier recorded by the operation management system.
  • FIG. 2 A flow chart of a terminal detection and authentication method provided by an embodiment of the present invention is shown in FIG. 2.
  • step 1 the operation management system generates a logical registration code for the ONU/ONT used by the user who proposes the service application, and stores the generated logical registration code, for example, the logical registration code that the operation management system will generate. Stored in the logical registration code database.
  • the operation management system can generate a logical registration code according to a specific format, and the specific format of the generated logical registration code can be determined by the operation management system. After the operation management system generates the logical registration code, it can guarantee that the generated logical registration code is unique under one PON port.
  • Step 2 The operation management system generates service parameters that need to be configured for the ONU/ONT according to the service applied by the user.
  • the operation management system sends the service parameters configured for the ONU/ONT and the logical registration code of the ONU/ONT to the OLT.
  • Step 3 The operation management system transmits the logical registration code information of the ONU/ONT to the user.
  • Step 4 After the ONU/ONT is powered on, the ONU/ONT receives the logical registration code of the external input. For example, ON
  • the U/ONT receives the externally entered logical registration code using its own local command line, web page or other external medium.
  • Step 5 The ONU/ONT reports the logical registration code to the OLT during the registration process. OLT receives ONU/ON
  • the logical registration code reported by T, and the logical registration code reported by the ONU/ONT is matched with the stored logical registration code. After confirming that the logical registration code reported by the ONU/ONT matches the stored logical registration code, the authentication is successful, and the OLT confirms.
  • the ONU/ONT is a legal terminal.
  • the OLT records the SN obtained from the legal terminal and the ONU-ID (terminal identifier) assigned to the legal terminal. The OLT successfully detects the legal terminal.
  • the logic for confirming the ONU/ONT reporting is performed. If the registration code does not match the stored logical registration code, the authentication fails, and the OLT confirms that the ONU/ONT is an illegal terminal, and the registration process for the terminal ends.
  • Step 6 After the ONU/ONT is successfully registered, the OLT reports the detected terminal SN transmitted by the legal terminal to the operation management system. The OLT can also report the correspondence between the SN and the terminal identifier to the operation management system.
  • Step 7 The operation management system stores the terminal SN it receives, for example, stores the terminal SN in the SN database.
  • the operation management system can perform maintenance and management on the OLT, the ONU/ONT, and the like according to the terminal SN stored therein.
  • the ONU/ONT can transmit the logical registration code through the reporting of the Password message in the registration process, that is, the ONU/ONT carries the logical registration code in the parameter field of the reported message, and reports the Password message. Reported to the OLT.
  • the logical registration code can also be transmitted between the OLT and the ONU/ONT by newly setting the request logical registration code message and reporting the logical registration code message.
  • the new request logical registration code message and the report logical registration code message may all belong to the PLOAM (Physical Layer Operation Maintenance) message.
  • the specific structure of the two newly defined PLOAM messages can be as shown in Table 1 and Table 2.
  • the first byte ONU-ID is used to carry the ONU-ID assigned by the central office to the terminal; the second byte Message ID is used to identify the message as the message requesting the logical registration code; 3rd to 12th The byte is a reserved byte.
  • Table 2 Uplink direction The ONU/ONT reports the PLOAM message of the logical registration code;
  • the first byte ONU-ID is used to carry the ONU-ID assigned by the central office to the terminal; the second byte Message
  • the ID is used to identify the message as a message for reporting the logical registration code; the third byte to the 12th byte are used to carry the logical registration code of the terminal.
  • Table 1 and Table 2 above are only a specific example of requesting a logical registration code message and reporting a logical registration code message. In the embodiment of the present invention, the message for transmitting the logical registration code is not limited to the specific example described above.
  • step 5 The specific implementation process of step 5 above can be implemented in the following two ways:
  • Method 1 Firstly assign Linyi ONU-ID, and then assign the official ONU-ID terminal automatic detection and authentication process as shown in Figure 3.
  • step 1 The OLT sends a request message for reporting the SN to all ONUs/ONTs.
  • Step 2 The ONU/ONT receives the request message sent by the OLT, and reports its own SN to the OLT in response to the request message.
  • Step 3 The OLT receives the SN reported by the ONU/ONT, determines whether the SN is recorded, and determines that the received SN matches the SN stored by it, and if the OLT determines that the SN it receives is the recorded SN. Then, go to step 9. If the OLT determines that the SN it receives is an unrecorded SN, the OLT allocates a temporary ONU-ID to the ONU/ONT, and then sends a temporary ONU-ID to the ONU/ONT, and then Go to step 4. OL T assigns a temporary ONU-ID to the ONU/ONT, and can select an ONU-ID as the ONU-ID from the unused ONU-ID.
  • Step 4 The OLT performs the data exchange with the ONU/ONT to which the Linyi ONU-ID is assigned, and completes the ranging of the ONU/ONT to which the Linyi ONU-ID is assigned.
  • Step 5 The OLT sends a request logical registration code message to the ONU/ONT, and the request logical registration code message can be implemented by using a password request message, or by adding a newly defined request logic registration code message.
  • Step 6 The ONU/ONT receives the request logical registration code message sent by the OLT, and reports its own logical registration code to the OLT.
  • the ONU/ONT can transmit the logical registration code to the OLT in the report password message, or carry the logical registration code in the newly defined logical registration code report message to the OLT.
  • Step 7 The OLT obtains the logical registration code of the ONU/ONT from the received message, and verifies the obtained logical registration code according to the parameters preconfigured by the operation management system, that is, the OLT determines the acquired logical registration. Whether the code matches the stored logical registration code. If it matches, the ONU/ONT is confirmed as a legal terminal, and the SN of the ONU/ONT is recorded, and the registration process of the ONU/ONT is terminated, to step 8; if not, Then confirm that the ONU/ONT is an illegal terminal, and directly terminate the registration process, and may not be performed afterwards. Continued steps.
  • Step 8 The ONU/ONT is re-launched for subsequent registration.
  • the ONU/ONT reports its SN to the OLT.
  • the OLT After receiving the SN reported by the ONU/ONT, the OLT searches whether the SN is recorded. If the OLT determines that the SN it receives is the recorded SN , then the process goes to step 9. If the OLT determines that the SN it receives is unrecorded. If the SN is over, the OLT assigns the ONU-ID to the ONU/ONT, and then sends the temporary ONU-ID to the ONU/ONT, and then proceeds to step 4.
  • step 8 since the OLT has already recorded the SN of the ONU/ONT, go directly to step 9.
  • Step 9 The OLT finds the corresponding ONU-ID and uses the found ONU-ID as the official ONU-ID.
  • the official ONU-ID may be a temporary ONU-ID, that is, the OLT assigns the ONU-I D previously assigned to the ONU/ONT as the official ONU-ID of the ONU/ONT.
  • the OLT can bind the SN of the ONU/ONT to the official ONU-ID of the ONU/ON T.
  • Step 10 The OLT allocates the found official ONU-ID to the ONU/ONT.
  • Step 11 The OLT performs the data exchange with the ONU/ONT to which the official ONU-ID is assigned, and completes the ranging of the ONU/ONT to which the official ONU-ID is assigned.
  • Step 12 The OLT performs registration of 0 NU/ONT by performing data interaction with the ONU/ONT to which the official ONU-ID is assigned. After the registration is successful, the process proceeds to step 13.
  • Step 13 The OLT exchanges data with the successfully registered ONU/ONT to configure service parameters for the successfully registered ON U/ONT.
  • the logical registration code of the ONU/ONT may be the ONU-ID of the ONU/ONT, that is, in the step 6 of FIG. 3 above, the logical registration code reported by the ONU/ONT to the OLT is The ONU-ID of the ONU/ONT, that is, the logical registration code generated by the ONU/ONT used by the operation management system for the user who made the service request in step 1 of FIG. 2 is the ONU-ID.
  • the logical registration code of the ONU/ONT may also be different from the ONU-ID of the ONU/ONT.
  • the embodiment of the present invention does not limit the specific expression form of the logical registration code of the ONU/ONT.
  • the terminal can be identified by the management terminal identifier between the operation management system and the OLT; and the terminal can be identified by the ONU-ID between the OLT and the ONU/ONT, and the management terminal identifier can be With the ONU-ID, you can also use an ID other than the ONU-ID.
  • the management terminal identifier between the LTs uses the ONU-ID, and the operation management system, the OLT, and the ONU/ONT both identify the ONU/ONT with the ONU-ID.
  • Method 2 Assign the ONU-ID first, and then perform the terminal automatic detection and authentication process as shown in Figure 4.
  • step 1 The OLT sends a request message for reporting the SN to all ONUs/ONTs.
  • Step 2 The ONU/ONT receives the request message sent by the OLT, and reports its own SN to the OLT in response to the request message.
  • Step 3 The OLT receives the SN reported by the ONU/ONT, and the OLT selects one of the unused ONU-IDs.
  • the ONU-ID is used as the official ONU-ID, and the selected ONU-ID is assigned to the ONU/ONT.
  • Step 4 The OLT performs data interaction with the ONU/ONT to which the ONU-ID is assigned, and the ON is assigned.
  • Step 5 The OLT sends a request logical registration code message to the ONU/ONT, and the request logical registration code message can be implemented by using a password request message, or by adding a newly defined request logic registration code message.
  • Step 6 The ONU/ONT receives the request logical registration code message sent by the OLT, and reports its own logical registration code to the OLT in response to the request logic registration code message.
  • the ONU/ONT can carry the logical registration code to the OLT in the report password message, or carry the logical registration code in the newly defined logical registration code report message to the OLT.
  • Step 7 The OLT obtains the logical registration code of the ONU/ONT from the received message, and verifies the obtained logical registration code according to the parameters preconfigured by the operation management system, that is, the OLT determines the acquired logical registration. Whether the code matches the stored logical registration code. If it matches, the ONU/ONT is confirmed as a legal terminal, and the SN of the ONU/ONT is recorded. The OLT can SN of the ONU/ONT and 0 NU of the ONU/ONT. ID binding, go to step 8. If there is no match, confirm that the ONU/ONT is an illegal terminal and terminate the registration process directly. You can skip the subsequent steps.
  • Step 8 The OLT registers the ONU/ONT by performing data interaction with the legal ONU/ONT. After the registration is successful, go to step 9.
  • Step 9 The OLT exchanges data with the successfully registered ONU/ONT to configure service parameters for the successfully registered ONU/ONT.
  • Step 10 After the ONU/ONT is offline, send an offline message to the OLT.
  • Step 11 The OLT receives the offline message sent by the ONU/ONT, and releases the binding relationship between the SN of the ONU/ONT and the ONU-ID of the ON U/ONT.
  • the terminal can be identified by the management terminal identifier between the operation management system and the OLT; and the terminal can be identified by the ONU-ID between the OLT and the ONU/ONT, and the management terminal identifier can be With the ONU-ID, it is also possible to use an identifier different from the ONU-ID.
  • the OLT in step 7 can the SN of the ONU/ONT, the ONU-ID of the ONU/ONT, and the ONU/ONT Management terminal identification binding; then, in step 11, the SN of the ONU/ONT, the ONU-ID of the ONU/ONT, and the management terminal identity binding relationship of the ONU/ONT need to be released.
  • the embodiment of the present invention does not need to statically configure the terminal serial code in the central office such as the OLT and the operation management system, and uses the logical registration code in the detection and authentication process. After the authentication is passed, the terminal sequence code obtained from the legal terminal is recorded, and the terminal identifier assigned to the legal terminal is recorded, so that the central office such as the OLT can automatically detect and authenticate the terminal; the OLT obtains the automatic detection and authentication.
  • the terminal sequence code and the terminal identifier are transmitted to the operation management system, so that the operation management system can dynamically obtain the terminal serial code and the terminal identifier, thereby avoiding the process of statically configuring the terminal serial code and the terminal identifier by the operation management system; Terminal ⁇ , the replaced terminal can use the logical registration code of the terminal before replacement, thus avoiding the process of updating the statically configured sequence code by the operation management system brought by replacing the terminal; thus, the operation management system can serialize the terminal code Dynamic management with terminal identification, and operation
  • the management system can conveniently use the dynamically obtained terminal serial number and terminal identifier to maintain the OLT and the terminal; finally reduce the maintenance cost of the operation management system, 0 LT, and the terminal, improve the flexibility of the terminal detection and authentication, and the bureau. End, terminal maintainability.
  • the embodiment of the present invention further provides a network device, which is located at the central office of the passive optical network, and may be a local OLT.
  • the network device includes a first storage module, a receiving module, a determining module, an allocating module, and a second storage. Module.
  • the first storage module is used to store the logical registration code of the terminal.
  • the logical registration code stored in the first storage module may be configured by the central office operation management system.
  • the receiving module is configured to receive a logical registration code sent by the terminal, and a terminal sequence code.
  • Receive module can The terminal serial code and the logical registration code are requested from the terminal, and then the terminal serial code and the logical registration code transmitted by the terminal according to the request are received.
  • the determining module is configured to determine whether the logical registration code received by the receiving module matches the logical registration code stored in the storage module to determine whether the terminal is a legitimate terminal.
  • the judging module outputs the judgment result information, for example, the judging module outputs the matching information, or outputs the mismatch information.
  • the assignment module is used to assign a terminal identifier to the terminal and output it.
  • the distribution module may assign a terminal identifier to the terminal before the judgment module makes a judgment, or may assign a terminal identifier to the terminal after the judgment module makes a judgment.
  • the second storage module is configured to store the terminal sequence code received by the receiving module and the terminal identifier output by the distribution module after the determining module outputs the matched judgment result information.
  • the terminal sequence code and the terminal identifier stored in the second storage module are the terminal sequence code and the terminal identifier of the legal terminal that are automatically detected.
  • the network device may also optionally include a reporting module.
  • the reporting module is configured to report the terminal serial code stored by the second storage module to the operation management system of the central office.
  • the terminal sequence code reported by the reporting module to the operation management system is the terminal sequence code of the legal terminal automatically detected by the network device.
  • the allocation module includes a determining submodule and an allocating submodule
  • the receiving module includes a first request submodule, a second request submodule, and a receiving submodule.
  • the first request sub-module sends a request message for reporting the SN to all ONUs/ONTs.
  • the receiving submodule receives the SN reported by the ONU/ONT.
  • the determining submodule determines whether the SN received by the receiving submodule is recorded in the second storage module, that is, whether the received SN is stored in the second storage module.
  • the distribution submodule is notified to allocate the temporary ONU-ID.
  • the allocation sub-module After receiving the information indicating the assignment of the sub-module ONU-ID, the allocation sub-module allocates a temporary ONU-ID to the terminal, and triggers the network device to perform ranging on the terminal.
  • the network device performs data interaction with the ONU/ONT to which the Linyi ONU-ID is assigned, and completes the ONU/ONT to which the Linyi ONU-ID is assigned. Ranging.
  • the second request sub-module sends a request logical registration code message to the ONU/ONT after the network device completes the ranging, and the request logical registration code message can be implemented by using a password request message, or can be registered by newly adding a request logic. Code message to achieve.
  • the receiving sub-module obtains the logical registration code reported by the ONU/ONT from the received message.
  • the determining module After receiving the logical registration code, the determining module checks the logical registration code received by the receiving submodule according to the logical registration code stored by the first storage module, that is, the determining module determines that the receiving submodule receives the Whether the logical registration code matches the logical registration code stored by the first storage module. If it matches, the ONU/ONT is confirmed as a legal terminal, and the second storage module is notified to record the SN of the ONU/ONT. If not, the ONU is confirmed. /ONT is an illegal terminal and directly terminates the registration process.
  • the ONU/ONT is re-launched for subsequent registration, and the ONU/ONT reports its SN to the OLT.
  • the receiving submodule determines whether the SN records the SN in the second storage module, and if the determining submodule determines that the SN received by the receiving submodule is recorded in the second storage module.
  • the SN, the notification allocation sub-module allocates a formal ONU-ID to the terminal; if the determining sub-module determines that the SN received by the receiving sub-module is an SN that is not recorded in the second storage module, the notification allocation sub-module is allocated to the terminal. Linyi ONU-ID.
  • the allocation sub-module searches for the ONU-ID after receiving the SN, and finds the ONU.
  • -I D is assigned to the terminal as the official ONU-ID, and triggers the network device to perform ranging on the terminal.
  • the network device performs the data exchange with the ONU/ONT to which the official ONU-ID is assigned, and completes the ranging of the ONU/ONT to which the normal ONU-ID is assigned.
  • the network device registers the ONU/ONT by performing data interaction with the ONU/ON T to which the official ONU-ID is assigned. After the registration is successful, the OLT performs data interaction with the successfully registered ONU/ONT, and the registration is successful.
  • the service parameters are configured on the ONU/ONT.
  • the second storage module can store the binding relationship between the SN and the ONU-ID.
  • the second mode, the receiving module includes a first request submodule, a third request submodule, and a receiving submodule.
  • the first request sub-module sends a request message for reporting the SN to all ONUs/ONTs.
  • the receiving submodule receives the SN reported by the ONU/ONT. After the receiving module receives the SN reported by the ONU/ONT, the receiving module is The terminal allocates an ONU-ID and triggers the network device to perform ranging on the terminal. The network device performs data exchange with the ONU/ONT to which the ONU-ID is assigned, and completes the ranging of the ONU/ONT to which the ONU-ID is assigned.
  • the third request sub-module sends a request logical registration code message to the ONU/ONT after the network device completes the ranging, and the request logical registration code message can be implemented by using a password request message, or can be registered by newly adding a request logic. Code message to achieve.
  • the receiving sub-module obtains the logical registration code reported by the ONU/ONT from the received message.
  • the determining module After receiving the logical registration code, the determining module checks the logical registration code received by the receiving submodule according to the logical registration code stored by the first storage module, that is, the determining module determines that the receiving submodule receives the Whether the logical registration code matches the logical registration code stored by the first storage module. If it matches, the ONU/ONT is confirmed as a legal terminal, and the second storage module is notified to record the SN of the ONU/ONT. If not, the ONU is confirmed. /ONT is an illegal terminal and directly terminates the registration process.
  • the network device registers the ONU/0 NT by performing data interaction with the ONU/ONT to which the official ONU-ID is assigned. After the registration is successful, the OLT performs data interaction with the successfully registered ONU/ONT. Registered successful ONU/ONT configuration service parameters.
  • the ONU/ONT is offline and sends an offline message to the OLT.
  • the second storage module releases the information of the ONU/ONT stored by the OLT.
  • the information of the ONU/0 NT stored in the second storage module is: the management terminal identifier of the SN and ONU/ONT of the ONU/ONT and ONU-ID binding relationship of ONU/ONT.
  • An embodiment of the present invention further provides an operation management system in a central office of a passive optical network, where the operation management system includes: a logical registration code module and a serial code module.
  • the logical registration code module is used to store the logical registration code, assign a logical registration code to the user, and transmit the logical registration code assigned to the user to the optical line terminal.
  • the logical registration code module can transmit the logical registration code and service parameters to the optical line terminal. Specifically, it is as described in the above method embodiment.
  • the sequence code module is configured to receive and store the sequence code of the legal terminal transmitted by the optical line terminal.
  • the sequence code transmitted by the optical line terminal is the sequence code of the legal terminal automatically detected by the optical line terminal.
  • the sequence code module can store the received sequence code in the SN database.
  • the operation management system is also set to enter the SN Line management module.
  • An embodiment of the present invention further provides a terminal device in a passive optical network, where the terminal device includes: a receiving storage module and a sending module.
  • the receiving storage module is used to receive and store the logical registration code of the terminal device into which it is located.
  • the receiving storage module can receive the logical registration code of the external input by using a local command line, a web page, or other means provided by the terminal device. Specifically, it is as described in the above method embodiment.
  • the sending module is configured to send, to the central office, the logical registration code stored in the receiving storage module according to the request of the central office received by the terminal device. For example, the sending module sends the logical registration code to the OLT in the message for reporting the password; for example, the sending module sends the logical registration code to the OLT in a newly defined message dedicated to the transmission logic registration code. Specifically, it is as described in the above method embodiment.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Power Engineering (AREA)
  • Small-Scale Networks (AREA)

Description

说明书 无源光网络中的终端检测认证方法、 装置及操作管理系统
[1] 技术领域
[2] 本发明涉及网络通讯技术领域, 具体涉及一种无源光网络中的终端检测认证方 法、 装置及操作管理系统。
[3] 发明背景
[4] Passive Optical
Network (无源光网络, PON) 技术是一种点到多点的光纤接入技术。 PON—般 由局侧的 Optical Line Terminal (光线路终端, 0LT) 、 用户侧的 Optical Network
Unit/ Optical Network
Terminal (光网络单元 /光网络终端, ONU/ONT) 、 以及 Optical Distribution Network (光分配网络, ODN) 组成。 OLT的一个 PON端口可以接入多个 ONU/O NT, ONU/ONT的区别为 ONT直接位于用户端, 而 ONU和用户间有其他的网络 如以太网。
[5] 目前, 对 ONU/ONT的检测和认证是在 ONU/ONT的注册过程中实现的, ONU/0
NT的注册流程如附图 1所示。
[6] 图 1中, 步骤 1、 OLT向各 ONU/ONT发送请求 ONU/ONT上报 Serial
Number (序列码, SN) 的信息。
[7] 步骤 2、 接收上述信息的 ONU/ONT向 OLT上报自己的 SN。
[8] 步骤 3、 OLT接收 SN, 对 SN进行检测, 即对 ONU/ONT进行检测。 检测过程为
: OLT中预先配置有 SN, OLT将接收到的 SN与预先配置的 SN进行匹配, 如果匹 配, 则 ONU/ONT检测成功; 如果不匹配, 则 ONU/ONT检测失败。 OLT根据预先 配置的 SN与 ONU-ID的对应关系将 SN对应的 ONU-ID发送给检测成功的 ONU/ON T。 这里的 ONU-ID在一个 PON端口下具有唯一性。
[9] 步骤 4、 OLT对分配了 ONU-ID的 ONU/ONT进行测距。
[10] 步骤 5、 OLT向完成测距的 ONU/ONT发送请求信息, 请求 ONU/ONT上报 Passw ord (密码) 。 [11] 步骤 6、 接收到请求信息的 ONU/ONT向 OLT上报自己的 Password。
[12] 步骤 7、 OLT根据接收到的 Password对 ONU/ONT进行认证, 在认证成功后, ON U/ONT注册成功。
[13] 在实现本发明过程中, 发明人发现现有技术中存在如下问题:
[14] 在上述对 ONU/ONT进行检测和认证过程中, 需要预先在 OLT中静态设置 SN与 ONU-ID的对应关系, 因此, OLT不能够实现对 ONU/ONT的自动检测和认证, 使 ONU/ONT的检测和认证的灵活性差。 另外, OLT中的 SN通常由操作管理系统 进行管理。 操作管理系统在向用户发放 ONU/ONT吋, 记录发放的 ONU/ONT的 S N, 并在 OLT中进行 SN的预配置; 在由于设备故障等原因需要更换 ONU/ONT吋 , 操作管理系统更新其记录的 SN, 并更新 OLT中的 SN。 也就是说, 操作管理系 统对其记录的 SN、 以及 OLT中的 SN釆用静态管理方式。 静态管理方式增加了操 作管理系统、 OLT、 ONU/ONT的维护成本, 从而降低了操作管理系统、 OLT和 ONU/ONT的可维护性。
[15] 发明内容
[16] 本发明实施方式提供一种无源光网络中的终端检测认证方法、 装置及操作管理 系统, 可实现终端的自动检测和认证, 提高了终端检测和认证的灵活性、 以及 局端、 终端的可维护性。
[17] 本发明实施方式提供的一种无源光网络中的终端检测认证方法, 终端具有逻辑 注册码, 所述方法包括步骤:
[18] 局端接收终端发送的逻辑注册码;
[19] 所述局端确定所述终端发送的逻辑注册码与所述局端存储的逻辑注册码是否匹 配, 如果匹配, 确定所述终端为合法终端;
[20] 所述局端记录来自所述合法终端的终端序列码, 并记录为所述合法终端分配的 终端标识。
[21] 本发明实施方式还提供一种网络设备, 应用于无源光网络局端, 该网络设备包 括:
[22] 第一存储模块, 用于存储终端的逻辑注册码;
[23] 接收模块, 用于接收终端发送来的逻辑注册码、 以及终端序列码; [24] 判断模块, 用于判断接收模块接收到的逻辑注册码与第一存储模块中存储的逻 辑注册码是否匹配, 并输出判断结果;
[25] 分配模块, 用于为终端分配终端标识, 并输出;
[26] 第二存储模块, 用于在判断模块输出匹配的判断结果信息后, 存储接收模块接 收到的终端序列码、 以及分配模块输出的终端标识。
[27] 本发明实施方式还提供一种操作管理系统, 应用于无源光网络的局端, 所述操 作管理系统包括:
[28] 逻辑注册码模块, 用于存储逻辑注册码, 为用户分配逻辑注册码, 并将为用户 分配的逻辑注册码传输至光线路终端;
[29] 序列码模块, 用于接收光线路终端传输来的合法终端的序列码, 并存储。
[30] 本发明实施方式还提供一种终端设备, 应用于无源光网络的用户侧, 所述终端 设备包括:
[31] 接收存储模块, 用于接收并存储所在终端设备的逻辑注册码;
[32] 发送模块, 用于根据其所在终端设备接收到的局端的请求, 向局端发送所述接 收存储模块中存储的逻辑注册码。
[33] 通过上述技术方案的描述可知, 本发明实施方式可以不需要在局端静态配置终 端序列码, 通过在检测认证过程中釆用逻辑注册码, 在认证通过后, 记录从合 法终端处获取的终端序列码、 并记录为合法终端分配的终端标识, 使局端可以 实现对终端的自动检测和认证; 局端通过记录从合法终端处获取的序列码、 以 及局端为合法终端分配的终端标识, 使局端可以对终端序列码以及终端标识进 行动态管理, 降低了局端、 以及终端的维护成本; 从而通过本发明提供的技术 方案提高了终端检测和认证的灵活性、 以及局端、 终端的可维护性。
[34] 附图简要说明
[35] 图 1是现有技术中的 ONU/ONT的注册流程示意图;
[36] 图 2是本发明实施方式的终端检测认证方法流程示意图;
[37] 图 3是本发明实施方式的终端检测认证方法吋序图一;
[38] 图 4是本发明实施方式的终端检测认证方法吋序图二。
[39] 实施本发明的方式 [40] 本发明实施方式是利用终端的逻辑注册码来实现对终端的自动检测和认证的。 下面对本发明实施方式提供的终端检测和认证方法进行详细说明。
[41] 在本发明实施方式中, 终端如 ONU/ONT对应有逻辑注册码。 终端的逻辑注册 码可以是在用户进行业务申请过程中, 局端为终端分配的。 局端在为终端分配 逻辑注册码后, 需要记录为终端分配的逻辑注册码, 例如, 局端的操作管理系 统为终端分配逻辑注册码, 并保存其分配的逻辑注册码, 操作管理系统还可以 将为终端分配的逻辑注册码传输至局端的 OLT中, OLT存储其接收到的逻辑注册 码。 逻辑注册码可以由局端动态生成。 而且, 逻辑注册码在一定的区域内应具 有唯一性, 例如, 在一个 PON端口下, 终端的逻辑注册码应具有唯一性。 当然 , 终端的逻辑注册码也可以在全局范围内具有唯一性。 本发明实施方式不限制 终端的逻辑注册码具有唯一性的区域, 也不限制逻辑注册码的具体表现形式, 同样不限制由局端的哪个设备来生成逻辑注册码。
[42] 在终端检测和认证过程中, 终端应首先获取其逻辑注册码, 并将获取到的逻辑 注册码传输至局端。 终端获取其逻辑注册码的方式可以为, 终端接收外部输入 的逻辑注册码。 例如, 终端可以提供本地命令行、 Web页面、 或者其它方式接收 外部输入的逻辑注册码。 终端也可以根据外部输入的信息, 依据某种预定的规 则生成逻辑注册码, 此吋终端生成的逻辑注册码应与局端保存的逻辑注册码相 同。 终端检测和认证过程可以在终端注册过程中完成, 具体的, 终端可以在注 册过程中将其逻辑注册码传输至局端。 本发明实施方式不排除终端检测和认证 过程独立实现、 以及终端检测和认证过程在其它过程中实现的可能性。
[43] 终端可以釆用现有的消息将其逻辑注册码传输至局端, 终端也可以釆用专门为 传输逻辑注册码而新定义的消息将其逻辑注册码传输至局端。 而且, 在逻辑注 册码传输过程中, 终端可以釆用加密方式来传输逻辑注册码, 也可以不釆用加 密方式来传输逻辑注册码。 本发明实施方式不限制现有消息的具体表现形式, 也不限制新定义的消息的具体结构。
[44] 局端在接收到终端传输来的逻辑注册码后, 利用其预先存储的逻辑注册码、 以 及终端传输来的逻辑注册码对终端进行认证, 例如, 局端将终端传输来的逻辑 注册码与其预先存储的逻辑注册码进行匹配, 如果确认匹配, 则确认终端为合 法终端, 如果确认不匹配, 则确认终端为非法终端。
[45] 局端在确认终端为合法终端吋, 记录从合法终端处获取的终端序列码以及局端 为合法终端分配的终端标识。 在本发明实施方式中, 局端记录的合法终端的终 端序列码是从合法终端处获取的, 由此可见, 本发明实施方式不需要在局端预 先配置终端序列码。 虽然, 本发明实施方式需要在局端预先配置终端的逻辑注 册码, 但是, 在由于故障等原因需要更换终端吋, 更换后的终端仍然可以使用 更换前终端使用的逻辑注册码, 而局端是根据逻辑注册码来对终端进行认证的 , 因此, 局端能够自动检测到合法终端、 自动获得合法终端的终端序列码以及 终端标识, 从而避免了在用户更换终端过程中, 局端需要静态配置更换后的终 端序列号的过程。
[46] 局端记录终端的终端标识的实现过程可以有多种, 例如, 局端可以在确认终端 为合法终端之前为终端分配终端标识, 并在确认终端为合法终端之后, 记录该 合法终端的终端标识; 再例如, 局端可以在确认终端为合法终端之后为终端分 配终端标识, 并记录该合法终端的终端标识; 还有, 局端可以在确认终端为合 法终端之前为终端分配临吋终端标识, 在确认终端为合法终端之后为终端分配 正式终端标识, 并记录合法终端的正式终端标识。 这里为终端分配的临吋终端 标识可以满足终端在注册或测距过程中的一些实现需要; 例如, 在终端将逻辑 注册标识通过上报密码的消息传输的情况下, 可以首先为终端分配临吋终端标 识, 以完成后续的测距过程, 然后, 终端将逻辑注册标识通过上报密码的消息 传输至局端。
[47] 局端记录合法终端的终端序列码的过程可以为: OLT记录合法终端的终端序列 码; 也可以为: OLT和局端的其它设备如操作管理系统均记录合法终端的终端序 列码。 OLT可以通过接收合法终端传输来的终端序列码, 来获取并记录合法终端 的终端序列码。 OLT可以将其记录的合法终端的终端序列码传输至局端的其它网 络设备处如操作管理系统, 这样, 操作管理系统可以通过接收 OLT传输来的合法 终端的终端序列码来获取并记录自动检测到的终端序列码。
[48] 操作管理系统可以对其记录的终端序列码、 终端标识进行管理, 操作管理系统 可以根据其记录的终端序列码、 终端标识对 OLT、 终端等进行维护管理。 [49] 下面结合附图对本发明实施方式提供的终端检测和认证方法进行说明。
[50] 本发明实施方式提供的终端检测和认证方法的流程示意如附图 2所示。
[51] 图 2中, 步骤 1、 操作管理系统为提出业务申请的用户所使用的 ONU/ONT生成 一个逻辑注册码, 并存储生成的逻辑注册码, 例如, 操作管理系统将生成的逻 辑注册码存储在逻辑注册码数据库中。 操作管理系统可以根据某种具体的格式 来生成逻辑注册码, 生成逻辑注册码的具体格式可以由操作管理系统来确定。 操作管理系统在生成逻辑注册码吋, 可以保证其生成的逻辑注册码在一个 PON 端口下具有唯一性。
[52] 步骤 2、 操作管理系统根据用户申请的业务, 生成需要为 ONU/ONT配置的业务 参数。 操作管理系统将需要为 ONU/ONT配置的业务参数、 以及 ONU/ONT的逻 辑注册码下发到 OLT。
[53] 步骤 3、 操作管理系统将 ONU/ONT的逻辑注册码信息传输至用户。
[54] 步骤 4、 ONU/ONT上电后, ONU/ONT接收外部输入的逻辑注册码。 例如, ON
U/ONT利用其自身提供的本地命令行、 Web页面或其他外部媒介等方式接收外部 输入的逻辑注册码。
[55] 步骤 5、 ONU/ONT在注册过程中将逻辑注册码上报给 OLT。 OLT接收 ONU/ON
T上报的逻辑注册码, 并将 ONU/ONT上报的逻辑注册码与其存储的逻辑注册码 进行匹配, 在确认 ONU/ONT上报的逻辑注册码与其存储的逻辑注册码匹配吋, 认证成功, OLT确认该 ONU/ONT为合法终端, OLT记录从该合法终端处获得的 S N、 以及记录为该合法终端分配的 ONU-ID (终端标识) , OLT成功检测到合法 终端; 在确认 ONU/ONT上报的逻辑注册码与其存储的逻辑注册码不匹配吋, 认 证失败, OLT确认该 ONU/ONT为非法终端, 对该终端的注册过程结束。
[56] 步骤 6、 在 ONU/ONT注册成功后, OLT将检测到的合法终端传输来的终端 SN上 报至操作管理系统。 OLT也可以将 SN与终端标识的对应关系上报至操作管理系 统。
[57] 步骤 7、 操作管理系统存储其接收到的终端 SN, 例如将终端 SN存储在 SN数据 库中。 操作管理系统可以根据其存储的终端 SN对 OLT、 ONU/ONT等进行维护管 理。 [58] 在上述步骤 5中, ONU/ONT可以通过注册过程中的上报 Password消息来传输逻 辑注册码, 即 ONU/ONT将逻辑注册码携带在上报 Password消息的参数域中, 并 将上报 Password消息上报至 OLT。 OLT和 ONU/ONT之间也可以通过新增设置的 请求逻辑注册码消息、 上报逻辑注册码消息来传输逻辑注册码。 新增的请求逻 辑注册码消息、 上报逻辑注册码消息可以均属于 PLOAM (物理层操作维护) 消 息。 上述新定义的两个 PLOAM消息的具体结构可以如表 1、 表 2所示。
[59] 表 1、 下行方向 OLT请求逻辑注册码的 PLOAM消息;
[60]
Figure imgf000009_0001
表 1中, 第 1字节 ONU-ID用于携带局端为终端分配的 ONU-ID; 第 2字节 Message ID用于标识该消息为请求逻辑注册码的消息; 第 3字节至第 12字节为保留字节。 表 2、 上行方向 ONU/ONT上报逻辑注册码的 PLOAM消息;
[63]
Figure imgf000009_0002
表 2中, 第 1字节 ONU-ID用于携带局端为终端分配的 ONU-ID; 第 2字节 Message
ID用于标识该消息为上报逻辑注册码的消息; 第 3字节至第 12字节用于携带终端 的逻辑注册码。 [65] 上述表 1、 表 2仅仅是一个请求逻辑注册码消息、 上报逻辑注册码消息的具体例 子。 本发明实施方式中, 传输逻辑注册码的消息不限于上述具体的例子。
[66] 上述步骤 5的具体实现过程可以有如下两种实现方式:
[67] 方式一、 先分配临吋 ONU-ID、 再分配正式 ONU-ID的终端自动检测和认证过程 如附图 3所示。
[68] 图 3中, 步骤 1、 OLT向所有的 ONU/ONT发送上报 SN的请求消息。
[69] 步骤 2、 ONU/ONT接收到 OLT发送的请求消息, 响应所述请求消息, 向 OLT上 报自己的 SN。
[70] 步骤 3、 OLT接收到 ONU/ONT上报的 SN, 判断该 SN是否记录过, 即判断接收 到的 SN是与其存储的 SN匹配, 如果 OLT判断出其接收到的 SN为记录过的 SN, 则到步骤 9; 如果 OLT判断出其接收到的 SN为未记录过的 SN, 则 OLT为该 ONU/ ONT分配临吋 ONU-ID, 然后, 向 ONU/ONT发送临吋 ONU-ID, 再到步骤 4。 OL T在为 ONU/ONT分配临吋 ONU-ID吋, 可以从未使用的 ONU-ID中选择一个 ONU- ID作为临吋 ONU-ID。
[71] 步骤 4、 OLT通过与分配了临吋 ONU-ID的 ONU/ONT进行数据交互, 完成分配 了临吋 ONU-ID的 ONU/ONT的测距。
[72] 步骤 5、 OLT向 ONU/ONT发送请求逻辑注册码消息, 该请求逻辑注册码消息可 以通过 Password请求消息来实现, 也可以通过新增定义的请求逻辑注册码消息来 实现。
[73] 步骤 6、 ONU/ONT接收到 OLT发送来的请求逻辑注册码消息, 向 OLT上报自己 的逻辑注册码。 ONU/ONT可以将逻辑注册码携带在上报 Password消息中传输至 OLT, 也可以将逻辑注册码携带在新增定义的逻辑注册码上报消息中传输至 OLT
[74] 步骤 7、 OLT从接收到的消息中获取 ONU/ONT的逻辑注册码, 并根据操作管理 系统预配置的参数对获取到的逻辑注册码进行校验, 即 OLT判断获取到的逻辑注 册码是否与其存储的逻辑注册码匹配, 如果匹配, 则确认该 ONU/ONT为合法终 端, 并记录该 ONU/ONT的 SN, 同吋终止 ONU/ONT的注册过程, 到步骤 8; 如果 不匹配, 则确认该 ONU/ONT为非法终端, 直接终止注册过程, 可以不再进行后 续的步骤。
[75] 步骤 8、 ONU/ONT重新上线进行后续的注册过程, ONU/ONT向 OLT上报自己 的 SN。 OLT接收到 ONU/ONT上报的 SN后, 査找该 SN是否记录过, 如果 OLT判 断出其接收到的 SN为记录过的 SN, 则到步骤 9; 如果 OLT判断出其接收到的 SN 为未记录过的 SN, 则 OLT为该 ONU/ONT分配临吋 ONU-ID, 然后, 向 ONU/ONT 发送临吋 ONU-ID, 再到步骤 4。
[76] 在步骤 8中, 由于 OLT已经记录过该 ONU/ONT的 SN, 因此, 直接到步骤 9。
[77] 步骤 9、 OLT査找对应的 ONU-ID, 并将査找到的 ONU-ID作为正式 ONU-ID。 该 正式 ONU-ID可以为临吋 ONU-ID, 即 OLT将之前为 ONU/ONT分配的临吋 ONU-I D作为该 ONU/ONT的正式 ONU-ID。 OLT可以将该 ONU/ONT的 SN与该 ONU/ON T的正式 ONU-ID绑定。
[78] 步骤 10、 OLT将所述査找到的正式 ONU-ID分配给 ONU/ONT。
[79] 步骤 11、 OLT通过与分配了正式 ONU-ID的 ONU/ONT进行数据交互, 完成分配 了正式 ONU-ID的 ONU/ONT的测距。
[80] 步骤 12、 OLT通过与分配了正式 ONU-ID的 ONU/ONT进行数据交互, 来进行 0 NU/ONT的注册, 在注册成功后, 到步骤 13。
[81] 步骤 13、 OLT通过与注册成功的 ONU/ONT进行数据交互, 来为注册成功的 ON U/ONT配置业务参数。
[82] 在上述针对图 3的描述中' ONU/ONT的逻辑注册码可以为 ONU/ONT的 ONU-ID , 即在上述图 3的步骤 6中, ONU/ONT向 OLT上报的逻辑注册码即为 ONU/ONT的 ONU-ID, 也就是说, 在上述图 2的步骤 1中操作管理系统为提出业务申请的用户 所使用的 ONU/ONT生成的逻辑注册码即为 ONU-ID。
[83] 当然, 在上述针对图 3的描述中, ONU/ONT的逻辑注册码也可以与 ONU/ONT 的 ONU-ID不同。 本发明实施方式不限制 ONU/ONT的逻辑注册码的具体表现形 式。
[84] 另外, 在上述图 3的描述中, 操作管理系统与 OLT之间可以通过管理终端标识 来标识终端; 而 OLT和 ONU/ONT之间可以通过 ONU-ID来标识终端, 管理终端 标识可以釆用 ONU-ID, 也可以釆用不同于 ONU-ID的标识。 当操作管理系统与 0 LT之间的管理终端标识釆用 ONU-ID吋, 操作管理系统、 OLT、 ONU/ONT均釆 用 ONU-ID对 ONU/ONT进行标识。
[85] 方式二、 先分配 ONU-ID、 再进行终端自动检测和认证过程如附图 4所示。
[86] 图 4中, 步骤 1、 OLT向所有的 ONU/ONT发送上报 SN的请求消息。
[87] 步骤 2、 ONU/ONT接收到 OLT发送的请求消息, 响应所述请求消息, 向 OLT上 报自己的 SN。
[88] 步骤 3、 OLT接收到 ONU/ONT上报的 SN, OLT从未使用的 ONU-ID中选择一个
ONU-ID作为正式 ONU-ID, 并将该选择的 ONU-ID分配给 ONU/ONT。
[89] 步骤 4、 OLT通过与分配了 ONU-ID的 ONU/ONT进行数据交互, 完成分配了 ON
U-ID的 ONU/ONT的测距。
[90] 步骤 5、 OLT向 ONU/ONT发送请求逻辑注册码消息, 该请求逻辑注册码消息可 以通过 Password请求消息来实现, 也可以通过新增定义的请求逻辑注册码消息来 实现。
[91] 步骤 6、 ONU/ONT接收到 OLT发送来的请求逻辑注册码消息, 响应所述请求逻 辑注册码消息, 向 OLT上报自己的逻辑注册码。 ONU/ONT可以将逻辑注册码携 带在上报 Password消息中传输至 OLT, 也可以将逻辑注册码携带在新增定义的逻 辑注册码上报消息中传输至 OLT。
[92] 步骤 7、 OLT从接收到的消息中获取 ONU/ONT的逻辑注册码, 并根据操作管理 系统预配置的参数对获取到的逻辑注册码进行校验, 即 OLT判断获取到的逻辑注 册码是否与其存储的逻辑注册码匹配, 如果匹配, 则确认该 ONU/ONT为合法终 端, 并记录该 ONU/ONT的 SN, OLT可以将该 ONU/ONT的 SN与该 ONU/ONT的 0 NU-ID绑定, 到步骤 8; 如果不匹配, 则确认该 ONU/ONT为非法终端, 直接终止 注册过程, 可以不再进行后续的步骤。
[93] 步骤 8、 OLT通过与合法 ONU/ONT进行数据交互, 来进行 ONU/ONT的注册, 在注册成功后, 到步骤 9。
[94] 步骤 9、 OLT通过与注册成功的 ONU/ONT进行数据交互, 来为注册成功的 ONU /ONT配置业务参数。
[95] 步骤 10、 ONU/ONT在下线吋, 向 OLT发送下线消息。 [96] 步骤 11、 OLT接收到 ONU/ONT发送来的下线消息, 释放 ONU/ONT的 SN与 ON U/ONT的 ONU-ID的绑定关系。
[97] 在上述针对图 4的描述中, 操作管理系统与 OLT之间可以通过管理终端标识来 标识终端; 而 OLT和 ONU/ONT之间可以通过 ONU-ID来标识终端, 管理终端标 识可以釆用 ONU-ID, 也可以釆用不同于 ONU-ID的标识。 当操作管理系统与 OL T之间的管理终端标识不釆用 ONU-ID吋, 步骤 7中的 OLT可以将该 ONU/ONT的 S N、 该 ONU/ONT的 ONU-ID、 以及该 ONU/ONT的管理终端标识绑定; 则步骤 11 中' 需要释放该 ONU/ONT的 SN、 该 ONU/ONT的 ONU-ID、 以及该 ONU/ONT的 管理终端标识绑定关系。
[98] 从上述方法实施方式的描述中可以看出, 本发明实施方式可以不需要在局端如 OLT和操作管理系统中静态配置终端序列码, 通过在检测认证过程中釆用逻辑注 册码, 在认证通过后, 记录从合法终端处获取的终端序列码、 并记录为合法终 端分配的终端标识, 使局端如 OLT可以实现对终端的自动检测和认证; OLT通过 将自动检测认证获取到的终端序列码和终端标识传输至操作管理系统, 使操作 管理系统可以动态获取到终端序列码及终端标识, 避免了操作管理系统静态配 置终端序列码及终端标识的过程; 在由于故障等原因需要更换终端吋, 更换后 的终端可以使用更换前的终端的逻辑注册码, 因此, 避免了更换终端而带来的 操作管理系统更新静态配置的序列码的过程; 从而使操作管理系统可以对终端 序列码和终端标识进行动态管理, 而且操作管理系统可以方便的利用动态获得 的终端序列码和终端标识对 OLT、 终端进行维护; 最终降低了操作管理系统、 0 LT、 以及终端的维护成本, 提高了终端检测和认证的灵活性、 以及局端、 终端 的可维护性。
[99] 本发明实施方式还提供一种网络设备, 位于无源光网络局端, 可以为局端的 0 LT, 该网络设备包括第一存储模块、 接收模块、 判断模块、 分配模块和第二存 储模块。
[100] 第一存储模块用于存储终端的逻辑注册码。 第一存储模块中存储的逻辑注册码 可以是局端的操作管理系统配置的。
[101] 接收模块用于接收终端发送来的逻辑注册码、 以及终端序列码。 接收模块可以 向终端请求终端序列码、 以及逻辑注册码, 然后, 再接收终端根据其请求传输 来的终端序列码以及逻辑注册码。
[102] 判断模块用于判断接收模块接收到的逻辑注册码与存储模块中存储的逻辑注册 码是否匹配, 以确定终端是否为合法终端。 判断模块输出判断结果信息, 例如 判断模块输出匹配信息、 或者输出不匹配信息。
[103] 分配模块用于为终端分配终端标识, 并输出。 分配模块可以在判断模块进行判 断之前为终端分配终端标识, 也可以在判断模块进行判断之后为终端分配终端 标识。
[104] 第二存储模块用于在判断模块输出匹配的判断结果信息后, 存储接收模块接收 到的终端序列码、 以及分配模块输出的终端标识。 第二存储模块中存储的终端 序列码、 终端标识为自动检测到的合法终端的终端序列码和终端标识。
[105] 该网络设备还可以可选的包括上报模块。 上报模块用于将第二存储模块存储的 终端序列码上报至局端的操作管理系统。 上报模块向操作管理系统上报的终端 序列码为其所在网络设备自动检测到的合法终端的终端序列码。
[106] 根据自动检测认证的实现方式不同, 上述分配模块、 接收模块等的具体操作也 不同。 下面例举两种具体实现方式。
[107] 方式一、 分配模块包括判断子模块、 分配子模块, 接收模块包括第一请求子模 块、 第二请求子模块和接收子模块。
[108] 第一请求子模块向所有的 ONU/ONT发送上报 SN的请求消息。 接收子模块接收 ONU/ONT上报的 SN。 判断子模块在接收子模块接收到 ONU/ONT上报的 SN后, 判断接收子模块接收到的该 SN是否在第二存储模块中记录过, 即判断接收到的 S N是否与第二存储模块中存储的 SN匹配, 如果判断子模块判断出接收子模块接 收到的 SN为第二存储模块记录过的 SN, 则通知分配子模块分配正式 ONU-ID; 如果判断子模块判断出接收子模块接收到的 SN为第二存储模块未记录过的 SN, 则通知分配子模块分配临吋 ONU-ID。
[109] 分配子模块在接收到判断子模块的分配临吋 ONU-ID的信息后, 为该终端分配 临吋 ONU-ID, 并触发网络设备对该终端进行测距。 该网络设备通过与分配了临 吋 ONU-ID的 ONU/ONT进行数据交互, 完成分配了临吋 ONU-ID的 ONU/ONT的 测距。
[110] 第二请求子模块在网络设备完成测距后向 ONU/ONT发送请求逻辑注册码消息 , 该请求逻辑注册码消息可以通过 Password请求消息来实现, 也可以通过新增定 义的请求逻辑注册码消息来实现。 接收子模块从接收到的消息中获取 ONU/ONT 上报的逻辑注册码。
[111] 判断模块在接收子模块接收到逻辑注册码后, 根据第一存储模块存储的逻辑注 册码对接收子模块接收到的逻辑注册码进行校验, 即判断模块判断接收子模块 接收到的逻辑注册码是否与第一存储模块存储的逻辑注册码匹配, 如果匹配, 则确认该 ONU/ONT为合法终端, 通知第二存储模块记录该 ONU/ONT的 SN; 如 果不匹配, 则确认该 ONU/ONT为非法终端, 直接终止注册过程。
[112] ONU/ONT重新上线进行后续的注册过程, ONU/ONT向 OLT上报自己的 SN。 接 收子模块接收到 ONU/ONT上报的 SN后, 判断子模块査找该 SN是否在第二存储 模块中记录过, 如果判断子模块判断出接收子模块接收到的 SN为第二存储模块 中记录过的 SN, 通知分配子模块为该终端分配正式 ONU-ID; 如果判断子模块判 断出接收子模块接收到的 SN为第二存储模块中未记录过的 SN, 则通知分配子模 块为该终端分配临吋 ONU-ID。
[113] 由于在终端重新上线过程中, 第二存储模块已经记录过该 ONU/ONT的 SN, 因 此, 分配子模块在接收子模块接收到 SN后, 査找 ONU-ID, 并将査找到的 ONU-I D作为正式 ONU-ID分配给该终端, 并触发网络设备对该终端进行测距。
[114] 网络设备通过与分配了正式 ONU-ID的 ONU/ONT进行数据交互, 完成分配了正 式 ONU-ID的 ONU/ONT的测距。 网络设备通过与分配了正式 ONU-ID的 ONU/ON T进行数据交互, 来进行 ONU/ONT的注册, 在注册成功后, OLT通过与注册成 功的 ONU/ONT进行数据交互, 来为注册成功的 ONU/ONT配置业务参数。 另外 , 当操作管理系统与 OLT之间的管理终端标识釆用 ONU-ID吋, 第二存储模块中 可以存储 SN与 ONU-ID的绑定关系。
[115] 方式二、 接收模块包括第一请求子模块、 第三请求子模块和接收子模块。
[116] 第一请求子模块向所有的 ONU/ONT发送上报 SN的请求消息。 接收子模块接收 ONU/ONT上报的 SN。 分配模块在接收子模块接收到 ONU/ONT上报的 SN后, 为 终端分配 ONU-ID, 并触发网络设备对该终端进行测距。 该网络设备通过与分配 了 ONU-ID的 ONU/ONT进行数据交互, 完成分配了 ONU-ID的 ONU/ONT的测距
[117] 第三请求子模块在网络设备完成测距后向 ONU/ONT发送请求逻辑注册码消息 , 该请求逻辑注册码消息可以通过 Password请求消息来实现, 也可以通过新增定 义的请求逻辑注册码消息来实现。 接收子模块从接收到的消息中获取 ONU/ONT 上报的逻辑注册码。
[118] 判断模块在接收子模块接收到逻辑注册码后, 根据第一存储模块存储的逻辑注 册码对接收子模块接收到的逻辑注册码进行校验, 即判断模块判断接收子模块 接收到的逻辑注册码是否与第一存储模块存储的逻辑注册码匹配, 如果匹配, 则确认该 ONU/ONT为合法终端, 通知第二存储模块记录该 ONU/ONT的 SN; 如 果不匹配, 则确认该 ONU/ONT为非法终端, 直接终止注册过程。
[119] 网络设备通过与分配了正式 ONU-ID的 ONU/ONT进行数据交互, 来进行 ONU/0 NT的注册, 在注册成功后, OLT通过与注册成功的 ONU/ONT进行数据交互, 来 为注册成功的 ONU/ONT配置业务参数。
[120] ONU/ONT在下线吋, 向 OLT发送下线消息。 OLT接收到 ONU/ONT发送来的下 线消息后, 第二存储模块释放其存储的该 ONU/ONT的信息。 当操作管理系统与 OLT之间的管理终端标识没有釆用 ONU-ID吋, 第二存储模块中存储的该 ONU/0 NT的信息为: ONU/ONT的 SN、 ONU/ONT的管理终端标识与 ONU/ONT的 ONU-I D的绑定关系。
[121] 本发明实施方式还提供一种无源光网络局端中的操作管理系统, 该操作管理系 统包括: 逻辑注册码模块和序列码模块。
[122] 逻辑注册码模块用于存储逻辑注册码, 为用户分配逻辑注册码, 并将为用户分 配的逻辑注册码传输至光线路终端。 逻辑注册码模块可以将逻辑注册码和业务 参数传输至光线路终端。 具体如上述方法实施方式中的描述。
[123] 序列码模块用于接收光线路终端传输来的合法终端的序列码, 并存储。 光线路 终端传输来的序列码是光线路终端自动检测到的合法终端的序列码。 序列码模 块可以将接收到的序列码存储在 SN数据库中。 操作管理系统中还设置有对 SN进 行管理的模块。
[124] 本发明实施方式还提供一种无源光网络中的终端设备, 该终端设备包括: 接收 存储模块和发送模块。
[125] 接收存储模块用于接收并存储输入其所在终端设备的逻辑注册码。 接收存储模 块可以利用终端设备提供的本地命令行、 Web页面、 或者其它方式接收外部输入 的逻辑注册码。 具体如上述方法实施方式中的描述。
[126] 发送模块用于根据其所在终端设备接收到的局端的请求, 向局端发送所述接收 存储模块中存储的逻辑注册码。 例如, 发送模块将逻辑注册码携带在上报密码 的消息中发送至 OLT; 再例如, 发送模块将逻辑注册码携带在新增定义的专用于 传输逻辑注册码的消息中发送至 OLT。 具体如上述方法实施方式中的描述。
[127] 虽然通过实施例描绘了本发明, 本领域普通技术人员知道, 本发明有许多变形 和变化而不脱离本发明的精神, 本发明的申请文件的权利要求包括这些变形和 变化。

Claims

权利要求书
[1] 一种无源光网络中终端检测认证方法, 其特征在于, 终端具有逻辑注册码
, 所述方法包括步骤:
局端接收终端发送的逻辑注册码;
所述局端确定所述终端发送的逻辑注册码与所述局端存储的逻辑注册码是 否匹配, 如果匹配, 确定所述终端为合法终端;
所述局端记录来自所述合法终端的终端序列码, 并记录为所述合法终端分 配的终端标识。
[2] 如权利要求 1所述的方法, 其特征在于, 所述局端在确认终端为合法终端之 前还包括:
所述局端为该终端分配临吋终端标识, 所述临吋终端标识用于满足终端在 注册或测距过程中的需要。
[3] 如权利要求 2所述的方法, 其特征在于, 为所述合法终端分配的终端标识为 所述终端的正式终端标识, 其中, 所述终端的正式终端标识基于所述临吋 终端标识或者从未使用的终端标识中选择一个终端标识。
[4] 如权利要求 1所述的方法, 其特征在于, 所述局端记录来自所述合法终端的 终端序列码, 并记录为所述合法终端分配的终端标识包括: 所述局端的光线路终端将所述合法终端的终端序列码与所述合法终端的终 端标识绑定; 且所述方法还包括:
当所述局端的光线路终端接收到所述合法终端发送来的下线消息, 释放所 述合法终端的终端序列码与所述合法终端的终端标识的绑定关系。
[5] 如权利要求 1所述的方法, 其特征在于, 所述局端接收终端发送的逻辑注册 码的步骤包括:
局端接收终端发送的携带有逻辑注册码的上报密码的消息, 并从所述上报 密码的消息中获取所述逻辑注册码; 或者
局端接收终端发送来的专用于上报逻辑注册码的消息, 并从所述专用于上 报逻辑注册码的消息中获取所述逻辑注册码。
[6] 如权利要求 1至 5中任一权利要求所述的方法, 其特征在于, 所述局端存储 的逻辑注册码包括:
所述局端的操作管理系统存储的逻辑注册码; 或
所述局端的光线路终端存储的逻辑注册码。
[7] 如权利要求 1至 5中任一权利要求所述的方法, 其特征在于, 所述局端记录 来自所述合法终端处的终端序列码包括:
所述局端的光线路终端记录来自合法终端的终端序列码; 或者 所述局端的操作管理系统通过所述局端的光线路终端获得并记录所述合法 终端的终端序列码。
[8] —种网络设备, 应用于无源光网络局端, 其特征在于, 该网络设备包括: 第一存储模块, 用于存储终端的逻辑注册码;
接收模块, 用于接收终端发送来的逻辑注册码、 以及终端序列码; 判断模块, 用于判断接收模块接收到的逻辑注册码与第一存储模块中存储 的逻辑注册码是否匹配, 并输出判断结果;
分配模块, 用于为终端分配终端标识, 并输出;
第二存储模块, 用于在判断模块输出匹配的判断结果信息后, 存储接收模 块接收到的终端序列码、 以及分配模块输出的终端标识。
[9] 如权利要求 8所述的网络设备, 其特征在于:
所述分配模块包括:
判断子模块, 用于判断接收模块接收到的终端序列码是否记录在第二存储 模块存储的终端序列码中, 并输出判断结果;
分配子模块, 用于在判断子模块输出记录的判断结果后, 为该终端分配正 式终端标识, 在判断子模块输出未记录的判断结果后, 为该终端分配临吋 终端标识; 以及触发网络设备的测距处理;
所述接收模块包括:
第一请求子模块, 用于请求终端的终端序列码;
第二请求子模块, 用于在其所在的网络设备完成所述分配有临吋终端标识 的终端的测距后, 请求该终端的逻辑注册码;
接收子模块, 用于接收所述终端的逻辑注册码、 以及序列码。
[10] 如权利要求 8所述的网络设备, 其特征在于, 所述接收模块包括: 第一请求子模块, 用于请求终端的终端序列码;
第三请求子模块, 用于在接收子模块接收到终端的序列码、 所述分配模块 为终端分配终端标识、 且其所在的网络设备完成所述分配有终端标识的终 端的测距后, 请求该终端的逻辑注册码;
接收子模块, 用于接收所述终端的逻辑注册码、 以及序列码。
[11] 如权利要求 8所述的网络设备, 其特征在于, 所述网络设备还包括:
上报模块, 用于将所述第二存储模块存储的终端序列码上报至局端的操作 管理系统。
[12] 一种操作管理系统, 应用于无源光网络的局端, 其特征在于, 所述操作管 理系统包括:
逻辑注册码模块, 用于存储逻辑注册码, 为用户分配逻辑注册码, 并将为 用户分配的逻辑注册码传输至光线路终端;
序列码模块, 用于接收光线路终端传输来的合法终端的序列码, 并存储。
[13] 一种终端设备, 应用于无源光网络的用户侧, 其特征在于, 所述终端设备 包括:
接收存储模块, 用于接收并存储所在终端设备的逻辑注册码; 发送模块, 用于根据其所在终端设备接收到的局端的请求, 向局端发送所 述接收存储模块中存储的逻辑注册码。
PCT/CN2008/071619 2007-07-13 2008-07-11 Terminal detection authentication method, device and operational management system in passive optical network WO2009009999A1 (en)

Priority Applications (10)

Application Number Priority Date Filing Date Title
EP08773171.7A EP2073444B1 (en) 2007-07-13 2008-07-11 Terminal detection authentication method, device and operational management system in passive optical network
PL08773171T PL2073444T3 (pl) 2007-07-13 2008-07-11 Sposób, urządzenie i system zarządzania operacyjnego do uwierzytelniania wykrywania terminala w pasywnej sieci optycznej
ES08773171.7T ES2437328T3 (es) 2007-07-13 2008-07-11 Método, dispositivo y sistema de gestión de operaciones para la detección y autenticación de un terminal en una red óptica pasiva
US12/604,085 US8406628B2 (en) 2007-07-13 2009-10-22 Method, equipment, and system for detecting and authenticating terminal in passive optical network
US13/770,743 US8774629B2 (en) 2007-07-13 2013-02-19 Method and apparatus for authentication in passive optical network
US14/282,642 US9397777B2 (en) 2007-07-13 2014-05-20 Method and apparatus for authentication in passive optical network
US15/184,661 US9674172B2 (en) 2007-07-13 2016-06-16 Method and apparatus for authentication in passive optical network
US15/497,029 US9942634B2 (en) 2007-07-13 2017-04-25 Method and apparatus for authentication in passive optical network
US15/925,091 US10455304B2 (en) 2007-07-13 2018-03-19 Method and apparatus for authentication in passive optical network
US16/592,123 US10986427B2 (en) 2007-07-13 2019-10-03 Method, equipment, and system for detecting and authenticating terminal in passive optical network

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN200710119103.X 2007-07-13
CN200710119103XA CN101083589B (zh) 2007-07-13 2007-07-13 无源光网络中的终端检测认证方法、装置及操作管理系统

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US12/604,085 Continuation US8406628B2 (en) 2007-07-13 2009-10-22 Method, equipment, and system for detecting and authenticating terminal in passive optical network

Publications (1)

Publication Number Publication Date
WO2009009999A1 true WO2009009999A1 (en) 2009-01-22

Family

ID=38912877

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2008/071619 WO2009009999A1 (en) 2007-07-13 2008-07-11 Terminal detection authentication method, device and operational management system in passive optical network

Country Status (6)

Country Link
US (7) US8406628B2 (zh)
EP (1) EP2073444B1 (zh)
CN (1) CN101083589B (zh)
ES (1) ES2437328T3 (zh)
PL (1) PL2073444T3 (zh)
WO (1) WO2009009999A1 (zh)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2012528493A (ja) * 2009-05-28 2012-11-12 ▲ホア▼▲ウェイ▼技術有限公司 受動光ネットワークにおける認証のための方法と装置およびその受動光ネットワーク
CN105376663A (zh) * 2015-10-08 2016-03-02 上海斐讯数据通信技术有限公司 一种gpon系统中超级用户onu远程管理olt的方法
US10265286B2 (en) 2016-12-28 2019-04-23 Vanderbilt University Sequelae of cardiopulmonary bypass-induced pulmonary injury
US10525026B2 (en) 2015-06-29 2020-01-07 Vanderbilt University Intravenous administration of citrulline during surgery

Families Citing this family (38)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101083589B (zh) 2007-07-13 2010-08-11 华为技术有限公司 无源光网络中的终端检测认证方法、装置及操作管理系统
CN101873516B (zh) * 2009-04-22 2015-05-20 中兴通讯股份有限公司 一种吉比特无源光网络系统的光网络单元注册激活方法
CN101990134B (zh) * 2009-07-30 2015-05-06 中兴通讯股份有限公司 动态管理序列号方法及系统和光线路终端及光网络单元
CN101674501B (zh) * 2009-09-22 2013-04-03 中兴通讯股份有限公司 吉比特无源光网络注册流程的实现方法及系统
CN102036128A (zh) * 2009-09-29 2011-04-27 中兴通讯股份有限公司 吉比特无源光网络中实现信息交互安全的方法及系统
CN101692672B (zh) * 2009-10-19 2016-02-10 中兴通讯股份有限公司 无源光网络中光网络单元的注册方法与装置
CN102075820B (zh) * 2009-11-23 2015-05-20 中兴通讯股份有限公司 在无源光网络中测距的方法和装置
CN102104428B (zh) * 2009-12-18 2014-12-03 华为技术有限公司 无源光网络的注册窗口调整方法、系统和装置
CN101827287B (zh) * 2010-05-14 2013-04-17 华为技术有限公司 无源光网络及其接入方法、光网络单元和光线路终端
CN102271293B (zh) * 2010-06-07 2015-08-12 中兴通讯股份有限公司 一种识别恶意光网络单元的方法及系统
CN102480650A (zh) * 2010-11-22 2012-05-30 中兴通讯股份有限公司 无源光网络系统中信息的发送方法及无源光网络系统
CN102262533B (zh) * 2011-07-05 2015-04-29 华为软件技术有限公司 终端、触发方法和终端间应用程序通讯方法
WO2013086287A1 (en) * 2011-12-07 2013-06-13 Adc Telecommunications, Inc. Systems and methods for using active optical cable segments
CN103248417B (zh) * 2012-02-06 2019-05-21 中兴通讯股份有限公司 一种无源光网络系统中身份标识分配方法及装置
KR101693606B1 (ko) 2012-06-25 2017-01-06 에이디씨 텔레커뮤니케이션스 인코포레이티드 능동 광학 모듈에 대한 물리 계층 관리
US9351571B2 (en) 2012-07-11 2016-05-31 Manitowoc Foodservice Companies, Llc Connection assembly for a base and a cabinet assembly of an ice maker
US9473361B2 (en) 2012-07-11 2016-10-18 Commscope Technologies Llc Physical layer management at a wall plate device
KR20140083160A (ko) * 2012-12-24 2014-07-04 한국전자통신연구원 광 회선 단말 및 그것의 광 네트워크 단말 등록 방법
US9535680B2 (en) * 2013-03-12 2017-01-03 Broadcom Corporation Flashless optical network unit
AU2014326987A1 (en) 2013-09-24 2016-04-21 Commscope Technologies Llc. Pluggable active optical module with managed connectivity support and simulated memory table
CN103747370A (zh) * 2013-12-02 2014-04-23 上海斐讯数据通信技术有限公司 一种epon系统中实现onu自动授权的方法
CN103701640B (zh) * 2013-12-18 2016-09-28 烽火通信科技股份有限公司 使用智能管理终端升级odn设备的方法及系统
CN104901930A (zh) * 2014-04-21 2015-09-09 孟俊 一种基于cpk标识认证的可追溯网络行为管理方法
CN104917568A (zh) * 2015-05-22 2015-09-16 国家电网公司 一种带显示的电力光网络单元
WO2016187785A1 (zh) * 2015-05-25 2016-12-01 华为技术有限公司 一种消息的传输方法、装置和系统
US9628181B1 (en) * 2015-07-09 2017-04-18 Adtran, Inc. Systems and methods for provisioning an optical network unit
CN107317647B (zh) * 2016-04-26 2019-07-26 中兴通讯股份有限公司 通道的调整方法、装置及系统
CN107483310B (zh) * 2017-08-25 2021-04-30 深圳市盛路物联通讯技术有限公司 一种终端与转发节点之间组网的方法和系统
ES2829263T3 (es) 2017-11-30 2021-05-31 Telefonica Digital Espana Slu Método de auto-aprovisionamiento, sistema y productos de programa informático para accesos de FTTH basado en SDN
CN107959898A (zh) * 2017-12-05 2018-04-24 无锡路通视信网络股份有限公司 一种olt识别与其连接的onu合法性的方法
CN108363811A (zh) * 2018-03-09 2018-08-03 北京京东金融科技控股有限公司 设备识别方法及装置、电子设备、存储介质
WO2020004498A1 (ja) * 2018-06-29 2020-01-02 日本電信電話株式会社 サービス開始方法及び通信システム
EP3598699B1 (en) 2018-07-18 2021-11-24 Telefonica Digital España, S.L.U. An auto-provision method, a system and computer program product for ftth backhaul, midhaul or fronthaul for mobile base stations based on sdn
US11595128B2 (en) 2020-09-29 2023-02-28 Cambridge Industries USA, Inc. Configuring an optical network termination
CN114339480A (zh) * 2020-09-29 2022-04-12 剑桥工业(美国)有限公司 配置光网络终端
CN112929387B (zh) * 2021-03-09 2022-10-11 北京电信规划设计院有限公司 应用于智慧社区的宽带网络多重认证、加密方法
CN113660034B (zh) * 2021-08-17 2022-07-08 上海欣诺通信技术股份有限公司 一种手持式pon模拟系统的分析方法和装置
CN117768810A (zh) * 2022-09-16 2024-03-26 中兴通讯股份有限公司 光网络单元的注册方法、光线路终端、光网络单元、介质

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1458164A2 (en) 2003-03-10 2004-09-15 Samsung Electronics Co., Ltd. Method, apparatus and computer readable storage medium for authentication of optical network units in an Ethernet Passive Optical Network EPON
KR20050003642A (ko) 2003-07-03 2005-01-12 삼성전자주식회사 기가 비트 수동 광가입자 망에서의 onu의 등록 방법
CN1855813A (zh) * 2005-04-27 2006-11-01 华为技术有限公司 一种认证的实现方法和装置
CN1997026A (zh) * 2006-12-29 2007-07-11 北京工业大学 一种基于802.1x协议的扩展安全认证方法
CN101083589A (zh) * 2007-07-13 2007-12-05 华为技术有限公司 无源光网络中的终端检测认证方法、装置及操作管理系统

Family Cites Families (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6546014B1 (en) 2001-01-12 2003-04-08 Alloptic, Inc. Method and system for dynamic bandwidth allocation in an optical access network
JP4110890B2 (ja) * 2002-09-03 2008-07-02 株式会社日立製作所 パケット通信システム
KR100453823B1 (ko) 2002-12-07 2004-10-20 한국전자통신연구원 다수의 이더넷 수동 광통신망을 관리하기 위한 네트워크운용관리 및 유지보수 방법 및 장치
KR100563657B1 (ko) * 2003-10-21 2006-03-23 한국전자통신연구원 이더넷 수동형 광가입자망에서 vlan 인식 및 llid관리 기능을 갖는 공유 랜 에뮬레이션 방법 및 장치
US20080232819A1 (en) * 2003-11-05 2008-09-25 Hiroaki Mukai Pon System and Optical Network Unit Connecting Method
KR100584383B1 (ko) * 2004-01-20 2006-05-26 삼성전자주식회사 광선로가입자장치들의 링크 상태를 관리하기 위한광선로종단장치 및 이를 적용한 기가비트 이더넷 기반의수동 광가입자망
CN1941009A (zh) 2005-09-29 2007-04-04 普天信息技术研究院 一种用移动通信终端进行费用支付的实现方法
CN1988552B (zh) 2005-12-20 2010-11-10 中国电信股份有限公司 一种自动识别与配置终端的方法
KR100738559B1 (ko) * 2006-02-13 2007-07-11 삼성전자주식회사 Epon 시스템의 대역폭 설정 방법 및 그 장치
JP5086334B2 (ja) * 2006-03-31 2012-11-28 ブリティッシュ・テレコミュニケーションズ・パブリック・リミテッド・カンパニー 光ネットワークにアウトステーションを取り入れる方法およびアウトステーション
JP4231061B2 (ja) * 2006-05-10 2009-02-25 株式会社日立コミュニケーションテクノロジー 加入者接続装置およびネットワークシステム
US20070274720A1 (en) * 2006-05-25 2007-11-29 Menasco Heyward E Jr Optical Network Unit Activation
CN1968089A (zh) 2006-09-29 2007-05-23 华为技术有限公司 一种无源光网络的用户认证方法
US20080292313A1 (en) * 2007-05-25 2008-11-27 Glenn Mark Mahony Methods, Systems, and Computer-Readable Media for Ranging a Device in a Point-to-Multipoint Network
US20080310835A1 (en) * 2007-06-18 2008-12-18 At&T Knowledge Ventures, Lp System for validating installation of optical network devices
CN101478702B (zh) 2007-07-13 2012-11-21 华为技术有限公司 无源光网络中的终端检测认证方法、装置及操作管理系统
CN101145903B (zh) 2007-10-24 2010-06-16 中兴通讯股份有限公司 一种用户认证方法

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1458164A2 (en) 2003-03-10 2004-09-15 Samsung Electronics Co., Ltd. Method, apparatus and computer readable storage medium for authentication of optical network units in an Ethernet Passive Optical Network EPON
KR20050003642A (ko) 2003-07-03 2005-01-12 삼성전자주식회사 기가 비트 수동 광가입자 망에서의 onu의 등록 방법
CN1855813A (zh) * 2005-04-27 2006-11-01 华为技术有限公司 一种认证的实现方法和装置
CN1997026A (zh) * 2006-12-29 2007-07-11 北京工业大学 一种基于802.1x协议的扩展安全认证方法
CN101083589A (zh) * 2007-07-13 2007-12-05 华为技术有限公司 无源光网络中的终端检测认证方法、装置及操作管理系统

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
See also references of EP2073444A4
SUN-SIK ROH ET AL.: "COMPUTATIONAL SCIENCE AND ITS APPLICATIONS A ICCSA 2004", 23 April 2004, SPRINGER-VERLAG, article "Design of Authentication and Key Exchange Protocol in Ethernet Passive Optical Networks", pages: 1035 - 1043

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2012528493A (ja) * 2009-05-28 2012-11-12 ▲ホア▼▲ウェイ▼技術有限公司 受動光ネットワークにおける認証のための方法と装置およびその受動光ネットワーク
US10525026B2 (en) 2015-06-29 2020-01-07 Vanderbilt University Intravenous administration of citrulline during surgery
CN105376663A (zh) * 2015-10-08 2016-03-02 上海斐讯数据通信技术有限公司 一种gpon系统中超级用户onu远程管理olt的方法
CN105376663B (zh) * 2015-10-08 2019-07-05 上海斐讯数据通信技术有限公司 一种gpon系统中超级用户onu远程管理olt的方法
US10265286B2 (en) 2016-12-28 2019-04-23 Vanderbilt University Sequelae of cardiopulmonary bypass-induced pulmonary injury

Also Published As

Publication number Publication date
CN101083589A (zh) 2007-12-05
ES2437328T3 (es) 2014-01-10
EP2073444A1 (en) 2009-06-24
US9942634B2 (en) 2018-04-10
CN101083589B (zh) 2010-08-11
US9674172B2 (en) 2017-06-06
US20130163989A1 (en) 2013-06-27
US8774629B2 (en) 2014-07-08
US20160294801A1 (en) 2016-10-06
US20200037054A1 (en) 2020-01-30
US20180213308A1 (en) 2018-07-26
US9397777B2 (en) 2016-07-19
US20100040371A1 (en) 2010-02-18
US10986427B2 (en) 2021-04-20
US8406628B2 (en) 2013-03-26
EP2073444A4 (en) 2010-04-07
US20140255030A1 (en) 2014-09-11
US20170230737A1 (en) 2017-08-10
PL2073444T3 (pl) 2014-02-28
EP2073444B1 (en) 2013-09-11
US10455304B2 (en) 2019-10-22

Similar Documents

Publication Publication Date Title
WO2009009999A1 (en) Terminal detection authentication method, device and operational management system in passive optical network
WO2010135936A1 (zh) 无源光网络中的认证方法、装置及一种无源光网络
CN107925573B (zh) 提供受限设备之间的安全通信的方法和装置
CN101286887B (zh) 实现终端注册的方法、装置及系统
US20110167487A1 (en) Method, system and device for enabling user side terminal to obtain password
WO2011127731A1 (zh) 光网络单元的注册激活方法及系统
WO2015024235A1 (zh) 无源光网络中的终端认证方法、装置及系统
CN109412792A (zh) 数字证书的生成、认证方法、通信设备及存储介质
CN102571353A (zh) 无源光网络中验证家庭网关合法性的方法
WO2014110976A1 (zh) D2d发现申请和d2d发现完成方法及对应装置
WO2014101084A1 (zh) 一种认证方法、设备和系统
WO2012163022A1 (zh) 光网络系统的认证方法、光网络终端及光网络系统
KR100670781B1 (ko) 이더넷 기반 수동형 광가입자망에서의 동적 ip 할당 방법
JP2004180183A (ja) 局側装置、加入者側装置、ポイント・マルチポイント通信システム及びポイント・マルチポイント通信方法
JP2013175835A (ja) 光通信ネットワークシステム、子局通信装置、親局通信装置、及び制御方法
KR20120091706A (ko) 인터넷 회선정보를 이용한 단말 접속제어 시스템 및 방법
CN117336165A (zh) 一种适用于ont的网络参数动态配置方法及系统
WO2014075266A1 (zh) 认证方法、装置和系统
JP2018157517A (ja) 加入者線終端装置認証装置及び加入者線終端装置認証方法

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 08773171

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 2008773171

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 5874/DELNP/2009

Country of ref document: IN

NENP Non-entry into the national phase

Ref country code: DE