[go: up one dir, main page]

CN117579182B - Service encryption method of passive optical network system, electronic equipment and storage medium - Google Patents

Service encryption method of passive optical network system, electronic equipment and storage medium Download PDF

Info

Publication number
CN117579182B
CN117579182B CN202410063582.1A CN202410063582A CN117579182B CN 117579182 B CN117579182 B CN 117579182B CN 202410063582 A CN202410063582 A CN 202410063582A CN 117579182 B CN117579182 B CN 117579182B
Authority
CN
China
Prior art keywords
encryption
key
onu
uplink
optical network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202410063582.1A
Other languages
Chinese (zh)
Other versions
CN117579182A (en
Inventor
刘凯林
王鹏
蔡立勇
张伟良
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN202410063582.1A priority Critical patent/CN117579182B/en
Publication of CN117579182A publication Critical patent/CN117579182A/en
Application granted granted Critical
Publication of CN117579182B publication Critical patent/CN117579182B/en
Priority to PCT/CN2025/071772 priority patent/WO2025152864A1/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B10/00Transmission systems employing electromagnetic waves other than radio-waves, e.g. infrared, visible or ultraviolet light, or employing corpuscular radiation, e.g. quantum communication
    • H04B10/80Optical aspects relating to the use of optical transmission for specific applications, not provided for in groups H04B10/03 - H04B10/70, e.g. optical power feeding or optical transmission through water
    • H04B10/85Protection from unauthorised access, e.g. eavesdrop protection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • H04L9/16Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms the keys or algorithms being changed during operation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q11/00Selecting arrangements for multiplex systems
    • H04Q11/0001Selecting arrangements for multiplex systems using optical switching
    • H04Q11/0062Network aspects
    • H04Q11/0067Provisions for optical access or distribution networks, e.g. Gigabit Ethernet Passive Optical Network (GE-PON), ATM-based Passive Optical Network (A-PON), PON-Ring

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Small-Scale Networks (AREA)

Abstract

本申请公开了一种无源光网络系统的业务加密方法、电子设备及存储介质,属于通信技术领域。本申请的技术方案是将加密使能信息发送至光网络单元ONU,在使能开启上下行加密或者开启上行加密后,通过OMCI实体ONU2‑G,对OLT与ONU当前所协商采用的加密算法进行动态切换;根据动态切换后的加密算法,与ONU之间进行密钥同步;在密钥同步后,根据超帧计数器的目标值或Key Index,确定从指定帧开始使用新密钥或新的加密算法,并将超帧计数器的目标值或Key Index发送至ONU。本申请能够实现PON系统支持多种加密算法,以及各算法动态切换的需求。

The present application discloses a service encryption method, electronic device and storage medium of a passive optical network system, and belongs to the field of communication technology. The technical solution of the present application is to send encryption enable information to the optical network unit ONU, and after enabling the uplink and downlink encryption or the uplink encryption, dynamically switch the encryption algorithm currently negotiated and adopted by the OLT and the ONU through the OMCI entity ONU2‑G; perform key synchronization with the ONU according to the encryption algorithm after dynamic switching; after key synchronization, determine to use a new key or a new encryption algorithm starting from the specified frame according to the target value or Key Index of the superframe counter, and send the target value or Key Index of the superframe counter to the ONU. The present application can realize the requirements of the PON system supporting multiple encryption algorithms and dynamic switching of each algorithm.

Description

无源光网络系统的业务加密方法、电子设备及存储介质Service encryption method, electronic device and storage medium for passive optical network system

技术领域Technical Field

本申请涉及通信技术领域,尤其涉及无源光网络系统的业务加密方法、电子设备及存储介质。The present application relates to the field of communication technology, and in particular to a service encryption method, electronic equipment and storage medium of a passive optical network system.

背景技术Background technique

无源光网络(PON,Passive Optical Network)是一种宽带无源光接入技术、点到多点的光纤接入技术,它由安装于中心控制站的光线路终端(OLT,Optical LineTerminal)、一批配套安装于用户场所的光网络单元(ONU,Optical Network Unit)以及光分配网络(ODN,Optical Distribution Network)组成。ODN通常为点到多点结构,一个OLT连接多个ONU。在OLT与ONU之间的ODN包含了光纤以及无源分光器或耦合器等无源器件,不含有任何有源设备。PON由于在光纤接入方式中具有相对成本低,方便平滑升级等优势,成为未来接入网宽带发展的方向。Passive Optical Network (PON) is a broadband passive optical access technology, a point-to-multipoint fiber access technology, which consists of an optical line terminal (OLT) installed in a central control station, a group of optical network units (ONU) installed in user locations, and an optical distribution network (ODN). ODN is usually a point-to-multipoint structure, with one OLT connecting multiple ONUs. The ODN between the OLT and the ONU contains passive devices such as optical fibers and passive splitters or couplers, and does not contain any active devices. PON has the advantages of relatively low cost and convenient and smooth upgrades in fiber optic access, and has become the direction of future access network broadband development.

PON有多种形式,如APON(ATM Passive Optical Network,ATM无源光网络,其中ATM为异步转移模式)、BPON(Broadband Passive Optical Network,宽带无源光网络)、EPON(Ethernet Passive Optical Network,以太网无源光网络)、GPON(Gigabit PassiveOptical Network,吉比特无源光网络)、XGPON(10-Gigabit-capable Passive OpticalNetworks,10G无源光网络)、XGSPON(10-Gigabit-capable Symmetric Passive OpticalNetworks,10G对称无源光网络)等,但是其基本构造基本差异不大。传送数据过程中,下行采用广播方式,由局端的OLT将下行的光信号经过光分路器,分成多路给各个ONU,而每个ONU上行的信号逆向通过光耦合器合成在一根光纤多任务传送给OLT。There are many forms of PON, such as APON (ATM Passive Optical Network, ATM passive optical network, where ATM is asynchronous transfer mode), BPON (Broadband Passive Optical Network, EPON (Ethernet Passive Optical Network, Ethernet Passive Optical Network), GPON (Gigabit Passive Optical Network, Gigabit Passive Optical Network), XGPON (10-Gigabit-capable Passive Optical Networks, 10G Passive Optical Network), XGSPON (10-Gigabit-capable Symmetric Passive Optical Networks, 10G Symmetric Passive Optical Network), etc., but their basic structures are basically the same. In the process of transmitting data, the downstream uses a broadcast method. The OLT at the local end divides the downstream optical signal into multiple channels for each ONU through an optical splitter, and the upstream signal of each ONU is reversely synthesized on one optical fiber through an optical coupler and transmitted to the OLT in multiple tasks.

随着光网络的不断发展,光纤到户(Fiber to Home,FTTH)已经全面铺开,其光路终端OLT和光网络单元ONU也得到了广泛应用。然而由于目前国际标准中对GPON只定义了一种高级加密算法。而FTTR(Fiber To The Room,光纤到房间)场景下GPON产品的研发要求能够适应不同国家、不同地区和不同网络运营商的应用需要,不同国家可能使用不同的加密算法,不同网络运营商也可能使用不同的加密算法。With the continuous development of optical networks, fiber to the home (FTTH) has been fully rolled out, and its optical line terminal OLT and optical network unit ONU have also been widely used. However, since the current international standard only defines one advanced encryption algorithm for GPON, the research and development requirements of GPON products in the FTTR (Fiber To The Room) scenario must be able to adapt to the application needs of different countries, regions and network operators. Different countries may use different encryption algorithms, and different network operators may also use different encryption algorithms.

现有技术方案只考虑了一种数据加密算法模式,没有在ONU连接到OLT的配置阶段提供多算法模式协商过程,缺乏对多种加密算法的兼容处理,不能满足多国家,多地区和多网络运营商对FTTR场景下GPON设备要求支持多种加密算法,以及各算法动态切换的需求。The existing technical solutions only consider one data encryption algorithm mode, and do not provide a multi-algorithm mode negotiation process during the configuration phase when the ONU is connected to the OLT. They lack compatible processing for multiple encryption algorithms and cannot meet the requirements of multiple countries, regions and network operators for GPON equipment in FTTR scenarios to support multiple encryption algorithms and dynamic switching of algorithms.

发明内容Summary of the invention

本申请的主要目的在于提供一种无源光网络系统的业务加密方法、电子设备及存储介质,旨在实现PON系统支持多种加密算法,以及各算法动态切换的需求。The main purpose of this application is to provide a service encryption method, electronic device and storage medium for a passive optical network system, aiming to realize the PON system supporting multiple encryption algorithms and the demand for dynamic switching of each algorithm.

为实现上述目的,本申请提供一种无源光网络系统的业务加密方法,所述业务加密方法应用于光线路终端OLT,包括:To achieve the above object, the present application provides a service encryption method for a passive optical network system, the service encryption method is applied to an optical line terminal OLT, and includes:

将加密使能信息发送至光网络单元ONU,其中,所述加密使能信息用于指示当前为不开启加密、仅开启上行加密、仅开启下行加密或者开启上下行加密;Sending encryption enable information to the optical network unit ONU, wherein the encryption enable information is used to indicate whether encryption is currently not enabled, only uplink encryption is enabled, only downlink encryption is enabled, or uplink and downlink encryption is enabled;

在使能开启上下行加密或者开启上行加密后,通过OMCI实体ONU2-G,对所述OLT与所述ONU当前所协商采用的加密算法进行动态切换;After enabling uplink and downlink encryption or enabling uplink encryption, dynamically switching the encryption algorithm currently negotiated and adopted by the OLT and the ONU through the OMCI entity ONU2-G;

根据所述动态切换后的加密算法,与所述ONU之间进行密钥同步;Perform key synchronization with the ONU according to the encryption algorithm after the dynamic switching;

在密钥同步后,根据超帧计数器的目标值或Key Index,确定从指定帧开始使用新密钥或新的加密算法,并将所述超帧计数器的目标值或Key Index发送至所述ONU。After key synchronization, it is determined to use a new key or a new encryption algorithm starting from a specified frame according to a target value or Key Index of a superframe counter, and the target value or Key Index of the superframe counter is sent to the ONU.

此外,为实现上述目的,本申请提供一种无源光网络系统的业务加密方法,所述业务加密方法应用于光网络单元ONU,包括:In addition, to achieve the above-mentioned purpose, the present application provides a service encryption method of a passive optical network system, the service encryption method is applied to an optical network unit ONU, comprising:

接收光线路终端OLT发送的加密使能信息,其中,所述加密使能信息用于指示当前为不开启加密、仅开启上行加密、仅开启下行加密或者开启上下行加密;Receiving encryption enabling information sent by an optical line terminal OLT, wherein the encryption enabling information is used to indicate whether encryption is currently not enabled, only uplink encryption is enabled, only downlink encryption is enabled, or uplink and downlink encryption is enabled;

在使能开启上下行加密或者开启上行加密后,通过OMCI实体ONU2-G,对所述OLT与所述ONU当前所协商采用的加密算法进行动态切换;After enabling uplink and downlink encryption or enabling uplink encryption, dynamically switching the encryption algorithm currently negotiated and adopted by the OLT and the ONU through the OMCI entity ONU2-G;

根据所述动态切换后的加密算法,与所述OLT之间进行密钥同步;Performing key synchronization with the OLT according to the dynamically switched encryption algorithm;

在密钥同步后,接收所述OLT发送的超帧计数器的目标值或Key Index,根据所述超帧计数器的目标值或Key Index,确定从指定帧开始使用新密钥或新的加密算法。After key synchronization, a target value of a superframe counter or a Key Index sent by the OLT is received, and a new key or a new encryption algorithm is determined to be used starting from a specified frame according to the target value of the superframe counter or the Key Index.

此外,为实现上述目的,本申请还提供一种无源光网络系统的业务加密方法,所述业务加密方法应用于FTTR主设备MFU,包括:In addition, to achieve the above-mentioned purpose, the present application also provides a service encryption method of a passive optical network system, the service encryption method is applied to an FTTR main device MFU, comprising:

将加密使能信息发送至FTTR从设备SFU,其中,所述加密使能信息用于指示当前为不开启加密、仅开启上行加密、仅开启下行加密或者开启上下行加密;Sending encryption enabling information to the FTTR slave device SFU, wherein the encryption enabling information is used to indicate whether encryption is currently not enabled, only uplink encryption is enabled, only downlink encryption is enabled, or uplink and downlink encryption is enabled;

在使能开启上下行加密或者开启上行加密后,通过OMCI实体ONU2-G,对所述MFU与所述SFU当前所协商采用的加密算法进行动态切换;After enabling uplink and downlink encryption or enabling uplink encryption, the encryption algorithm currently negotiated and adopted by the MFU and the SFU is dynamically switched through the OMCI entity ONU2-G;

根据所述动态切换后的加密算法,与所述SFU之间进行密钥同步;Perform key synchronization with the SFU according to the encryption algorithm after the dynamic switch;

在密钥同步后,根据超帧计数器的目标值或Key Index,确定从指定帧开始使用新密钥或新的加密算法,并将所述超帧计数器的目标值或Key Index发送至所述SFU。After key synchronization, it is determined to use a new key or a new encryption algorithm starting from a specified frame according to the target value of the superframe counter or the Key Index, and the target value of the superframe counter or the Key Index is sent to the SFU.

此外,为实现上述目的,本申请还提供一种无源光网络系统的业务加密方法,所述业务加密方法应用于FTTR从设备SFU,包括:In addition, to achieve the above-mentioned purpose, the present application also provides a service encryption method of a passive optical network system, the service encryption method is applied to a FTTR slave device SFU, comprising:

接收FTTR主设备MFU发送的加密使能信息,其中,所述加密使能信息用于指示当前为不开启加密、仅开启上行加密、仅开启下行加密或者开启上下行加密;Receive encryption enabling information sent by the FTTR master device MFU, wherein the encryption enabling information is used to indicate whether encryption is currently not enabled, only uplink encryption is enabled, only downlink encryption is enabled, or uplink and downlink encryption is enabled;

在使能开启上下行加密或者开启上行加密后,通过OMCI实体ONU2-G,对所述MFU与所述SFU当前所协商采用的加密算法进行动态切换;After enabling uplink and downlink encryption or enabling uplink encryption, the encryption algorithm currently negotiated and adopted by the MFU and the SFU is dynamically switched through the OMCI entity ONU2-G;

根据所述动态切换后的加密算法,与所述MFU之间进行密钥同步;Perform key synchronization with the MFU according to the dynamically switched encryption algorithm;

在密钥同步后,接收所述MFU发送的超帧计数器的目标值或Key Index,根据所述超帧计数器的目标值或Key Index,确定从指定帧开始使用新密钥或新的加密算法。After key synchronization, the target value of the superframe counter or the Key Index sent by the MFU is received, and according to the target value of the superframe counter or the Key Index, it is determined to use a new key or a new encryption algorithm starting from a specified frame.

此外,为实现上述目的,本申请还提供一种电子设备,所述电子设备包括:存储器、处理器及存储在所述存储器上并可在所述处理器上运行的无源光网络系统的业务加密程序,所述无源光网络系统的业务加密程序被所述处理器执行时实现如上述的无源光网络系统的业务加密方法。In addition, to achieve the above-mentioned purpose, the present application also provides an electronic device, which includes: a memory, a processor, and a service encryption program of a passive optical network system stored in the memory and runnable on the processor, and when the service encryption program of the passive optical network system is executed by the processor, the service encryption method of the passive optical network system as described above is implemented.

此外,为实现上述目的,本申请还提供一种存储介质,所述存储介质为计算机可读存储介质,所述计算机可读存储介质上存储有无源光网络系统的业务加密程序,所述无源光网络系统的业务加密程序被处理器执行时实现如上述的无源光网络系统的业务加密方法。In addition, to achieve the above-mentioned purpose, the present application also provides a storage medium, which is a computer-readable storage medium, and a service encryption program of a passive optical network system is stored on the computer-readable storage medium. When the service encryption program of the passive optical network system is executed by a processor, the service encryption method of the passive optical network system as described above is implemented.

本申请提出一种无源光网络系统的业务加密方法、电子设备及存储介质,在无源光网络系统的业务加密方法中,本申请实施例的技术方案是将加密使能信息发送至光网络单元ONU,其中,该加密使能信息用于指示当前为不开启加密、仅开启上行加密、仅开启下行加密或者开启上下行加密,然后在使能开启上下行加密或者开启上行加密后,通过OMCI设备的OMCI实体ONU2-G,对OLT与ONU当前所协商采用的加密算法进行动态切换,根据该动态切换后的加密算法,与ONU之间进行密钥同步,再在密钥同步后,根据超帧计数器的目标值或Key Index,确定从指定帧开始使用新密钥或新的加密算法,并将超帧计数器的目标值或Key Index发送至所述ONU,以通知ONU从指定帧开始使用新密钥或新的加密算法,实现对上行业务报文进行加解密,从而使得在FTTR(Fiber To The Room,光纤到房间)场景下的GPON非对称和GPON对称,增加上行加密,进而使得FTTR场景下的各种PON模式(包括但不限于GPON非对称、GPON对称、XGPON非对称、XGPON对称等PON模式)能够支持上下行加密使能策略、SM4加密算法以及加密算法动态切换策略,有效实现PON系统支持多种加密算法,以及各算法动态切换的需求。The present application proposes a service encryption method, electronic device and storage medium of a passive optical network system. In the service encryption method of the passive optical network system, the technical solution of the embodiment of the present application is to send encryption enabling information to an optical network unit ONU, wherein the encryption enabling information is used to indicate that encryption is not enabled, only uplink encryption is enabled, only downlink encryption is enabled or uplink and downlink encryption is enabled. Then, after enabling uplink and downlink encryption or enabling uplink encryption, the encryption algorithm currently negotiated and adopted by the OLT and the ONU is dynamically switched through the OMCI entity ONU2-G of the OMCI device. According to the encryption algorithm after the dynamic switching, key synchronization is performed with the ONU. After key synchronization, according to the target value or Key Index of the superframe counter, it is determined to use a new key or a new encryption algorithm from a specified frame, and the target value or Key Index of the superframe counter is sent to the ONU to notify the ONU to use the new key or the new encryption algorithm from a specified frame to implement encryption and decryption of the uplink service message, so that in FTTR (Fiber To The The GPON asymmetric and GPON symmetric in the FTTR (Fiber to the Room) scenario increase uplink encryption, so that various PON modes in the FTTR scenario (including but not limited to GPON asymmetric, GPON symmetric, XGPON asymmetric, XGPON symmetric and other PON modes) can support uplink and downlink encryption enabling strategies, SM4 encryption algorithms and encryption algorithm dynamic switching strategies, effectively realizing the PON system to support multiple encryption algorithms and the dynamic switching of algorithms.

附图说明BRIEF DESCRIPTION OF THE DRAWINGS

为了更清楚地说明本申请实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图示出的结构获得其他的附图。In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings required for use in the embodiments or the description of the prior art will be briefly introduced below. Obviously, the drawings described below are only some embodiments of the present application. For ordinary technicians in this field, other drawings can be obtained based on the structures shown in these drawings without paying any creative work.

图1为本申请第一实施例中无源光网络系统的业务加密方法的流程示意图;FIG1 is a schematic flow chart of a service encryption method for a passive optical network system in a first embodiment of the present application;

图2为本申请第二实施例中无源光网络系统的业务加密方法的流程示意图;2 is a schematic diagram of a flow chart of a service encryption method for a passive optical network system in a second embodiment of the present application;

图3为本申请一示例性实施例的电子设备的结构框图。FIG. 3 is a structural block diagram of an electronic device according to an exemplary embodiment of the present application.

具体实施方式Detailed ways

这里将详细地对示例性实施例进行说明,其示例表示在附图中。下面的描述涉及附图时,除非另有表示,不同附图中的相同数字表示相同或相似的要素。以下示例性实施例中所描述的实施方式并不代表与本申请相一致的所有实施方式。相反,它们仅是与如所附权利要求书中所详述的、本申请的一些方面相一致的装置和方法的例子。Exemplary embodiments will be described in detail herein, examples of which are shown in the accompanying drawings. When the following description refers to the drawings, unless otherwise indicated, the same numbers in different drawings represent the same or similar elements. The implementations described in the following exemplary embodiments do not represent all implementations consistent with the present application. Instead, they are merely examples of devices and methods consistent with some aspects of the present application as detailed in the appended claims.

随着光网络的不断发展,光纤到户(FTTH,Fiber to the Home)已经全面铺开,其局端产品(OLT,Optical Line Terminal)和终端产品(ONU,Optical Network Unit)也得到了广泛应用。在无源光网络系统中,无源光网络设备根据传输汇聚层(TC,TransmissionConvergence)的协议不同可以分为千兆无源光网络设备(GPON,Gigabit-capable PassiveOptical Network)、10G无源光网络设备(XGPON,10-Gigabit-capable Passive OpticalNetworks)、10G对称无源光网络设备(XGSPON,10-Gigabit-capable Symmetric PassiveOptical Networks)、50G高速无源光网络设备(HSPON,Higher speed passive opticalnetworks),以及目前正在研究的100G PON等。这些无源光网络系统架构一般都包含光网络终端OLT、光网络单元ONU和光分配网络(ODN,Optical Distribution Network)。With the continuous development of optical networks, fiber to the home (FTTH) has been fully rolled out, and its central office products (OLT, Optical Line Terminal) and terminal products (ONU, Optical Network Unit) have also been widely used. In the passive optical network system, passive optical network equipment can be divided into Gigabit passive optical network equipment (GPON, Gigabit-capable Passive Optical Network), 10G passive optical network equipment (XGPON, 10-Gigabit-capable Passive Optical Networks), 10G symmetric passive optical network equipment (XGSPON, 10-Gigabit-capable Symmetric Passive Optical Networks), 50G high-speed passive optical network equipment (HSPON, Higher speed passive optical networks), and the 100G PON currently under research. These passive optical network system architectures generally include optical network terminals OLT, optical network units ONU and optical distribution networks (ODN, Optical Distribution Network).

在ITU-T系列标准中,不同模式的PON接入技术的加密算法都是AES-128加密算法,但加密方向不太一样。GPON非对称和GPON对称只对下行方向进行加密,而XGPON非对称和XGPON对称对下行和上行方向都进行加密。而在FTTR(Fiber To The Room,光纤到房间)场景下和G.fin系列标准中,不同模式的PON接入技术(包括但不限于GPON非对称、GPON对称、XGPON非对称、XGPON对称等PON模式)的下行方向和上行方向均需要支持多种加密算法(包括但不限于AES-128、AES-256、Camellia-128、Camellia-256和SM4)以及算法动态切换。In the ITU-T series of standards, the encryption algorithm for different modes of PON access technology is the AES-128 encryption algorithm, but the encryption direction is slightly different. GPON asymmetric and GPON symmetric only encrypt the downstream direction, while XGPON asymmetric and XGPON symmetric encrypt both the downstream and upstream directions. In the FTTR (Fiber To The Room) scenario and the G.fin series of standards, different modes of PON access technology (including but not limited to GPON asymmetric, GPON symmetric, XGPON asymmetric, XGPON symmetric and other PON modes) need to support multiple encryption algorithms (including but not limited to AES-128, AES-256, Camellia-128, Camellia-256 and SM4) and dynamic algorithm switching in both the downstream and upstream directions.

现有的相关技术中并没有提供解决上述问题的有效方案,如何在实际应用中解决上述问题成为在FTTR场景中需要解决的问题。The existing related technologies do not provide effective solutions to the above problems. How to solve the above problems in practical applications has become a problem that needs to be solved in the FTTR scenario.

从以上对PON国际标准的介绍可以看出,现有技术方案只考虑了一种数据加密算法模式,没有在ONU连接到OLT的配置阶段提供多算法模式协商过程,缺乏对多种加密算法的兼容处理,不能满足多国家,多地区和多网络运营商对PON设备要求支持多种加密算法,以及各算法动态切换的需求。From the above introduction to the PON international standard, it can be seen that the existing technical solutions only consider one data encryption algorithm mode, do not provide a multi-algorithm mode negotiation process in the configuration stage when the ONU is connected to the OLT, lack compatible processing for multiple encryption algorithms, and cannot meet the requirements of multiple countries, regions and network operators for PON equipment to support multiple encryption algorithms and dynamic switching of algorithms.

基于此,请参照图1,图1为本申请第一实施例中无源光网络系统的业务加密方法的流程示意图。如图1所示,所述业务加密方法应用于光线路终端OLT,无源光网络系统的业务加密方法主要包括以下步骤。Based on this, please refer to Figure 1, which is a flow chart of a service encryption method for a passive optical network system in the first embodiment of the present application. As shown in Figure 1, the service encryption method is applied to an optical line terminal OLT, and the service encryption method for a passive optical network system mainly includes the following steps.

步骤S100,将加密使能信息发送至光网络单元ONU;Step S100, sending encryption enabling information to the optical network unit ONU;

其中,所述加密使能信息用于指示当前为不开启加密、仅开启上行加密、仅开启下行加密或者同时开启上下行加密。The encryption enabling information is used to indicate whether encryption is currently not enabled, only uplink encryption is enabled, only downlink encryption is enabled, or both uplink and downlink encryption are enabled.

本申请实施例无源光网络系统的业务加密方法可应用于PON系统家庭或者企业组网应用,以及FTTR场景等等,本实施例不作具体的限定。The service encryption method of the passive optical network system in the embodiment of the present application can be applied to PON system home or enterprise networking applications, as well as FTTR scenarios, etc., and this embodiment does not make specific limitations.

本领域技术人员可知的是,PLOAM(Physical Layer Operations Administrationand Maintenance, 物理层操作管理和维护)消息是指GPON协议层中传输汇聚层系统协议栈的物理层操作管理和维护。OMCI(ONU Management and Control Interface,光网络单元管理控制接口)消息是GPON标准中定义的一种OLT与ONU之间信息交互的协议,用于在GPON网络中OLT对ONU的管理,包括配置管理、故障管理、性能管理和安全管理等。It is known to those skilled in the art that the PLOAM (Physical Layer Operations Administration and Maintenance) message refers to the physical layer operation management and maintenance of the transmission convergence layer system protocol stack in the GPON protocol layer. The OMCI (ONU Management and Control Interface) message is a protocol for information exchange between OLT and ONU defined in the GPON standard, and is used for the management of ONU by OLT in the GPON network, including configuration management, fault management, performance management, and security management.

在本实施例中,可通过PLOAM消息或OMCI消息,将加密使能信息发送至光网络单元ONU。具体地,该加密使能信息中可携带有加密使能标识,所述加密使能标识用于指示当前为不开启加密、仅开启上行加密、仅开启下行加密或者同时开启上下行加密。In this embodiment, the encryption enabling information can be sent to the optical network unit ONU via a PLOAM message or an OMCI message. Specifically, the encryption enabling information can carry an encryption enabling flag, which is used to indicate whether encryption is currently not enabled, only uplink encryption is enabled, only downlink encryption is enabled, or both uplink and downlink encryption are enabled.

示例性地,所述加密使能信息中通过如下方式携带有加密使能标识,包括:Exemplarily, the encryption enabling information carries the encryption enabling flag in the following manners, including:

步骤A10,通过在所述加密使能信息中的PTI(Payload Type Indicator,静荷类型指示)字段的指定比特携带加密使能标识,其中,所述指定比特取值为第一指定值表示不开启加密,所述指定比特取值为第二指定值表示仅开启上行加密,所述指定比特取值为第三指定值表示仅开启下行加密,所述指定比特取值为第四指定值表示开启上下行加密。Step A10, carrying the encryption enable flag by the designated bit of the PTI (Payload Type Indicator) field in the encryption enable information, wherein the designated bit value is the first designated value indicating that encryption is not enabled, the designated bit value is the second designated value indicating that only uplink encryption is enabled, the designated bit value is the third designated value indicating that only downlink encryption is enabled, and the designated bit value is the fourth designated value indicating that uplink and downlink encryption are enabled.

在本实施例中,容易理解的是,该第一指定值、第二指定值、第三指定值和第四指定值均不相同。不同的指定值指示不同的加密模式。In this embodiment, it is easy to understand that the first specified value, the second specified value, the third specified value and the fourth specified value are all different. Different specified values indicate different encryption modes.

本申请实施例能实现对各种PON模式进行上下行加密使能。对于不同的应用场景,各种PON模式(包括但不限于GPON非对称、GPON对称、XGPON非对称、XGPON对称等PON模式)均支持通过标准PLOAM消息、OMCI消息或者自定义PLOAM消息、OMCI消息进行加密使能动作,包括不开启加密、仅开启上行加密、仅开启下行加密、开启上下行加密这四种上下行加密使能策略。The embodiment of the present application can realize uplink and downlink encryption enabling for various PON modes. For different application scenarios, various PON modes (including but not limited to GPON asymmetric, GPON symmetric, XGPON asymmetric, XGPON symmetric and other PON modes) support encryption enabling actions through standard PLOAM messages, OMCI messages or custom PLOAM messages, OMCI messages, including four uplink and downlink encryption enabling strategies: not enabling encryption, enabling uplink encryption only, enabling downlink encryption only, and enabling uplink and downlink encryption.

进一步地,本申请实施例可实现在同一PON口下的不同ONU的混合加密,根据业务重要性的不同,在同一PON口下的不同ONU可以使用不同的加密算法,OLT通过OMCI实体ONU2-G配置各ONU的加密算法。具体地,可以通过广播将同一PON口下的所有ONU都配置为同一种加密算法,也可以通过单播和组播配置指定某个或某组ONU配置为一种加密算法。Furthermore, the embodiment of the present application can realize hybrid encryption of different ONUs under the same PON port. Different ONUs under the same PON port can use different encryption algorithms according to the importance of different services. The OLT configures the encryption algorithm of each ONU through the OMCI entity ONU2-G. Specifically, all ONUs under the same PON port can be configured as the same encryption algorithm through broadcasting, or a certain ONU or a group of ONUs can be specified to be configured as an encryption algorithm through unicast and multicast configuration.

本发明实施例通过对GPON非对称和GPON对称PON模式增加上行加密以及帧间隔的配置规则,对各种PON模式(包括但不限于GPON非对称、GPON对称、XGPON非对称、XGPON对称等PON模式)增加上下行加密使能策略、SM4加密算法以及加密算法动态切换策略,对于OLT的同一PON口下的不同ONU提出混合加密策略,从而实现FTTR加密方法。The embodiment of the present invention adds uplink encryption and frame interval configuration rules to GPON asymmetric and GPON symmetric PON modes, adds uplink and downlink encryption enabling strategies, SM4 encryption algorithms, and encryption algorithm dynamic switching strategies to various PON modes (including but not limited to GPON asymmetric, GPON symmetric, XGPON asymmetric, XGPON symmetric and other PON modes), and proposes a hybrid encryption strategy for different ONUs under the same PON port of the OLT, thereby realizing the FTTR encryption method.

步骤S100之后,执行步骤S200,在使能开启上下行加密或者开启上行加密后,通过OMCI(ONU Management and Control Interface,ONU的管理和控制接口)实体ONU2-G,对所述OLT与所述ONU当前所协商采用的加密算法进行动态切换;After step S100, step S200 is performed, after enabling uplink and downlink encryption or enabling uplink encryption, the encryption algorithm currently negotiated and adopted by the OLT and the ONU is dynamically switched through the OMCI (ONU Management and Control Interface) entity ONU2-G;

一般情况下,PON系统由三个部分组成:OLT(Optical Line Termination,光线路终端)、ODN(Optical Distribution Network,光分布网)和ONU/ONTGenerally speaking, a PON system consists of three parts: OLT (Optical Line Termination), ODN (Optical Distribution Network) and ONU/ONT.

(Optical Network Unit,光网络单元/Optical Network Termination,光网络终端)。OLT为PON系统提供网络侧接口(SNI,Service Network Interface),连接一个或多个ODN。无源分光器件,将OLT下行的数据分路传输到各个ONU,同时将多个ONU/ONT的上行数据汇总传输到OLT。(Optical Network Unit/Optical Network Termination). OLT provides a network-side interface (SNI, Service Network Interface) for the PON system, connecting one or more ODNs. Passive optical splitters split the OLT's downstream data to each ONU, and aggregate the upstream data of multiple ONUs/ONTs to the OLT.

本领域技术人员可知的是,从OLT到ONU称为下行,反之为上行。Those skilled in the art will know that the transmission from OLT to ONU is called downlink, and the reverse is called uplink.

在本实施例中,由于ONU和OLT已经完成了密钥同步,因此,在上行加密过程中,ONU和OLT当前使用的密钥一致,OLT和ONU能够使用相同的密钥进行加密/解密,不会出现上行帧丢包。In this embodiment, since the ONU and the OLT have completed key synchronization, during the uplink encryption process, the keys currently used by the ONU and the OLT are consistent, and the OLT and the ONU can use the same key for encryption/decryption, and no uplink frame loss will occur.

其中,本实施例中加密算法进行动态切换的密钥协商过程的发起方不一定是OLT,也可能是ONU,也可能是双方共同发起,本实施例对此不作具体的限定。The initiator of the key negotiation process for dynamic switching of the encryption algorithm in this embodiment is not necessarily the OLT, but may be the ONU, or may be jointly initiated by both parties, which is not specifically limited in this embodiment.

在一示例中,可通过由OLT和ONU根据随机数和系统参数生成加密密钥进行密钥协商的,整个协商过程中传输的是由随机数和系统参数生成的传递数,从而使得即使窃听者获取了传递数,甚至其获取了系统参数,也因为不知道随机数而无法获得加密密钥,与相关技术中通过网络直接传输明文密钥相比,可大大提高密钥协商过程的安全性。另外,本实施例发送的该传递数或响应消息是采用分片后多次发送的方式进行的,将数据分片发送可以有效提高数据传输的安全性,而采用多次发送方式可以提高数据传输的可靠性。若OLT或ONU接收传递数时有任一分片每次都接收失败,则重新发送请求更新加密密钥消息;若已连续发送请求更新加密密钥消息次数大于预定请求更新加密密钥消息次数,则宣告密钥协商失败。In one example, the key negotiation can be performed by the OLT and the ONU generating an encryption key based on a random number and system parameters. The transmission number generated by the random number and the system parameters is transmitted during the entire negotiation process, so that even if the eavesdropper obtains the transmission number or even the system parameters, the encryption key cannot be obtained because the random number is not known. Compared with the direct transmission of the plaintext key through the network in the related art, the security of the key negotiation process can be greatly improved. In addition, the transmission number or response message sent by this embodiment is sent multiple times after being fragmented. Sending data in fragments can effectively improve the security of data transmission, and the multiple transmission method can improve the reliability of data transmission. If any fragment fails to be received each time when the OLT or ONU receives the transmission number, the request to update the encryption key message is resent; if the number of consecutive requests to update the encryption key message is greater than the predetermined number of requests to update the encryption key message, the key negotiation is declared to have failed.

需要说明的是,OLT与ONU当前所协商采用的加密算法包括但不限于:AES-128、AES-256、Camellia-128、Camellia-256和SM4等加密算法。It should be noted that the encryption algorithms currently negotiated and adopted by the OLT and the ONU include but are not limited to: AES-128, AES-256, Camellia-128, Camellia-256 and SM4 encryption algorithms.

其中,本领域技术人员可知的是,OMCI实体ONU2-G为现有技术中进行加密算法动态切换的虚拟装置或者实体单元,在此不再赘述。需要说明的是,目前OMCI实体ONU2-G暂未用于上行传输数据的加密算法动态切换。Among them, it is known to those skilled in the art that the OMCI entity ONU2-G is a virtual device or physical unit for dynamically switching the encryption algorithm in the prior art, which will not be repeated here. It should be noted that the OMCI entity ONU2-G is not currently used for dynamically switching the encryption algorithm for uplink transmission data.

在本实施例中,在根据OMCI实体ONU2-G进行加密算法动态切换的过程中,各种PON模式(包括但不限于GPON非对称、GPON对称、XGPON非对称、XGPON对称等PON模式)都支持多种加密算法(包括但不限于AES-128、AES-256、Camellia-128、Camellia-256和SM4)。具体地,ONU通过OMCI实体ONU2-G中的Security capability属性向OLT上报ONU支持的加密算法,在实例化ONU时会将实体ONU2-G中的Security mode属性设置为某一特定值,如设置为1,即使用AES-128加密算法。In this embodiment, in the process of dynamically switching the encryption algorithm according to the OMCI entity ONU2-G, various PON modes (including but not limited to GPON asymmetric, GPON symmetric, XGPON asymmetric, XGPON symmetric and other PON modes) support multiple encryption algorithms (including but not limited to AES-128, AES-256, Camellia-128, Camellia-256 and SM4). Specifically, the ONU reports the encryption algorithm supported by the ONU to the OLT through the Security capability attribute in the OMCI entity ONU2-G, and the Security mode attribute in the entity ONU2-G is set to a specific value when the ONU is instantiated, such as setting it to 1, that is, using the AES-128 encryption algorithm.

示例性地,OLT通过OMCI实体ONU2-G中的Security mode属性设置ONU的加密算法,如OMCI实体ONU2-G中Security mode值为1,则将加密算法切换为AES-128加密算法,如OMCI实体Security mode值为5,则切换为SM4加密算法。在ONU作出响应之后实现加密算法的切换。Exemplarily, OLT sets the encryption algorithm of ONU through the Security mode attribute in OMCI entity ONU2-G. If the Security mode value in OMCI entity ONU2-G is 1, the encryption algorithm is switched to AES-128 encryption algorithm. If the Security mode value in OMCI entity ONU2-G is 5, the encryption algorithm is switched to SM4 encryption algorithm. The switching of encryption algorithm is realized after ONU responds.

步骤S200之后,执行步骤S300,根据所述动态切换后的加密算法,与所述ONU之间进行密钥同步;After step S200, step S300 is executed to synchronize keys with the ONU according to the encryption algorithm after the dynamic switching;

步骤S400,在密钥同步后,根据超帧计数器的目标值或Key Index,确定从指定帧开始使用新密钥或新的加密算法,并将所述超帧计数器的目标值或Key Index发送至所述ONU。Step S400, after key synchronization, determine to use a new key or a new encryption algorithm starting from a specified frame according to a target value of a superframe counter or a Key Index, and send the target value of the superframe counter or the Key Index to the ONU.

示例性地,根据超帧计数器的目标值或Key Index,确定从指定帧开始使用新密钥或新的加密算法,包括:Exemplarily, determining to use a new key or a new encryption algorithm starting from a specified frame according to a target value of a superframe counter or a Key Index includes:

在无源光网络系统为GPON非对称系统或者GPON对称系统的情况下,根据超帧计数器的目标值,从指定帧开始使用新密钥或新的加密算法;In the case where the passive optical network system is a GPON asymmetric system or a GPON symmetric system, a new key or a new encryption algorithm is used starting from a specified frame according to a target value of a superframe counter;

在无源光网络系统为XGPON或者XGSPON系统的情况下,根据Key Index的变化,从指定帧开始使用新密钥或新的加密算法。In the case where the passive optical network system is an XGPON or XGSPON system, a new key or a new encryption algorithm is used starting from a specified frame according to a change in the Key Index.

在本实施例中,可通过PLOAM消息或OMCI消息,将超帧计数器的目标值或KeyIndex发送至ONU。In this embodiment, the target value or KeyIndex of the superframe counter may be sent to the ONU via a PLOAM message or an OMCI message.

示例性地,所述OLT和所有所述ONU均使用经过同步的所述超帧计数器,所述超帧计数器包括帧内计数器和帧间计数器,所述超帧计数器的宽度为46比特,其中,低16比特为所述帧内计数器,高30比特为所述帧间计数器,对于所述上行加密,所述帧内计数器在上行帧开始置为0,每4字节递增,所述帧间计数器包含在下行GTC(GPON TransmissionConvergence)帧的GTC Header字段中,所述GTC Header字段指定传输上行GEM帧的上行GTC突发。Exemplarily, the OLT and all the ONUs use the synchronized superframe counter, the superframe counter includes an intra-frame counter and an inter-frame counter, the width of the superframe counter is 46 bits, of which the lower 16 bits are the intra-frame counter and the upper 30 bits are the inter-frame counter. For the uplink encryption, the intra-frame counter is set to 0 at the beginning of the uplink frame and increments every 4 bytes. The inter-frame counter is included in the GTC Header field of the downstream GTC (GPON Transmission Convergence) frame, and the GTC Header field specifies the uplink GTC burst for transmitting the uplink GEM frame.

进一步地,在所述无源光网络系统为GPON非对称系统或者GPON对称系统的情况下,在上行方向,GTC成帧子层的突发被划分为4字节的多个数据块,各所述数据块从S到(S+X)顺序编号;Further, in the case where the passive optical network system is a GPON asymmetric system or a GPON symmetric system, in the upstream direction, the burst of the GTC framing sublayer is divided into a plurality of data blocks of 4 bytes, and each of the data blocks is sequentially numbered from S to (S+X);

其中,S=|_目标StartTime/m_|,目标StartTime为DLL(Dynamic Link Library,动态链接库)成帧子层突发第一个分配(即allocation)的StartTime,StartTime用于指示带宽分配时隙的开始时间,X为所述数据块的数量减去一(即X为GTC上行突发中数据块的数量减去一),Wherein, S=|_targetStartTime/m_|, targetStartTime is the StartTime of the first allocation (i.e., allocation) of the DLL (Dynamic Link Library) framing sublayer burst, StartTime is used to indicate the start time of the bandwidth allocation time slot, and X is the number of data blocks minus one (i.e., X is the number of data blocks in the GTC uplink burst minus one),

m为针对上行数据传输速率而预设的数值,其中,对于1.25G上行,m=4,对于2.5G上行,m=2;m is a preset value for the uplink data transmission rate, where for 1.25G uplink, m=4, and for 2.5G uplink, m=2;

所述超帧计数器包括帧内计数器和帧间计数器,其中,所述帧内计数器的值包括所有FEC(forward error correction,前向纠错)校验字节。The superframe counter includes an intra-frame counter and an inter-frame counter, wherein the value of the intra-frame counter includes all FEC (forward error correction) check bytes.

在本实施例中,需要说明的是,在CTR(counter mode,计数器模式)模式中,OLT和所有ONU都使用经过同步的超帧计数器(SFC,Superframe Counter)。超帧计数器的宽度为46比特,其中,低16比特为帧内计数器,高30比特是帧间计数器。帧内计数器在上下行帧开始时置为0,每4字节递增。上下行加密中帧内计数器的值可以包含所有FEC(forward errorcorrection,前向纠错)校验字节,当然,上下行加密中帧内计数器的值也可以不包含所有FEC校验字节,本实施例对此不作具体的限定。In this embodiment, it should be noted that in the CTR (counter mode), the OLT and all ONUs use a synchronized superframe counter (SFC). The width of the superframe counter is 46 bits, of which the lower 16 bits are the intra-frame counter and the upper 30 bits are the inter-frame counter. The intra-frame counter is set to 0 at the beginning of the uplink and downlink frames and increments every 4 bytes. The value of the intra-frame counter in the uplink and downlink encryption may include all FEC (forward error correction) check bytes. Of course, the value of the intra-frame counter in the uplink and downlink encryption may not include all FEC check bytes, and this embodiment does not make specific limitations on this.

具体地,帧内计数器在下行帧开始位置为0(GTC Header的第一个字节),每4字节递增。在下行速率2.488Gbit/s系统内,帧内计数器范围为0至9719。Specifically, the intra-frame counter starts at 0 (the first byte of the GTC Header) at the beginning of the downstream frame and increases every 4 bytes. In a system with a downstream rate of 2.488 Gbit/s, the intra-frame counter ranges from 0 to 9719.

在上行方向,GTC成帧子层的突发被划分为4字节的块,这些块从S到(S+X)顺序编号。此处S=|_StartTime/m_|,其中,对于1.25G上行,m=4;对于2.5G上行,m=2。|_xxx_|表示xxx向下取整,StartTime为DLL成帧子层突发第一个allocation的StartTime,X是GTC上行突发中完整和不完整的4字节块的数量减去1。需要注意的是,加密处理步骤在FEC之前。然而,帧内计数器的值来自发送的帧,因此在一般情况下,下行和上行帧内计数器的值中要包括所有FEC校验字节,最后再进行扰码处理。In the upstream direction, the GTC framing sublayer bursts are divided into 4-byte blocks, which are numbered sequentially from S to (S+X). Here S=|_StartTime/m_|, where m=4 for 1.25G upstream and m=2 for 2.5G upstream. |_xxx_| means xxx is rounded down, StartTime is the StartTime of the first allocation of the DLL framing sublayer burst, and X is the number of complete and incomplete 4-byte blocks in the GTC upstream burst minus 1. It should be noted that the encryption process precedes FEC. However, the values of the intra-frame counters come from the transmitted frames, so in general, the values of the downstream and upstream intra-frame counters should include all FEC check bytes, and the scrambling process is finally performed.

在上行方向上,帧间计数器包含在下行GTC帧的PCBd(Physical Control Blockdownstream,下行物理层控制块)字段中,该字段指定传输上行GTC帧的上行突发。ONU实现一个经过同步的本地计数器,因此可以修复这个域的错误。随机密码块与GEM净荷的起始位置对齐。In the upstream direction, the inter-frame counter is contained in the PCBd (Physical Control Blockdownstream) field of the downstream GTC frame, which specifies the upstream burst for transmitting the upstream GTC frame. The ONU implements a synchronized local counter so that errors in this field can be corrected. The random cipher block is aligned with the start of the GEM payload.

在本实施例中,只对GEM帧/分片的净荷进行加密,GEM帧头不进行加密。由于GEM分片不一定是一个完整的编码块,所以尾数据块(长度为1到16字节)与尾密码块(长度为16字节)的MSB进行异或运算。尾密码块的其余部分将会被丢弃。In this embodiment, only the payload of the GEM frame/slice is encrypted, and the GEM frame header is not encrypted. Since the GEM slice is not necessarily a complete coded block, the tail data block (length is 1 to 16 bytes) and the MSB of the tail cipher block (length is 16 bytes) are XORed. The rest of the tail cipher block will be discarded.

在一实施例中,所述指定帧为所述超帧计数器的值达到该目标值时对应的信息帧,根据所述超帧计数器的目标值,确定从指定帧开始使用新的解密密钥进行解密的步骤,具体可包括:根据所述超帧计数器的目标值,在所述ONU侧配置的超帧计数器的值达到该目标值时,开始使用新的解密密钥,其中,所述ONU侧配置的超帧计数器与所述ONT侧配置的超帧计数器同步。In one embodiment, the designated frame is an information frame corresponding to when the value of the superframe counter reaches the target value. According to the target value of the superframe counter, the step of using a new decryption key for decryption starting from the designated frame is determined, which may specifically include: according to the target value of the superframe counter, when the value of the superframe counter configured on the ONU side reaches the target value, starting to use the new decryption key, wherein the superframe counter configured on the ONU side is synchronized with the superframe counter configured on the ONT side.

本实施例通过在密钥同步后,可根据超帧计数器的目标值或Key Index,确定从指定帧开始使用新密钥或新的加密算法,并通过PLOAM消息或OMCI消息,将超帧计数器的目标值或Key Index发送至ONU,以通知ONU从指定帧开始使用新密钥或新的加密算法,可以避免OLT和ONU两边交互消息导致新密钥或新加密算法启用时间不一致的问题,实现Port-ID加解密使能的无缝切换,保证上行数据流不丢包。After key synchronization, this embodiment can determine to use a new key or a new encryption algorithm from a specified frame according to a target value or Key Index of a superframe counter, and send the target value or Key Index of the superframe counter to the ONU through a PLOAM message or an OMCI message to notify the ONU to use the new key or the new encryption algorithm from the specified frame. This can avoid the problem of inconsistent activation time of the new key or the new encryption algorithm caused by the interaction of messages between the OLT and the ONU, realize seamless switching of Port-ID encryption and decryption, and ensure that there is no packet loss in the upstream data stream.

值得一提的是,本申请实施例提供一种FTTR(Fiber to the Rome,光纤到房间)加密的实现方法。对于FTTR场景下的GPON非对称和GPON对称,能够实现增加上行加密以及帧间隔(IPG,Inter-packet Gap)的配置规则。而对于FTTR场景下的各种PON模式(包括但不限于GPON非对称、GPON对称、XGPON非对称、XGPON对称等PON模式)增加上下行加密使能策略、SM4加密算法以及加密算法动态切换策略;对于OLT的同一PON口下的不同ONU提出混合加密策略。It is worth mentioning that the embodiment of the present application provides a method for implementing FTTR (Fiber to the Rome) encryption. For GPON asymmetry and GPON symmetry in the FTTR scenario, it is possible to add upstream encryption and inter-packet gap (IPG) configuration rules. For various PON modes in the FTTR scenario (including but not limited to GPON asymmetric, GPON symmetric, XGPON asymmetric, XGPON symmetric and other PON modes), upstream and downstream encryption enabling strategies, SM4 encryption algorithms and encryption algorithm dynamic switching strategies are added; a hybrid encryption strategy is proposed for different ONUs under the same PON port of the OLT.

需要说明的是,本申请的全部实施例可以工作在FTTR场景和G.fin系列标准中,也可以工作在其他场景,本申请对此不作限制。It should be noted that all embodiments of the present application can work in FTTR scenarios and G.fin series standards, and can also work in other scenarios, and the present application does not limit this.

本申请提出一种无源光网络系统的业务加密方法、电子设备及存储介质,在无源光网络系统的业务加密方法中,本申请实施例的技术方案是将加密使能信息发送至光网络单元ONU,其中,该加密使能信息用于指示当前为不开启加密、仅开启上行加密、仅开启下行加密或者开启上下行加密,然后在使能开启上下行加密或者开启上行加密后,通过OMCI设备的OMCI实体ONU2-G,对OLT与ONU当前所协商采用的加密算法进行动态切换,根据该动态切换后的加密算法,与ONU之间进行密钥同步,再在密钥同步后,根据超帧计数器的目标值或Key Index,确定从指定帧开始使用新密钥或新的加密算法,并将超帧计数器的目标值或Key Index发送至所述ONU,以通知ONU从指定帧开始使用新密钥或新的加密算法,实现对上行业务报文进行加解密,从而使得在FTTR(Fiber To The Room,光纤到房间)场景下的GPON非对称和GPON对称,增加上行加密,进而使得FTTR场景下的各种PON模式(包括但不限于GPON非对称、GPON对称、XGPON非对称、XGPON对称等PON模式)能够支持上下行加密使能策略、SM4加密算法以及加密算法动态切换策略,有效实现PON系统支持多种加密算法,以及各算法动态切换的需求。The present application proposes a service encryption method, electronic device and storage medium of a passive optical network system. In the service encryption method of the passive optical network system, the technical solution of the embodiment of the present application is to send encryption enabling information to an optical network unit ONU, wherein the encryption enabling information is used to indicate that encryption is not enabled, only uplink encryption is enabled, only downlink encryption is enabled or uplink and downlink encryption is enabled. Then, after enabling uplink and downlink encryption or enabling uplink encryption, the encryption algorithm currently negotiated and adopted by the OLT and the ONU is dynamically switched through the OMCI entity ONU2-G of the OMCI device. According to the encryption algorithm after the dynamic switching, key synchronization is performed with the ONU. After key synchronization, according to the target value or Key Index of the superframe counter, it is determined to use a new key or a new encryption algorithm from a specified frame, and the target value or Key Index of the superframe counter is sent to the ONU to notify the ONU to use the new key or the new encryption algorithm from a specified frame to implement encryption and decryption of the uplink service message, so that in FTTR (Fiber To The The GPON asymmetric and GPON symmetric in the FTTR (Fiber to the Room) scenario increase uplink encryption, so that various PON modes in the FTTR scenario (including but not limited to GPON asymmetric, GPON symmetric, XGPON asymmetric, XGPON symmetric and other PON modes) can support uplink and downlink encryption enabling strategies, SM4 encryption algorithms and encryption algorithm dynamic switching strategies, effectively realizing the PON system to support multiple encryption algorithms and the dynamic switching of algorithms.

为了助于理解本申请实施例,列举一具体实施例中OLT与ONU之间的密钥交互和更新的技术原理,包括:To help understand the embodiments of the present application, the technical principles of key interaction and update between the OLT and the ONU in a specific embodiment are listed, including:

在本实施例中,根据OMCI实体ONU2-G对加密算法进行切换后,OLT与ONU之间通过一系列的PLOAM消息进行密钥交互和更新。In this embodiment, after the encryption algorithm is switched according to the OMCI entity ONU2-G, the OLT and the ONU perform key interaction and update through a series of PLOAM messages.

对于GPON非对称、GPON对称这两种PON模式,OLT通过发送下行PLOAM消息Request_Key向ONU请求新的密钥,ONU做出响应:产生、存储密钥并通过上行PLOAM消息Encryption_Key将密钥发送给OLT。由于PLOAM消息的长度限制,密钥被切分成两部分发送,使用Frag_Index字段指示正在发送的密钥的哪个部分。密钥的两个部分都发送三次。使用Key_Index字段来指示正在发送的密钥属于哪个ONU。如果该OLT三次都未成功接收到密钥的任何一部分,则OLT将通过发出新的Request_Key消息请求ONU生成另一个密钥。如果密钥传输失败三次,则OLT应声明密钥同步丢失并停用ONU。如果OLT成功接收到密钥,它就会将验证的密钥存储在Shadow_Key_Register中。For the two PON modes, GPON asymmetric and GPON symmetric, the OLT requests a new key from the ONU by sending a downstream PLOAM message Request_Key, and the ONU responds by generating, storing, and sending the key to the OLT via the upstream PLOAM message Encryption_Key. Due to the length limit of the PLOAM message, the key is split into two parts and sent, and the Frag_Index field is used to indicate which part of the key is being sent. Both parts of the key are sent three times. The Key_Index field is used to indicate which ONU the key being sent belongs to. If the OLT fails to successfully receive any part of the key three times, the OLT will request the ONU to generate another key by sending a new Request_Key message. If the key transmission fails three times, the OLT shall declare that the key synchronization is lost and deactivate the ONU. If the OLT successfully receives the key, it will store the verified key in the Shadow_Key_Register.

OLT成功接收到密钥之后会进行密钥的更新,OLT通过PLOAM消息Key_Switching_Time将超帧计数器(SFC,Super-frame Counter)的值发送给ONU,该消息会发送三次,ONU仅需要接收到其中一个就能够获取密钥更新的时间,即从哪一帧开始更新密钥或新加密算法。在指定帧的开始,OLT复制Shadow_Key_Register的内容到Active_Key_Register,ONU将赋值它的Shadow_Key_Register到Active_Key_Register。从指定帧之后OLT和ONU都开始使用新密钥或新的加密算法,完成密钥的更新。After the OLT successfully receives the key, it will update the key. The OLT sends the value of the super-frame counter (SFC) to the ONU through the PLOAM message Key_Switching_Time. The message will be sent three times. The ONU only needs to receive one of them to obtain the time of the key update, that is, from which frame to update the key or the new encryption algorithm. At the beginning of the specified frame, the OLT copies the content of the Shadow_Key_Register to the Active_Key_Register, and the ONU assigns its Shadow_Key_Register to the Active_Key_Register. After the specified frame, both the OLT and the ONU start using the new key or the new encryption algorithm to complete the key update.

对于GPON非对称、GPON对称这两种PON模式,加密算法切换后以密钥更新ONU收到OLT发送的SFC值(即上述的超帧计数器的目标值)为基准生效。For the two PON modes of GPON asymmetric and GPON symmetric, after the encryption algorithm is switched, the SFC value (ie, the target value of the superframe counter mentioned above) sent by the OLT received by the key update ONU is used as the benchmark for taking effect.

需要说明的是,该具体实施例一阐述的诸多细节仅助于理解本申请的技术原理或技术构思,并不构成对本申请的限定,基于本申请的该技术构思进行更多形式的简单变换,均应在本申请的保护范围内。It should be noted that the many details described in this specific embodiment are only helpful for understanding the technical principles or technical concepts of the present application, and do not constitute a limitation of the present application. More simple transformations based on the technical concepts of the present application should all be within the scope of protection of the present application.

在一种可能的实施方式中,所述步骤S300,根据所述动态切换后的加密算法,与所述ONU之间进行密钥同步的步骤包括:In a possible implementation manner, the step S300, the step of performing key synchronization with the ONU according to the encryption algorithm after the dynamic switching, includes:

步骤S310,根据所述动态切换后的加密算法,指示所述ONU生成新密钥;Step S310, instructing the ONU to generate a new key according to the encryption algorithm after the dynamic switching;

在本实施例中,OLT可通过发送密钥请求消息Request_Key消息指示所述ONU生成新密钥。In this embodiment, the OLT may instruct the ONU to generate a new key by sending a key request message Request_Key message.

具体地,根据动态切换后的加密算法对应的算法类型,指示ONU生成新密钥。例如,动态切换后的加密算法对应的算法类型为SM4,指示ONU生成的新密钥即为基于该SM4算法而生成的新密钥。Specifically, according to the algorithm type corresponding to the encryption algorithm after dynamic switching, the ONU is instructed to generate a new key. For example, if the algorithm type corresponding to the encryption algorithm after dynamic switching is SM4, the new key generated by the ONU is a new key generated based on the SM4 algorithm.

步骤S320,收到所述ONU上报的新密钥后,指定新密钥开始生效的密钥切换时间,并向所述ONU通知所述密钥切换时间;Step S320, after receiving the new key reported by the ONU, specify a key switching time at which the new key becomes effective, and notify the ONU of the key switching time;

在本实施例中,OLT可通过发送密钥切换时间消息Key_Switching_Time消息,向ONU通知该密钥切换时间。In this embodiment, the OLT may notify the ONU of the key switching time by sending a key switching time message Key_Switching_Time message.

步骤S330,收到所述ONU反馈的收到密钥切换时间的响应后,在所述密钥切换时间将所述新密钥设置到当前使用密钥的寄存器中。Step S330: after receiving the response of receiving the key switching time fed back by the ONU, the new key is set to the register of the currently used key at the key switching time.

其中,ONU接收到OLT发送的密钥切换时间后,会向ONU反馈收到密钥切换时间的响应。After receiving the key switching time sent by the OLT, the ONU will feed back a response of receiving the key switching time to the ONU.

在本实施例中,具体地,OLT和ONU可采用ITU-T G.984.3标准中的消息进行交互,其中,OLT通过发送密钥请求消息Request_Key消息指示ONU生成新密钥,通过发送密钥切换时间消息Key_Switching_Time消息通知ONU该密钥切换时间。在密钥同步后,可通过发送GEM-PORT加密消息Encrypted_Port_ID消息通知ONU打开GEM-PORT的解密功能。ONU通过发送密钥请求响应消息Encryption_Key消息向OLT上报新密钥,通过发送告知确认Acknowledge消息通知OLT已经收到了所述密钥切换时间。In this embodiment, specifically, the OLT and the ONU may interact using messages in the ITU-T G.984.3 standard, wherein the OLT instructs the ONU to generate a new key by sending a key request message Request_Key message, and notifies the ONU of the key switching time by sending a key switching time message Key_Switching_Time message. After the key is synchronized, the ONU may be notified to turn on the decryption function of the GEM-PORT by sending a GEM-PORT encryption message Encrypted_Port_ID message. The ONU reports the new key to the OLT by sending a key request response message Encryption_Key message, and notifies the OLT that the key switching time has been received by sending an Acknowledge message.

本实施例通过根据动态切换后的加密算法,指示ONU生成新密钥,在收到ONU上报的新密钥后,指定新密钥开始生效的密钥切换时间,并向ONU通知密钥切换时间,然后在收到ONU反馈的收到密钥切换时间的响应后,在所述密钥切换时间将所述新密钥设置到当前使用密钥的寄存器中,从而确保ONU与OLT侧的密钥切换时间是一致的,若不一致将会导致OLT接收不到ONU发送来的数据。This embodiment instructs the ONU to generate a new key according to the encryption algorithm after dynamic switching, specifies the key switching time when the new key becomes effective after receiving the new key reported by the ONU, and notifies the ONU of the key switching time. Then, after receiving the response of receiving the key switching time fed back by the ONU, the new key is set to the register of the currently used key at the key switching time, thereby ensuring that the key switching time on the ONU and OLT sides are consistent. If they are inconsistent, the OLT will not receive the data sent by the ONU.

在一种可能的实施方式中,在无源光网络系统为GPON非对称系统或者GPON对称系统的情况下,通过PLOAM消息,将所述超帧计数器的目标值发送至所述ONU,其中,所述将所述超帧计数器的目标值发送至所述ONU的步骤,包括:In a possible implementation manner, when the passive optical network system is a GPON asymmetric system or a GPON symmetric system, the target value of the superframe counter is sent to the ONU through a PLOAM message, wherein the step of sending the target value of the superframe counter to the ONU includes:

步骤B10,向所述ONU发送Encrypted_Port_ID消息,其中,所述Encrypted_Port_ID消息携带所述超帧计数器的目标值。Step B10: Send an Encrypted_Port_ID message to the ONU, wherein the Encrypted_Port_ID message carries the target value of the superframe counter.

在本实施例中,在密钥同步后,OLT可通过打开GPON封装方法通道(GEM-PORT)的加密功能,并通过发送GEM-PORT加密消息 Encrypted_Port_ID 消息通知ONU打开GEM-PORT的解密功能。In this embodiment, after the key synchronization, the OLT may enable the encryption function of the GPON encapsulation method channel (GEM-PORT), and notify the ONU to enable the decryption function of the GEM-PORT by sending a GEM-PORT encryption message Encrypted_Port_ID message.

本实施例通过向ONU发送Encrypted_Port_ID消息,其中,该Encrypted_Port_ID消息携带超帧计数器的目标值,从而使得本申请实施例通过Encrypted_Port_ID消息携带超帧计数器值的方式,可以避免OLT和ONU两边交互消息导致采用新密钥或新的加密算法对信息帧不同步的问题,实现Port-ID加解密使能的无缝切换,保证上行数据流不丢包,充分保证了OLT与ONU之间数据交互的可靠性。This embodiment sends an Encrypted_Port_ID message to the ONU, wherein the Encrypted_Port_ID message carries the target value of the superframe counter. Thus, the embodiment of the present application can avoid the problem of information frame asynchronization caused by the use of new keys or new encryption algorithms due to message interaction between the OLT and the ONU, realize seamless switching of Port-ID encryption and decryption, ensure that the upstream data flow is not lost, and fully ensure the reliability of data interaction between the OLT and the ONU.

此外,为了实现上述目的,请参照图2,图2为本申请第二实施例中无源光网络系统的业务加密方法的流程示意图。如图2所示,本申请实施例还提出一种无源光网络系统的业务加密方法,所述业务加密方法应用于光网络单元ONU,包括:In addition, in order to achieve the above-mentioned purpose, please refer to FIG. 2, which is a flow chart of a service encryption method for a passive optical network system in a second embodiment of the present application. As shown in FIG. 2, the present application embodiment also proposes a service encryption method for a passive optical network system, and the service encryption method is applied to an optical network unit ONU, including:

步骤S500,接收光线路终端OLT发送的加密使能信息;Step S500, receiving encryption enabling information sent by the optical line terminal OLT;

在本实施例中,可接收光线路终端OLT发送的加密使能信息。In this embodiment, encryption enabling information sent by an optical line terminal OLT may be received.

其中,所述加密使能信息用于指示当前为不开启加密、仅开启上行加密、仅开启下行加密或者开启上下行加密。The encryption enabling information is used to indicate whether encryption is currently not enabled, only uplink encryption is enabled, only downlink encryption is enabled, or both uplink and downlink encryption are enabled.

本申请实施例无源光网络系统的业务加密方法可应用于PON系统家庭或者企业组网应用,以及FTTR场景等等,本实施例不作具体的限定。The service encryption method of the passive optical network system in the embodiment of the present application can be applied to PON system home or enterprise networking applications, as well as FTTR scenarios, etc., and this embodiment does not make specific limitations.

本领域技术人员可知的是,PLOAM(Physical Layer Operations Administrationand Maintenance, 物理层操作管理和维护)消息是指GPON协议层中传输汇聚层系统协议栈的物理层操作管理和维护。OMCI(ONU Management and Control Interface,光网络单元管理控制接口)消息是GPON标准中定义的一种OLT与ONT之间信息交互的协议,用于在GPON网络中OLT对ONT的管理,包括配置管理、故障管理、性能管理和安全管理等。It is known to those skilled in the art that the PLOAM (Physical Layer Operations Administration and Maintenance) message refers to the physical layer operation management and maintenance of the transmission convergence layer system protocol stack in the GPON protocol layer. The OMCI (ONU Management and Control Interface) message is a protocol for information exchange between OLT and ONT defined in the GPON standard, and is used for the management of ONT by OLT in the GPON network, including configuration management, fault management, performance management, and security management.

具体地,该加密使能信息中可携带有加密使能标识,所述加密使能标识用于指示当前为不开启加密、仅开启上行加密、仅开启下行加密或者开启上下行加密。Specifically, the encryption enable information may carry an encryption enable flag, and the encryption enable flag is used to indicate whether encryption is currently not enabled, only uplink encryption is enabled, only downlink encryption is enabled, or both uplink and downlink encryption are enabled.

示例性地,所述加密使能信息中通过如下方式携带有加密使能标识,包括:Exemplarily, the encryption enabling information carries the encryption enabling flag in the following manners, including:

步骤C10,通过在所述加密使能信息中的PTI (Payload Type Indicator,静荷类型指示)字段的指定比特携带加密使能标识,其中,所述指定比特取值为第一指定值表示不开启加密,所述指定比特取值为第二指定值表示仅开启上行加密,所述指定比特取值为第三指定值表示仅开启下行加密,所述指定比特取值为第四指定值表示开启上下行加密。Step C10, carrying the encryption enable flag by the designated bit of the PTI (Payload Type Indicator) field in the encryption enable information, wherein the designated bit value is the first designated value indicating that encryption is not enabled, the designated bit value is the second designated value indicating that only uplink encryption is enabled, the designated bit value is the third designated value indicating that only downlink encryption is enabled, and the designated bit value is the fourth designated value indicating that uplink and downlink encryption are enabled.

在本实施例中,容易理解的是,该第一指定值、第二指定值、第三指定值和第四指定值均不相同。不同的指定值指示不同的加密模式。In this embodiment, it is easy to understand that the first specified value, the second specified value, the third specified value and the fourth specified value are all different. Different specified values indicate different encryption modes.

本申请实施例能实现对各种PON模式进行上下行加密使能。对于不同的应用场景,各种PON模式(包括但不限于GPON非对称、GPON对称、XGPON非对称、XGPON对称等PON模式),均支持通过标准PLOAM消息、OMCI消息或者自定义PLOAM消息、OMCI消息进行加密使能动作,包括不开启加密、仅开启上行加密、仅开启下行加密、开启上下行加密这四种上下行加密使能策略。The embodiment of the present application can realize uplink and downlink encryption enabling for various PON modes. For different application scenarios, various PON modes (including but not limited to GPON asymmetric, GPON symmetric, XGPON asymmetric, XGPON symmetric and other PON modes) all support encryption enabling actions through standard PLOAM messages, OMCI messages or custom PLOAM messages, OMCI messages, including four uplink and downlink encryption enabling strategies: not enabling encryption, enabling uplink encryption only, enabling downlink encryption only, and enabling uplink and downlink encryption.

进一步地,本申请实施例可实现在同一PON口下的不同ONU的混合加密,根据业务重要性的不同,在同一PON口下的不同ONU可以使用不同的加密算法,OLT通过OMCI实体ONU2-G配置各ONU的加密算法。具体地,可以通过广播将同一PON口下的所有ONU都配置为同一种加密算法,也可以通过单播和组播配置指定某个或某组ONU配置为一种加密算法。Furthermore, the embodiment of the present application can realize hybrid encryption of different ONUs under the same PON port. Different ONUs under the same PON port can use different encryption algorithms according to the importance of different services. The OLT configures the encryption algorithm of each ONU through the OMCI entity ONU2-G. Specifically, all ONUs under the same PON port can be configured as the same encryption algorithm through broadcasting, or a certain ONU or a group of ONUs can be specified to be configured as an encryption algorithm through unicast and multicast configuration.

本发明实施例通过对GPON非对称和GPON对称PON模式增加上行加密以及帧间隔的配置规则,对各种PON模式(包括但不限于GPON非对称、GPON对称、XGPON非对称、XGPON对称等PON模式)增加上下行加密使能策略、SM4加密算法以及加密算法动态切换策略,对于OLT的同一PON口下的不同ONU提出混合加密策略,从而实现FTTR加密方法。The embodiment of the present invention adds uplink encryption and frame interval configuration rules to GPON asymmetric and GPON symmetric PON modes, adds uplink and downlink encryption enabling strategies, SM4 encryption algorithms, and encryption algorithm dynamic switching strategies to various PON modes (including but not limited to GPON asymmetric, GPON symmetric, XGPON asymmetric, XGPON symmetric and other PON modes), and proposes a hybrid encryption strategy for different ONUs under the same PON port of the OLT, thereby realizing the FTTR encryption method.

步骤S500之后,执行步骤S600,在使能开启上下行加密或者开启上行加密后,通过OMCI实体ONU2-G,对所述OLT与所述ONU当前所协商采用的加密算法进行动态切换;After step S500, step S600 is performed, after enabling uplink and downlink encryption or enabling uplink encryption, the encryption algorithm currently negotiated and adopted by the OLT and the ONU is dynamically switched through the OMCI entity ONU2-G;

一般情况下,PON系统由三个部分组成:OLT(Optical Line Termination,光线路终端)、ODN(Optical Distribution Network,光分布网)和ONU/ONTGenerally speaking, a PON system consists of three parts: OLT (Optical Line Termination), ODN (Optical Distribution Network) and ONU/ONT.

(Optical Network Unit,光网络单元/Optical Network Termination,光网络终端)。OLT为PON系统提供网络侧接口(SNI,Service Network Interface),连接一个或多个ODN。无源分光器件,将OLT下行的数据分路传输到各个ONU,同时将多个ONU/ONT的上行数据汇总传输到OLT。(Optical Network Unit/Optical Network Termination). OLT provides a network-side interface (SNI, Service Network Interface) for the PON system, connecting one or more ODNs. Passive optical splitters split the OLT's downstream data to each ONU, and aggregate the upstream data of multiple ONUs/ONTs to the OLT.

本领域技术人员可知的是,从OLT到ONU称为下行,反之为上行。Those skilled in the art will know that the transmission from OLT to ONU is called downlink, and the reverse is called uplink.

在本实施例中,由于ONU和OLT已经完成了密钥同步,因此,在上行加密过程中,ONU和OLT当前使用的密钥一致,OLT和ONU能够使用相同的密钥进行加密/解密,不会出现上行帧丢包。In this embodiment, since the ONU and the OLT have completed key synchronization, during the uplink encryption process, the keys currently used by the ONU and the OLT are consistent, and the OLT and the ONU can use the same key for encryption/decryption, and no uplink frame loss will occur.

其中,本实施例中加密算法进行动态切换的密钥协商过程的发起方不一定是OLT,也可能是ONU,也可能是双方共同发起,本实施例对此不作具体的限定。In this embodiment, the initiator of the key negotiation process for dynamic switching of the encryption algorithm is not necessarily the OLT, but may be the ONU, or may be jointly initiated by both parties, which is not specifically limited in this embodiment.

在一示例中,可通过由OLT和ONU根据随机数和系统参数生成加密密钥进行密钥协商的,整个协商过程中传输的是由随机数和系统参数生成的传递数,从而使得即使窃听者获取了传递数,甚至其获取了系统参数,也因为不知道随机数而无法获得加密密钥,与相关技术中通过网络直接传输明文密钥相比,可大大提高密钥协商过程的安全性。另外,本实施例发送的该传递数或响应消息是采用分片后多次发送的方式进行的,将数据分片发送可以有效提高数据传输的安全性,而采用多次发送方式可以提高数据传输的可靠性。若OLT或ONU接收传递数时有任一分片每次都接收失败,则重新发送请求更新加密密钥消息;若已连续发送请求更新加密密钥消息次数大于预定请求更新加密密钥消息次数,则宣告密钥协商失败。In one example, the key negotiation can be performed by the OLT and the ONU generating an encryption key based on a random number and system parameters. The transmission number generated by the random number and the system parameters is transmitted during the entire negotiation process, so that even if the eavesdropper obtains the transmission number or even the system parameters, the encryption key cannot be obtained because the random number is not known. Compared with the direct transmission of the plaintext key through the network in the related art, the security of the key negotiation process can be greatly improved. In addition, the transmission number or response message sent by this embodiment is sent multiple times after being fragmented. Sending data in fragments can effectively improve the security of data transmission, and the multiple transmission method can improve the reliability of data transmission. If any fragment fails to be received each time when the OLT or ONU receives the transmission number, the request to update the encryption key message is resent; if the number of consecutive requests to update the encryption key message is greater than the predetermined number of requests to update the encryption key message, the key negotiation is declared to have failed.

需要说明的是,OLT与ONU当前所协商采用的加密算法包括但不限于:AES-128、AES-256、Camellia-128、Camellia-256和SM4等加密算法。It should be noted that the encryption algorithms currently negotiated and adopted by the OLT and the ONU include but are not limited to: AES-128, AES-256, Camellia-128, Camellia-256 and SM4 encryption algorithms.

其中,本领域技术人员可知的是,OMCI实体ONU2-G为现有技术中进行加密算法动态切换的虚拟装置或者实体单元,在此不再赘述。需要说明的是,目前OMCI实体ONU2-G暂未用于上行传输数据的加密算法动态切换。Among them, it is known to those skilled in the art that the OMCI entity ONU2-G is a virtual device or physical unit for dynamically switching the encryption algorithm in the prior art, which will not be repeated here. It should be noted that the OMCI entity ONU2-G is not currently used for dynamically switching the encryption algorithm for uplink transmission data.

在本实施例中,在根据OMCI实体ONU2-G进行加密算法动态切换的过程中,各种PON模式(包括但不限于GPON非对称、GPON对称、XGPON非对称、XGPON对称等PON模式)都支持多种加密算法(包括但不限于AES-128、AES-256、Camellia-128、Camellia-256和SM4)。具体地,ONU通过OMCI实体ONU2-G中的Security capability属性向OLT上报ONU支持的加密算法,在实例化ONU时会将实体ONU2-G中的Security mode属性设置为某一特定值,如设置为1,即使用AES-128加密算法。In this embodiment, in the process of dynamically switching the encryption algorithm according to the OMCI entity ONU2-G, various PON modes (including but not limited to GPON asymmetric, GPON symmetric, XGPON asymmetric, XGPON symmetric and other PON modes) support multiple encryption algorithms (including but not limited to AES-128, AES-256, Camellia-128, Camellia-256 and SM4). Specifically, the ONU reports the encryption algorithm supported by the ONU to the OLT through the Security capability attribute in the OMCI entity ONU2-G, and the Security mode attribute in the entity ONU2-G is set to a specific value when the ONU is instantiated, such as setting it to 1, that is, using the AES-128 encryption algorithm.

示例性地,OLT通过OMCI实体ONU2-G中的Security mode属性设置ONU的加密算法,如OMCI实体ONU2-G中Security mode值为1则将加密算法切换为AES-128加密算法,如OMCI实体Security mode值为5则切换为SM4加密算法。在ONU作出响应之后实现加密算法的切换。Exemplarily, OLT sets the encryption algorithm of ONU through the Security mode attribute in OMCI entity ONU2-G. If the Security mode value in OMCI entity ONU2-G is 1, the encryption algorithm is switched to AES-128 encryption algorithm, and if the Security mode value in OMCI entity is 5, it is switched to SM4 encryption algorithm. The switching of encryption algorithm is realized after ONU responds.

步骤S600之后,执行步骤S700,根据所述动态切换后的加密算法,与所述OLT之间进行密钥同步;After step S600, step S700 is executed to synchronize keys with the OLT according to the encryption algorithm after the dynamic switch;

步骤S800,在密钥同步后,接收所述OLT发送的超帧计数器的目标值或Key Index,根据所述超帧计数器的目标值或Key Index,确定从指定帧开始使用新密钥或新的加密算法。Step S800: after key synchronization, receiving the target value of the superframe counter or the Key Index sent by the OLT, and determining to use a new key or a new encryption algorithm starting from a specified frame according to the target value of the superframe counter or the Key Index.

示例性地,根据超帧计数器的目标值或Key Index,确定从指定帧开始使用新密钥或新的加密算法,包括:Exemplarily, determining to use a new key or a new encryption algorithm starting from a specified frame according to a target value of a superframe counter or a Key Index includes:

在无源光网络系统为GPON非对称系统或者GPON对称系统的情况下,根据超帧计数器的目标值,从指定帧开始使用新密钥或新的加密算法;In the case where the passive optical network system is a GPON asymmetric system or a GPON symmetric system, a new key or a new encryption algorithm is used starting from a specified frame according to a target value of a superframe counter;

在无源光网络系统为XGPON或者XGSPON系统的情况下,根据Key Index的变化,从指定帧开始使用新密钥或新的加密算法。In the case where the passive optical network system is an XGPON or XGSPON system, a new key or a new encryption algorithm is used starting from a specified frame according to a change in the Key Index.

在本实施例中,可通过PLOAM消息或OMCI消息,接收OLT发送的超帧计数器的目标值或Key Index。In this embodiment, the target value or Key Index of the superframe counter sent by the OLT may be received through a PLOAM message or an OMCI message.

示例性地,所述OLT和所有所述ONU均使用经过同步的所述超帧计数器,所述超帧计数器包括帧内计数器和帧间计数器,所述超帧计数器的宽度为46比特,其中,低16比特为所述帧内计数器,高30比特为所述帧间计数器,对于所述上行加密,所述帧内计数器在上行帧开始置为0,每4字节递增,所述帧间计数器包含在下行GTC帧的GTC Header字段中,所述GTC Header字段指定传输上行GEM帧的上行GTC突发。Exemplarily, the OLT and all the ONUs use the synchronized superframe counter, the superframe counter includes an intra-frame counter and an inter-frame counter, the width of the superframe counter is 46 bits, of which the lower 16 bits are the intra-frame counter and the upper 30 bits are the inter-frame counter. For the uplink encryption, the intra-frame counter is set to 0 at the beginning of the uplink frame and increments every 4 bytes. The inter-frame counter is included in the GTC Header field of the downstream GTC frame, and the GTC Header field specifies the uplink GTC burst for transmitting the uplink GEM frame.

具体地,在所述无源光网络系统为GPON非对称系统或者GPON对称系统的情况下,在上行方向,GTC成帧子层的突发被划分为4字节的多个数据块,各所述数据块从S到(S+X)顺序编号;Specifically, when the passive optical network system is a GPON asymmetric system or a GPON symmetric system, in the upstream direction, the burst of the GTC framing sublayer is divided into a plurality of data blocks of 4 bytes, and each of the data blocks is sequentially numbered from S to (S+X);

其中,S=|_目标StartTime/m_|,目标StartTime为DLL成帧子层突发第一个分配的StartTime,StartTime用于指示带宽分配时隙的开始时间,X为所述数据块的数量减去一(即X为GTC上行突发中数据块的数量减去一),Wherein, S=|_targetStartTime/m_|, targetStartTime is the StartTime of the first allocation of the DLL framing sublayer burst, StartTime is used to indicate the start time of the bandwidth allocation time slot, X is the number of data blocks minus one (i.e., X is the number of data blocks in the GTC uplink burst minus one),

m为针对上行数据传输速率而预设的数值,其中,对于1.25G上行,m=4,对于2.5G上行,m=2;m is a preset value for the uplink data transmission rate, where for 1.25G uplink, m=4, and for 2.5G uplink, m=2;

所述超帧计数器包括帧内计数器和帧间计数器,其中,所述帧内计数器的值包括所有FEC校验字节。The superframe counter includes an intra-frame counter and an inter-frame counter, wherein the value of the intra-frame counter includes all FEC check bytes.

需要说明的是,在CTR(counter mode,计数器模式)模式中,OLT和所有ONU都使用经过同步的超帧计数器(SFC,Superframe Counter)。超帧计数器的宽度为46比特,其中,低16比特为帧内计数器,高30比特是帧间计数器。帧内计数器在下行帧开始时置为0,每4字节递增。上下行加密中超帧计数器的值可以包含所有FEC(forward error correction,前向纠错)校验字节,当然,上下行加密中超帧计数器的值也可以不包含所有FEC校验字节,本实施例对此不作具体的限定。It should be noted that in CTR (counter mode), the OLT and all ONUs use a synchronized superframe counter (SFC). The width of the superframe counter is 46 bits, of which the lower 16 bits are the intra-frame counter and the upper 30 bits are the inter-frame counter. The intra-frame counter is set to 0 at the beginning of the downlink frame and increments every 4 bytes. The value of the superframe counter in uplink and downlink encryption may include all FEC (forward error correction) check bytes. Of course, the value of the superframe counter in uplink and downlink encryption may not include all FEC check bytes, and this embodiment does not make specific limitations on this.

具体地,帧内计数器在下行帧开始位置为0(PHY Header的第一个字节),每4字节递增。在下行速率2.488Gbit/s系统内,帧内计数器范围为0至9719。Specifically, the intra-frame counter is 0 at the beginning of the downstream frame (the first byte of the PHY Header) and increments every 4 bytes. In a system with a downstream rate of 2.488 Gbit/s, the intra-frame counter ranges from 0 to 9719.

在上行方向,DLL(Dynamic Link Library,动态链接库)成帧子层的突发被划分为4字节的块,这些块从S到(S+X)顺序编号。此处S=|_StartTime/m_|,其中,对于1.25G上行,m=4;对于2.5G上行,m=2。|_xxx_|表示xxx向下取整,StartTime为DLL成帧子层突发第一个allocation的StartTime,X是DLL突发中完整和不完整的4字节块的数量减去1。需要注意的是,加密处理步骤在FEC之前。然而,帧内计数器的值来自发送的帧,因此在一般情况下,下行和上行帧内计数器的值中要包括所有FEC校验字节,最后再进行扰码处理。In the upstream direction, the bursts of the DLL (Dynamic Link Library) framing sublayer are divided into 4-byte blocks, which are numbered sequentially from S to (S+X). Here S=|_StartTime/m_|, where m=4 for 1.25G upstream and m=2 for 2.5G upstream. |_xxx_| means xxx is rounded down, StartTime is the StartTime of the first allocation of the DLL framing sublayer burst, and X is the number of complete and incomplete 4-byte blocks in the DLL burst minus 1. It should be noted that the encryption process precedes FEC. However, the values of the intra-frame counters come from the transmitted frames, so in general, the values of the downstream and upstream intra-frame counters should include all FEC check bytes, and the scrambling process is finally performed.

在上行方向上,帧间计数器包含在下行GTC帧的PCBd(Physical Control Blockdownstream,下行物理层控制块)字段中,该字段指定传输上行GTC帧的上行突发。ONU实现一个经过同步的本地计数器,因此可以修复这个域的错误。随机密码块与GEM净荷的起始位置对齐。In the upstream direction, the inter-frame counter is contained in the PCBd (Physical Control Blockdownstream) field of the downstream GTC frame, which specifies the upstream burst for transmitting the upstream GTC frame. The ONU implements a synchronized local counter so that errors in this field can be corrected. The random cipher block is aligned with the start of the GEM payload.

在本实施例中,只对GEM帧/分片的净荷进行加密,GEM帧头不进行加密。由于GEM分片不一定是一个完整的编码块,所以尾数据块(长度为1到16字节)与尾密码块(长度为16字节)的MSB进行异或运算。尾密码块的其余部分将会被丢弃。In this embodiment, only the payload of the GEM frame/slice is encrypted, and the GEM frame header is not encrypted. Since the GEM slice is not necessarily a complete coded block, the tail data block (length is 1 to 16 bytes) and the MSB of the tail cipher block (length is 16 bytes) are XORed. The rest of the tail cipher block will be discarded.

在一实施例中,所述指定帧为所述超帧计数器的值达到该目标值时对应的信息帧,根据所述超帧计数器的目标值,确定从指定帧开始使用新的解密密钥进行解密的步骤,具体可包括:根据所述超帧计数器的目标值,在所述ONU侧配置的超帧计数器的值达到该目标值时,开始使用新的解密密钥,其中,所述ONU侧配置的超帧计数器与所述ONT侧配置的超帧计数器同步。In one embodiment, the designated frame is an information frame corresponding to when the value of the superframe counter reaches the target value. According to the target value of the superframe counter, the step of using a new decryption key for decryption starting from the designated frame is determined, which may specifically include: according to the target value of the superframe counter, when the value of the superframe counter configured on the ONU side reaches the target value, starting to use the new decryption key, wherein the superframe counter configured on the ONU side is synchronized with the superframe counter configured on the ONT side.

本实施例通过在密钥同步后,可通过PLOAM消息或OMCI消息,接收OLT发送的超帧计数器的目标值或Key Index,根据该超帧计数器的目标值或Key Index,确定从指定帧开始使用新密钥或新的加密算法,可以避免OLT和ONU两边交互消息导致新密钥启用时间不一致的问题,实现Port-ID加解密使能的无缝切换,保证上行数据流不丢包。After key synchronization, this embodiment can receive the target value or Key Index of the superframe counter sent by the OLT through a PLOAM message or an OMCI message, and determine to use a new key or a new encryption algorithm starting from a specified frame according to the target value or Key Index of the superframe counter, thereby avoiding the problem of inconsistent activation time of the new key caused by the interaction of messages between the OLT and the ONU, realizing seamless switching of Port-ID encryption and decryption enabling, and ensuring that the upstream data flow is not lost.

值得一提的是,本申请实施例提供一种FTTR(Fiber to the Rome,光纤到房间)加密的实现方法。对于FTTR场景下的GPON非对称和GPON对称,能够实现增加上行加密以及帧间隔(IPG,Inter-packet Gap)的配置规则。而对于FTTR场景下的各种PON模式(包括但不限于GPON非对称、GPON对称、XGPON非对称、XGPON对称等PON模式)增加上下行加密使能策略、SM4加密算法以及加密算法动态切换策略;对于OLT的同一PON口下的不同ONU提出混合加密策略。It is worth mentioning that the embodiment of the present application provides a method for implementing FTTR (Fiber to the Rome) encryption. For GPON asymmetry and GPON symmetry in the FTTR scenario, it is possible to add upstream encryption and inter-packet gap (IPG) configuration rules. For various PON modes in the FTTR scenario (including but not limited to GPON asymmetric, GPON symmetric, XGPON asymmetric, XGPON symmetric and other PON modes), upstream and downstream encryption enabling strategies, SM4 encryption algorithms and encryption algorithm dynamic switching strategies are added; a hybrid encryption strategy is proposed for different ONUs under the same PON port of the OLT.

本申请提出一种无源光网络系统的业务加密方法、电子设备及存储介质,在无源光网络系统的业务加密方法中,本申请实施例的技术方案是接收光线路终端OLT发送的加密使能信息,其中,加密使能信息用于指示当前为不开启加密、仅开启上行加密、仅开启下行加密或者开启上下行加密,在使能开启上下行加密或者开启上行加密后,通过OMCI实体ONU2-G,对OLT与ONU当前所协商采用的加密算法进行动态切换,并根据动态切换后的加密算法,与OLT之间进行密钥同步,然后在密钥同步后,接收所述OLT发送的超帧计数器的目标值或Key Index,根据超帧计数器的目标值或Key Index,确定从指定帧开始使用新密钥或新的加密算法,完成对上行业务报文进行加解密,从而使得在FTTR(Fiber To The Room,光纤到房间)场景下的GPON非对称和GPON对称,增加上行加密,进而使得FTTR场景下的各种PON模式(包括但不限于GPON非对称、GPON对称、XGPON非对称、XGPON对称等PON模式)能够支持上下行加密使能策略、SM4加密算法以及加密算法动态切换策略,有效实现PON系统支持多种加密算法,以及各算法动态切换的需求。The present application proposes a service encryption method, electronic device and storage medium of a passive optical network system. In the service encryption method of the passive optical network system, the technical solution of the embodiment of the present application is to receive encryption enabling information sent by an optical line terminal OLT, wherein the encryption enabling information is used to indicate that encryption is not enabled, only uplink encryption is enabled, only downlink encryption is enabled or uplink and downlink encryption is enabled. After enabling uplink and downlink encryption or enabling uplink encryption, the encryption algorithm currently negotiated and adopted by the OLT and the ONU is dynamically switched through the OMCI entity ONU2-G, and according to the encryption algorithm after the dynamic switching, the key is synchronized with the OLT, and then after the key synchronization, the target value or Key Index of the superframe counter sent by the OLT is received, and according to the target value or Key Index of the superframe counter, it is determined to use a new key or a new encryption algorithm starting from a specified frame to complete the encryption and decryption of the uplink service message, so that in FTTR (Fiber To The The GPON asymmetric and GPON symmetric in the FTTR (Fiber to the Room) scenario increase uplink encryption, so that various PON modes in the FTTR scenario (including but not limited to GPON asymmetric, GPON symmetric, XGPON asymmetric, XGPON symmetric and other PON modes) can support uplink and downlink encryption enabling strategies, SM4 encryption algorithms and encryption algorithm dynamic switching strategies, effectively realizing the PON system to support multiple encryption algorithms and the dynamic switching of algorithms.

在一种可能的实施方式中,所述步骤S700,根据所述动态切换后的加密算法,与所述OLT之间进行密钥同步的步骤包括:In a possible implementation manner, the step S700, the step of performing key synchronization with the OLT according to the dynamically switched encryption algorithm, includes:

步骤S710,根据所述动态切换后的加密算法,通过所述OLT指示所述ONU生成新密钥;Step S710, instructing the ONU to generate a new key through the OLT according to the encryption algorithm after the dynamic switch;

在本实施例中,ONU可通过接收OLT发送的密钥请求消息Request_Key消息,根据Request_Key消息触发ONU生成新密钥。In this embodiment, the ONU may receive a key request message Request_Key message sent by the OLT, and trigger the ONU to generate a new key according to the Request_Key message.

具体地,根据动态切换后的加密算法对应的算法类型,通过OLT指示ONU生成新密钥。例如,动态切换后的加密算法对应的算法类型为SM4,指示ONU生成的新密钥即为基于该SM4算法而生成的新密钥。Specifically, according to the algorithm type corresponding to the encryption algorithm after dynamic switching, the OLT instructs the ONU to generate a new key. For example, if the algorithm type corresponding to the encryption algorithm after dynamic switching is SM4, the new key generated by the ONU is a new key generated based on the SM4 algorithm.

步骤S720,将所述新密钥上报至所述ONU,以触发所述OLT指定新密钥开始生效的密钥切换时间;Step S720, reporting the new key to the ONU to trigger the OLT to specify a key switching time at which the new key takes effect;

在本实施例中,ONU可通过接收OLT发送的密钥切换时间消息Key_Switching_Time消息,根据Key_Switching_Time消息获取该密钥切换时间。In this embodiment, the ONU may receive a key switching time message Key_Switching_Time sent by the OLT, and obtain the key switching time according to the Key_Switching_Time message.

步骤S730,接收所述OLT响应于新密钥而返回的所述密钥切换时间,并向所述OLT反馈接收到所述密钥切换时间的响应,以触发所述OLT在所述密钥切换时间将所述新密钥设置到当前使用密钥的寄存器中。Step S730, receiving the key switching time returned by the OLT in response to the new key, and feeding back a response of receiving the key switching time to the OLT, so as to trigger the OLT to set the new key to the register of the currently used key at the key switching time.

在本实施例中,具体地,OLT和ONU可采用ITU-T G.984.3标准中的消息进行交互,其中,OLT 通过发送密钥请求消息Request_Key消息指示ONU生成新密钥,通过发送密钥切换时间消息Key_Switching_Time消息通知ONU该密钥切换时间。在密钥同步后,可通过发送GEM-PORT加密消息Encrypted_Port_ID消息通知ONU打开GEM-PORT的解密功能。ONU通过发送密钥请求响应消息Encryption_Key消息向OLT上报新密钥,通过发送告知确认Acknowledge消息通知OLT已经收到了所述密钥切换时间。In this embodiment, specifically, the OLT and the ONU may interact using messages in the ITU-T G.984.3 standard, wherein the OLT instructs the ONU to generate a new key by sending a key request message Request_Key message, and notifies the ONU of the key switching time by sending a key switching time message Key_Switching_Time message. After the key is synchronized, the ONU may be notified to turn on the decryption function of the GEM-PORT by sending a GEM-PORT encryption message Encrypted_Port_ID message. The ONU reports the new key to the OLT by sending a key request response message Encryption_Key message, and notifies the OLT that the key switching time has been received by sending an Acknowledge message.

本实施例通过根据动态切换后的加密算法,通过OLT指示ONU生成新密钥,将该新密钥上报至ONU,以触发OLT指定新密钥开始生效的密钥切换时间,接收OLT响应于新密钥而返回的所述密钥切换时间,并向OLT反馈接收到所述密钥切换时间的响应,以触发OLT在密钥切换时间将新密钥设置到当前使用密钥的寄存器中,从而确保ONU与OLT侧的密钥切换时间是同步的,若不同步将会导致OLT接收不到ONU发送来的数据。This embodiment instructs the ONU to generate a new key through the OLT according to the encryption algorithm after dynamic switching, reports the new key to the ONU, so as to trigger the OLT to specify a key switching time at which the new key takes effect, receives the key switching time returned by the OLT in response to the new key, and feeds back a response to the key switching time to the OLT, so as to trigger the OLT to set the new key to the register of the currently used key at the key switching time, thereby ensuring that the key switching time on the ONU and OLT sides is synchronized. If it is not synchronized, the OLT will not receive the data sent by the ONU.

在一种可能的实施方式中,在无源光网络系统为GPON非对称系统或者GPON对称系统的情况下,通过PLOAM消息,接收所述OLT发送的超帧计数器的目标值,其中,所述接收所述OLT发送的超帧计数器的目标值的步骤,包括:In a possible implementation, when the passive optical network system is a GPON asymmetric system or a GPON symmetric system, a target value of a superframe counter sent by the OLT is received through a PLOAM message, wherein the step of receiving the target value of the superframe counter sent by the OLT includes:

步骤D10,接收所述OLT发送的Encrypted_Port_ID消息;Step D10, receiving the Encrypted_Port_ID message sent by the OLT;

步骤D20,根据所述Encrypted_Port_ID消息,确定超帧计数器的目标值。Step D20: Determine a target value of a superframe counter according to the Encrypted_Port_ID message.

在本实施例中,在密钥同步后,OLT可通过打开GPON封装方法通道(GEM-PORT)的加密功能,并通过发送GEM-PORT加密消息 Encrypted_Port_ID 消息通知ONU打开GEM-PORT的解密功能。In this embodiment, after the key synchronization, the OLT may enable the encryption function of the GPON encapsulation method channel (GEM-PORT), and notify the ONU to enable the decryption function of the GEM-PORT by sending a GEM-PORT encryption message Encrypted_Port_ID message.

本实施例通过接收OLT发送的Encrypted_Port_ID消息,并根据Encrypted_Port_ID消息,确定超帧计数器的目标值,从而使得本申请实施例通过Encrypted_Port_ID消息携带超帧计数器值的方式,可以避免OLT和ONU两边交互消息导致采用新密钥或新加密算法对信息帧不同步的问题,实现Port-ID加解密使能的无缝切换,保证上行数据流不丢包,充分保证了OLT与ONU之间数据交互的可靠性。This embodiment receives the Encrypted_Port_ID message sent by the OLT, and determines the target value of the superframe counter according to the Encrypted_Port_ID message, so that the embodiment of the present application can avoid the problem of information frame asynchronization caused by the use of new keys or new encryption algorithms due to the interaction of messages between the OLT and the ONU by carrying the superframe counter value through the Encrypted_Port_ID message, realize seamless switching of Port-ID encryption and decryption, ensure that the upstream data flow is not lost, and fully ensure the reliability of data interaction between the OLT and the ONU.

为了助于理解本申请实施例的技术原理或技术构思,列举具体实施例二,包括:In order to help understand the technical principles or technical concepts of the embodiments of the present application, a specific embodiment 2 is listed, including:

(1)在发送端对明文进行加密得到密文(1) Encrypt the plaintext at the sending end to obtain the ciphertext

在发送端对每个数据块根据46比特长的同步计数器值按照如下方式推导出加密算法的128比特输入:46比特复制3次后变成一个138比特的序列,高位10比特会被丢弃。剩余的128比特按照加密算法(包括但不限于AES-128、AES-256、Camellia-128、Camellia-256和SM4)进行加密,生成128比特随机密码,然后与净荷数据进行异或操作。At the sending end, the 128-bit input of the encryption algorithm is derived from the 46-bit synchronization counter value for each data block in the following manner: 46 bits are copied three times to become a 138-bit sequence, and the high-order 10 bits are discarded. The remaining 128 bits are encrypted according to the encryption algorithm (including but not limited to AES-128, AES-256, Camellia-128, Camellia-256, and SM4) to generate a 128-bit random password, which is then XORed with the payload data.

对于下行方向传输,发送端是OLT,接收端是ONU,OLT对明文加密得到密文,并将密文发送到ONU。对于上行方向传输,发送端是ONU,接收端是OLT,ONU对明文加密得到密文,并将密文发送到OLT。For downstream transmission, the sending end is the OLT and the receiving end is the ONU. The OLT encrypts the plaintext to obtain the ciphertext and sends the ciphertext to the ONU. For upstream transmission, the sending end is the ONU and the receiving end is the OLT. The ONU encrypts the plaintext to obtain the ciphertext and sends the ciphertext to the OLT.

(2)在接收端对密文进行解密得到明文(2) Decrypt the ciphertext at the receiving end to obtain the plaintext

由于OLT和ONU的计数器值和密钥是同步的,所以在接收端对接收到的密文与相同的128比特随机密码进行异或就能解密得到明文。Since the counter values and keys of the OLT and ONU are synchronized, the plain text can be decrypted by performing an XOR operation on the received ciphertext and the same 128-bit random password at the receiving end.

(3)GPON非对称和GPON对称的另外两种加密使能方案(3) Two other encryption enabling solutions for GPON asymmetric and GPON symmetric

通过Encrypted_Port-ID message或者GEM帧中的PTI字段进行修改来实现GPON非对称和GPON对称的加密使能。GPON asymmetric and GPON symmetric encryption is enabled by modifying the PTI field in the Encrypted_Port-ID message or the GEM frame.

将GPON非对称和GPON对称的下行PLOAM消息Encrypted_Port-ID message用来指示下行加密使能时间或者上下行加密使能时间。Encrypted_Port-ID message中未使用的第6到第12字节中的某4个字节用于表示密钥交换后新密钥生效的第一帧的SFC值。如下面表格中使用第6字节到第9字节来表示密钥交换后生效的第一帧的SFC值,第6字节的6个最低有效位是密钥交换后生效的第一帧的SFC值的6个最高有效位,第9字节是密钥交换后生效的第一帧的SFC值的8个最低有效位,第7字节和第8字节是中间位。如下表格所示:The GPON asymmetric and GPON symmetric downstream PLOAM message Encrypted_Port-ID message is used to indicate the downstream encryption enable time or the upstream and downstream encryption enable time. The unused 4 bytes from the 6th to the 12th bytes in the Encrypted_Port-ID message are used to indicate the SFC value of the first frame in which the new key takes effect after the key exchange. As shown in the following table, the 6th to 9th bytes are used to indicate the SFC value of the first frame in which the new key takes effect after the key exchange. The 6 least significant bits of the 6th byte are the 6 most significant bits of the SFC value of the first frame in which the key exchange takes effect. The 9th byte is the 8 least significant bits of the SFC value of the first frame in which the key exchange takes effect. The 7th and 8th bytes are the middle bits. As shown in the following table:

在本实施例中,将GEM帧中的PTI字段的第2个比特的值用来表示是否开启加密,PTI字段的第2个比特的值为1表示开启加密,PTI字段的第2个比特的值为0表示没有开启加密。如下表格所示:In this embodiment, the value of the second bit of the PTI field in the GEM frame is used to indicate whether encryption is enabled. The value of the second bit of the PTI field is 1, indicating that encryption is enabled, and the value of the second bit of the PTI field is 0, indicating that encryption is not enabled. As shown in the following table:

PTI编码PTI Encoding 含义meaning 000000 用户数据段,不是帧尾,不加密User data segment, not the frame tail, is not encrypted 001001 用户数据段,是帧尾,不加密User data segment, which is the end of the frame and is not encrypted 010010 用户数据段,不是帧尾,加密User data segment, not frame tail, encrypted 011011 用户数据段,是帧尾,加密The user data segment is the frame tail and is encrypted 100100 GEM OAM,不是帧尾,不加密GEM OAM, not frame tail, not encrypted 101101 GEM OAM,是帧尾,不加密GEM OAM, frame tail, not encrypted 110110 GEM OAM,不是帧尾,加密GEM OAM, not frame tail, encryption 111111 GEM OAM,是帧尾,加密GEM OAM, frame tail, encryption

在本实施例中,根据上下行GEM帧中的PTI字段的值能够判断当前传输方向上是否开启加密。In this embodiment, whether encryption is enabled in the current transmission direction can be determined according to the value of the PTI field in the uplink and downlink GEM frames.

需要说明的是,该具体实施例二阐述的诸多细节仅助于理解本申请的技术原理或技术构思,并不构成对本申请的限定,基于本申请的该技术构思进行更多形式的简单变换,均应在本申请的保护范围内。It should be noted that the many details described in the second specific embodiment are only helpful for understanding the technical principles or technical concepts of the present application, and do not constitute a limitation of the present application. More simple transformations based on the technical concepts of the present application should all be within the scope of protection of the present application.

为了进一步助于理解本申请实施例的技术原理或技术构思,列举具体实施例三,包括:In order to further help understand the technical principles or technical concepts of the embodiments of the present application, a specific embodiment 3 is listed, including:

本实施例提供一种FTTR(Fiber To The Room,光纤到房间)加密的实现方法,该方法包括:This embodiment provides a method for implementing FTTR (Fiber To The Room) encryption, the method comprising:

1、GPON非对称和GPON对称增加上行加密以及帧间隔的配置规则,上行GTC突发中GEM帧的IFC值的获取,根据同步计数器的帧内计数器(IFC)的值获得对应GEM帧的IFC值。同步计数器IFC=N时,GEM帧头第一个字节的位置被标注。该字节位置的同步计数器值用作GTC上行突发的密码块计数器的值。对于GTC上行突发中接下来的密码块,计数器对每个块递增1。这种方法可以保证计数器的同一值不会被重复使用。1. GPON asymmetric and GPON symmetric increase the configuration rules of upstream encryption and frame interval, obtain the IFC value of the GEM frame in the upstream GTC burst, and obtain the IFC value of the corresponding GEM frame according to the value of the intra-frame counter (IFC) of the synchronization counter. When the synchronization counter IFC=N, the position of the first byte of the GEM frame header is marked. The synchronization counter value at this byte position is used as the value of the cipher block counter of the GTC upstream burst. For the next cipher block in the GTC upstream burst, the counter is incremented by 1 for each block. This method ensures that the same value of the counter will not be reused.

2、上下行加密使能。2. Enable uplink and downlink encryption.

3、根据OMCI实体ONU2-G进行加密算法的切换。3. Switch the encryption algorithm according to the OMCI entity ONU2-G.

4、同一PON口下的不同ONU的混合加密。4. Hybrid encryption of different ONUs under the same PON port.

5、加密算法切换后OLT与ONU之间根据新的加密算法进行密钥交互和更新。加密算法切换后以密钥更新SFC为基准生效。加密算法切换后可通过以Key Index变化为基准生效。5. After the encryption algorithm is switched, the OLT and ONU exchange and update keys based on the new encryption algorithm. After the encryption algorithm is switched, the key update SFC is used as the benchmark to take effect. After the encryption algorithm is switched, the change in Key Index can be used as the benchmark to take effect.

6、在发送端对明文进行加密得到密文。6. Encrypt the plaintext at the sending end to obtain the ciphertext.

7、在接收端对密文进行解密得到明文。7. Decrypt the ciphertext at the receiving end to obtain the plaintext.

8、GPON非对称和GPON对称的Encrypted_Port-ID message和GEM帧中的PTI字段进行修改。8. The PTI field in the GPON asymmetric and GPON symmetric Encrypted_Port-ID message and GEM frame is modified.

需要说明的是,该具体实施例三阐述的诸多细节仅助于理解本申请的技术原理或技术构思,并不构成对本申请的限定,基于本申请的该技术构思进行更多形式的简单变换,均应在本申请的保护范围内。It should be noted that the many details described in the third specific embodiment are only helpful for understanding the technical principles or technical concepts of the present application, and do not constitute a limitation of the present application. More simple transformations based on the technical concepts of the present application should all be within the scope of protection of the present application.

此外,本申请实施例还提供一种无源光网络系统的业务加密方法,所述业务加密方法应用于FTTR主设备MFU(Main FTTR Unit),包括:In addition, an embodiment of the present application further provides a service encryption method for a passive optical network system, wherein the service encryption method is applied to a FTTR main device MFU (Main FTTR Unit), and comprises:

将加密使能信息发送至FTTR从设备SFU(Sub FTTR Unit),其中,所述加密使能信息用于指示当前为不开启加密、仅开启上行加密、仅开启下行加密或者开启上下行加密;Sending encryption enable information to the FTTR slave device SFU (Sub FTTR Unit), wherein the encryption enable information is used to indicate whether encryption is currently not enabled, only uplink encryption is enabled, only downlink encryption is enabled, or uplink and downlink encryption is enabled;

在使能开启上下行加密或者开启上行加密后,通过OMCI实体ONU2-G,对所述MFU与所述SFU当前所协商采用的加密算法进行动态切换;After enabling uplink and downlink encryption or enabling uplink encryption, the encryption algorithm currently negotiated and adopted by the MFU and the SFU is dynamically switched through the OMCI entity ONU2-G;

根据所述动态切换后的加密算法,与所述SFU之间进行密钥同步;Perform key synchronization with the SFU according to the encryption algorithm after the dynamic switch;

在密钥同步后,根据超帧计数器的目标值或Key Index,确定从指定帧开始使用新密钥或新的加密算法,并将所述超帧计数器的目标值或Key Index发送至所述SFU。After key synchronization, it is determined to use a new key or a new encryption algorithm starting from a specified frame according to the target value of the superframe counter or the Key Index, and the target value of the superframe counter or the Key Index is sent to the SFU.

本申请提出一种无源光网络系统的业务加密方法、电子设备及存储介质,在无源光网络系统的业务加密方法中,本申请实施例的技术方案是将加密使能信息发送至FTTR从设备SFU,其中,该加密使能信息用于指示当前为不开启加密、仅开启上行加密、仅开启下行加密或者开启上下行加密,然后在使能开启上下行加密或者开启上行加密后,通过OMCI设备的OMCI实体ONU2-G,对MFU与SFU当前所协商采用的加密算法进行动态切换,根据该动态切换后的加密算法,与SFU之间进行密钥同步,再在密钥同步后,根据超帧计数器的目标值或Key Index,确定从指定帧开始使用新密钥或新的加密算法,并将超帧计数器的目标值或Key Index发送至SFU,以通知SFU从指定帧开始使用新密钥或新的加密算法,以对上行业务报文进行加解密,从而使得在FTTR(Fiber To The Room,光纤到房间)场景下的GPON非对称和GPON对称,增加上行加密,进而使得FTTR场景下的各种PON模式(包括但不限于GPON非对称、GPON对称、XGPON非对称、XGPON对称等PON模式)能够支持上下行加密使能策略、SM4加密算法以及加密算法动态切换策略,有效实现PON系统支持多种加密算法,以及各算法动态切换的需求。The present application proposes a service encryption method, electronic device and storage medium of a passive optical network system. In the service encryption method of the passive optical network system, the technical solution of the embodiment of the present application is to send encryption enabling information to the FTTR slave device SFU, wherein the encryption enabling information is used to indicate that encryption is not enabled, only uplink encryption is enabled, only downlink encryption is enabled or uplink and downlink encryption is enabled. Then, after enabling uplink and downlink encryption or enabling uplink encryption, the encryption algorithm currently negotiated and adopted by the MFU and the SFU is dynamically switched through the OMCI entity ONU2-G of the OMCI device. According to the encryption algorithm after the dynamic switching, key synchronization is performed with the SFU. After key synchronization, according to the target value or Key Index of the superframe counter, it is determined to use a new key or a new encryption algorithm from the specified frame, and the target value or Key Index of the superframe counter is sent to the SFU to notify the SFU to use the new key or the new encryption algorithm from the specified frame to encrypt and decrypt the uplink service message, so that in the FTTR (Fiber To The The GPON asymmetric and GPON symmetric in the FTTR (Fiber to the Room) scenario increase uplink encryption, so that various PON modes in the FTTR scenario (including but not limited to GPON asymmetric, GPON symmetric, XGPON asymmetric, XGPON symmetric and other PON modes) can support uplink and downlink encryption enabling strategies, SM4 encryption algorithms and encryption algorithm dynamic switching strategies, effectively realizing the PON system to support multiple encryption algorithms and the dynamic switching of algorithms.

在一些实施例中,在无源光网络系统为GPON非对称系统或者GPON对称系统的情况下,根据超帧计数器的目标值,从指定帧开始使用新密钥或新的加密算法;In some embodiments, when the passive optical network system is a GPON asymmetric system or a GPON symmetric system, a new key or a new encryption algorithm is used starting from a specified frame according to a target value of a superframe counter;

在无源光网络系统为XGPON或者XGSPON系统的情况下,根据Key Index的变化,从指定帧开始使用新密钥或新的加密算法。In the case where the passive optical network system is an XGPON or XGSPON system, a new key or a new encryption algorithm is used starting from a specified frame according to a change in the Key Index.

在一些实施例中,在所述无源光网络系统为GPON非对称系统或者GPON对称系统的情况下,在上行方向,GTC成帧子层的突发被划分为4字节的多个数据块,各所述数据块从S到(S+X)顺序编号;In some embodiments, when the passive optical network system is a GPON asymmetric system or a GPON symmetric system, in the upstream direction, the burst of the GTC framing sublayer is divided into a plurality of data blocks of 4 bytes, and each of the data blocks is sequentially numbered from S to (S+X);

其中,S=|_目标StartTime/m_|,目标StartTime为DLL成帧子层突发第一个分配的StartTime,StartTime用于指示带宽分配时隙的开始时间,X为所述数据块的数量减去一(即X为GTC上行突发中数据块的数量减去一),Wherein, S=|_targetStartTime/m_|, targetStartTime is the StartTime of the first allocation of the DLL framing sublayer burst, StartTime is used to indicate the start time of the bandwidth allocation time slot, X is the number of data blocks minus one (i.e., X is the number of data blocks in the GTC uplink burst minus one),

m为针对上行数据传输速率而预设的数值,其中,对于1.25G上行,m=4,对于2.5G上行,m=2;m is a preset value for the uplink data transmission rate, where for 1.25G uplink, m=4, and for 2.5G uplink, m=2;

所述超帧计数器包括帧内计数器和帧间计数器,其中,所述帧内计数器的值包括所有FEC校验字节。The superframe counter includes an intra-frame counter and an inter-frame counter, wherein the value of the intra-frame counter includes all FEC check bytes.

在一些实施例中,所述根据所述动态切换后的加密算法,与所述SFU之间进行密钥同步的步骤包括:In some embodiments, the step of synchronizing the key with the SFU according to the dynamically switched encryption algorithm includes:

根据所述动态切换后的加密算法,指示所述SFU生成新密钥;Instructing the SFU to generate a new key according to the encryption algorithm after the dynamic switch;

收到所述SFU上报的新密钥后,指定新密钥开始生效的密钥切换时间,并向所述SFU通知所述密钥切换时间;After receiving the new key reported by the SFU, specify a key switching time at which the new key becomes effective, and notify the SFU of the key switching time;

收到所述SFU反馈的收到密钥切换时间的响应后,在所述密钥切换时间将所述新密钥设置到当前使用密钥的寄存器中。After receiving the response of receiving the key switching time fed back by the SFU, the new key is set to the register of the currently used key at the key switching time.

在一些实施例中,所述方法还包括:In some embodiments, the method further comprises:

通过发送密钥请求消息Request_Key消息指示所述SFU生成新密钥;Instruct the SFU to generate a new key by sending a key request message Request_Key message;

通过发送密钥切换时间消息Key_Switching_Time消息,向所述SFU通知所述密钥切换时间。The key switching time is notified to the SFU by sending a key switching time message Key_Switching_Time message.

在一些实施例中,在无源光网络系统为GPON非对称系统或者GPON对称系统的情况下,通过PLOAM消息,将所述超帧计数器的目标值发送至所述SFU,其中,所述将所述超帧计数器的目标值发送至所述SFU的步骤,包括:In some embodiments, when the passive optical network system is a GPON asymmetric system or a GPON symmetric system, the target value of the superframe counter is sent to the SFU through a PLOAM message, wherein the step of sending the target value of the superframe counter to the SFU includes:

向所述SFU发送Encrypted_Port_ID消息,其中,所述Encrypted_Port_ID消息携带所述超帧计数器的目标值。An Encrypted_Port_ID message is sent to the SFU, wherein the Encrypted_Port_ID message carries a target value of the superframe counter.

在一些实施例中,所述加密使能信息中通过如下方式携带有加密使能标识,包括:In some embodiments, the encryption enabling information carries an encryption enabling flag in the following manners, including:

通过在所述加密使能信息中的PTI字段的指定比特携带加密使能标识,其中,所述指定比特取值为第一指定值表示不开启加密,所述指定比特取值为第二指定值表示仅开启上行加密,所述指定比特取值为第三指定值表示仅开启下行加密,所述指定比特取值为第四指定值表示开启上下行加密。The encryption enable flag is carried by the designated bit of the PTI field in the encryption enable information, wherein the designated bit value is the first designated value indicating that encryption is not enabled, the designated bit value is the second designated value indicating that only uplink encryption is enabled, the designated bit value is the third designated value indicating that only downlink encryption is enabled, and the designated bit value is the fourth designated value indicating that uplink and downlink encryption are enabled.

在一些实施例中,所述MFU和所有所述SFU均使用经过同步的所述超帧计数器,所述超帧计数器包括帧内计数器和帧间计数器,所述超帧计数器的宽度为46比特,其中,低16比特为所述帧内计数器,高30比特为所述帧间计数器,对于所述上行加密,所述帧内计数器在上行帧开始置为0,每4字节递增,所述帧间计数器包含在下行GTC帧的GTC Header字段中,所述GTC Header字段指定传输上行GEM帧的上行GTC突发。In some embodiments, the MFU and all the SFUs use the synchronized superframe counter, the superframe counter includes an intra-frame counter and an inter-frame counter, the width of the superframe counter is 46 bits, of which the lower 16 bits are the intra-frame counter and the upper 30 bits are the inter-frame counter. For the uplink encryption, the intra-frame counter is set to 0 at the beginning of the uplink frame and increments every 4 bytes. The inter-frame counter is included in the GTC Header field of the downlink GTC frame, and the GTC Header field specifies the uplink GTC burst for transmitting the uplink GEM frame.

本发明实施例提供的无源光网络系统的业务加密方法,采用上述实施例相同或相似的技术特征,能实现PON系统支持多种加密算法,以及各算法动态切换的需求。与现有技术相比,本发明实施例提供的无源光网络系统的业务加密方法的有益效果与上述实施例提供的无源光网络系统的业务加密方法的有益效果相同,且所述无源光网络系统的业务加密方法中的其他技术特征与上述实施例方法一公开的特征相同,在此不做赘述。The service encryption method of the passive optical network system provided in the embodiment of the present invention adopts the same or similar technical features of the above-mentioned embodiment, and can realize the PON system to support multiple encryption algorithms and the requirements of dynamic switching of each algorithm. Compared with the prior art, the beneficial effects of the service encryption method of the passive optical network system provided in the embodiment of the present invention are the same as the beneficial effects of the service encryption method of the passive optical network system provided in the above-mentioned embodiment, and the other technical features in the service encryption method of the passive optical network system are the same as the features disclosed in the method one of the above-mentioned embodiment, which will not be repeated here.

此外,本申请实施例还提供一种无源光网络系统的业务加密方法,所述业务加密方法应用于FTTR从设备SFU,包括:In addition, an embodiment of the present application further provides a service encryption method for a passive optical network system, the service encryption method being applied to an FTTR slave device SFU, comprising:

接收FTTR主设备MFU发送的加密使能信息,其中,所述加密使能信息用于指示当前为不开启加密、仅开启上行加密、仅开启下行加密或者开启上下行加密;Receive encryption enabling information sent by the FTTR master device MFU, wherein the encryption enabling information is used to indicate whether encryption is currently not enabled, only uplink encryption is enabled, only downlink encryption is enabled, or uplink and downlink encryption is enabled;

在使能开启上下行加密或者开启上行加密后,通过OMCI实体ONU2-G,对所述MFU与所述SFU当前所协商采用的加密算法进行动态切换;After enabling uplink and downlink encryption or enabling uplink encryption, the encryption algorithm currently negotiated and adopted by the MFU and the SFU is dynamically switched through the OMCI entity ONU2-G;

根据所述动态切换后的加密算法,与所述MFU之间进行密钥同步;Perform key synchronization with the MFU according to the dynamically switched encryption algorithm;

在密钥同步后,接收所述MFU发送的超帧计数器的目标值或Key Index,根据所述超帧计数器的目标值或Key Index,确定从指定帧开始使用新密钥或新的加密算法。After key synchronization, the target value of the superframe counter or the Key Index sent by the MFU is received, and according to the target value of the superframe counter or the Key Index, it is determined to use a new key or a new encryption algorithm starting from a specified frame.

本申请提出一种无源光网络系统的业务加密方法、电子设备及存储介质,在无源光网络系统的业务加密方法中,本申请实施例的技术方案是接收FTTR主设备MFU发送的加密使能信息,其中,加密使能信息用于指示当前为不开启加密、仅开启上行加密、仅开启下行加密或者开启上下行加密,在使能开启上下行加密或者开启上行加密后,通过OMCI实体ONU2-G,对MFU与SFU当前所协商采用的加密算法进行动态切换,并根据动态切换后的加密算法,与MFU之间进行密钥同步,然后在密钥同步后,接收MFU发送的超帧计数器的目标值或Key Index,根据超帧计数器的目标值或Key Index,确定从指定帧开始使用新密钥或新的加密算法,以对上行业务报文进行加解密,从而使得在FTTR(Fiber To The Room,光纤到房间)场景下的GPON非对称和GPON对称,增加上行加密,进而使得FTTR场景下的各种PON模式(包括但不限于GPON非对称、GPON对称、XGPON非对称、XGPON对称等PON模式)能够支持上下行加密使能策略、SM4加密算法以及加密算法动态切换策略,有效实现PON系统支持多种加密算法,以及各算法动态切换的需求。The present application proposes a service encryption method, electronic device and storage medium of a passive optical network system. In the service encryption method of the passive optical network system, the technical solution of the embodiment of the present application is to receive encryption enabling information sent by an FTTR main device MFU, wherein the encryption enabling information is used to indicate that encryption is not enabled, only uplink encryption is enabled, only downlink encryption is enabled, or uplink and downlink encryption is enabled. After enabling uplink and downlink encryption or enabling uplink encryption, the encryption algorithm currently negotiated and adopted by the MFU and the SFU is dynamically switched through the OMCI entity ONU2-G, and according to the encryption algorithm after the dynamic switching, the key is synchronized with the MFU, and then after the key synchronization, the target value or Key Index of the superframe counter sent by the MFU is received, and according to the target value or Key Index of the superframe counter, it is determined to use a new key or a new encryption algorithm starting from a specified frame to encrypt and decrypt the uplink service message, so that in FTTR (Fiber To The The GPON asymmetric and GPON symmetric in the FTTR (Fiber to the Room) scenario increase uplink encryption, so that various PON modes in the FTTR scenario (including but not limited to GPON asymmetric, GPON symmetric, XGPON asymmetric, XGPON symmetric and other PON modes) can support uplink and downlink encryption enabling strategies, SM4 encryption algorithms and encryption algorithm dynamic switching strategies, effectively realizing the PON system to support multiple encryption algorithms and the dynamic switching of algorithms.

在一些实施例中,在无源光网络系统为GPON非对称系统或者GPON对称系统的情况下,根据超帧计数器的目标值,从指定帧开始使用新密钥或新的加密算法;In some embodiments, when the passive optical network system is a GPON asymmetric system or a GPON symmetric system, a new key or a new encryption algorithm is used starting from a specified frame according to a target value of a superframe counter;

在无源光网络系统为XGPON或者XGSPON系统的情况下,根据Key Index的变化,从指定帧开始使用新密钥或新的加密算法。In the case where the passive optical network system is an XGPON or XGSPON system, a new key or a new encryption algorithm is used starting from a specified frame according to a change in the Key Index.

在一些实施例中,在所述无源光网络系统为GPON非对称系统或者GPON对称系统的情况下,在上行方向,GTC成帧子层的突发被划分为4字节的多个数据块,各所述数据块从S到(S+X)顺序编号;In some embodiments, when the passive optical network system is a GPON asymmetric system or a GPON symmetric system, in the upstream direction, the burst of the GTC framing sublayer is divided into a plurality of data blocks of 4 bytes, and each of the data blocks is sequentially numbered from S to (S+X);

其中,S=|_目标StartTime/m_|,目标StartTime为DLL成帧子层突发第一个分配的StartTime,StartTime用于指示带宽分配时隙的开始时间,X为所述数据块的数量减去一(即X为GTC上行突发中数据块的数量减去一),Wherein, S=|_targetStartTime/m_|, targetStartTime is the StartTime of the first allocation of the DLL framing sublayer burst, StartTime is used to indicate the start time of the bandwidth allocation time slot, X is the number of data blocks minus one (i.e., X is the number of data blocks in the GTC uplink burst minus one),

m为针对上行数据传输速率而预设的数值,其中,对于1.25G上行,m=4,对于2.5G上行,m=2;m is a preset value for the uplink data transmission rate, where for 1.25G uplink, m=4, and for 2.5G uplink, m=2;

所述超帧计数器包括帧内计数器和帧间计数器,其中,所述帧内计数器的值包括所有FEC校验字节。The superframe counter includes an intra-frame counter and an inter-frame counter, wherein the value of the intra-frame counter includes all FEC check bytes.

在一些实施例中,所述方法还包括:In some embodiments, the method further comprises:

接收所述MFU发送的密钥请求消息Request_Key消息,根据所述Request_Key消息触发所述SFU生成新密钥;Receive a key request message Request_Key message sent by the MFU, and trigger the SFU to generate a new key according to the Request_Key message;

接收所述MFU发送的密钥切换时间消息Key_Switching_Time消息,根据所述Key_Switching_Time消息获取所述密钥切换时间。Receive a key switching time message Key_Switching_Time message sent by the MFU, and obtain the key switching time according to the Key_Switching_Time message.

在一些实施例中,在无源光网络系统为GPON非对称系统或者GPON对称系统的情况下,通过PLOAM消息,接收所述MFU发送的超帧计数器的目标值,其中,所述接收所述MFU发送的超帧计数器的目标值的步骤,包括:In some embodiments, when the passive optical network system is a GPON asymmetric system or a GPON symmetric system, a target value of a superframe counter sent by the MFU is received through a PLOAM message, wherein the step of receiving the target value of the superframe counter sent by the MFU includes:

接收所述MFU发送的Encrypted_Port_ID消息;Receive the Encrypted_Port_ID message sent by the MFU;

根据所述Encrypted_Port_ID消息,确定超帧计数器的目标值。A target value of a superframe counter is determined according to the Encrypted_Port_ID message.

在一些实施例中,所述加密使能信息中通过如下方式携带有加密使能标识,包括:In some embodiments, the encryption enabling information carries an encryption enabling flag in the following manners, including:

通过在所述加密使能信息中的PTI 字段的指定比特携带加密使能标识,其中,所述指定比特取值为第一指定值表示不开启加密,所述指定比特取值为第二指定值表示仅开启上行加密,所述指定比特取值为第三指定值表示仅开启下行加密,所述指定比特取值为第四指定值表示开启上下行加密。The encryption enable flag is carried by the designated bit of the PTI field in the encryption enable information, wherein the designated bit value is the first designated value indicating that encryption is not enabled, the designated bit value is the second designated value indicating that only uplink encryption is enabled, the designated bit value is the third designated value indicating that only downlink encryption is enabled, and the designated bit value is the fourth designated value indicating that uplink and downlink encryption are enabled.

在一些实施例中,所述MFU和所有所述SFU均使用经过同步的所述超帧计数器,所述超帧计数器包括帧内计数器和帧间计数器,所述超帧计数器的宽度为46比特,其中,低16比特为所述帧内计数器,高30比特为所述帧间计数器,对于所述上行加密,所述帧内计数器在上行帧开始置为0,每4字节递增,所述帧间计数器包含在下行GTC帧的GTC Header字段中,所述GTC Header字段指定传输上行GEM帧的上行GTC突发。In some embodiments, the MFU and all the SFUs use the synchronized superframe counter, the superframe counter includes an intra-frame counter and an inter-frame counter, the width of the superframe counter is 46 bits, of which the lower 16 bits are the intra-frame counter and the upper 30 bits are the inter-frame counter. For the uplink encryption, the intra-frame counter is set to 0 at the beginning of the uplink frame and increments every 4 bytes. The inter-frame counter is included in the GTC Header field of the downlink GTC frame, and the GTC Header field specifies the uplink GTC burst for transmitting the uplink GEM frame.

本发明实施例提供的无源光网络系统的业务加密方法,采用上述实施例相同或相似的技术特征,能实现PON系统支持多种加密算法,以及各算法动态切换的需求。与现有技术相比,本发明实施例提供的无源光网络系统的业务加密方法的有益效果与上述实施例提供的无源光网络系统的业务加密方法的有益效果相同,且所述无源光网络系统的业务加密方法中的其他技术特征与上述实施例方法一公开的特征相同,在此不做赘述。The service encryption method of the passive optical network system provided in the embodiment of the present invention adopts the same or similar technical features of the above-mentioned embodiment, and can realize the PON system to support multiple encryption algorithms and the requirements of dynamic switching of each algorithm. Compared with the prior art, the beneficial effects of the service encryption method of the passive optical network system provided in the embodiment of the present invention are the same as the beneficial effects of the service encryption method of the passive optical network system provided in the above-mentioned embodiment, and the other technical features in the service encryption method of the passive optical network system are the same as the features disclosed in the method one of the above-mentioned embodiment, which will not be repeated here.

图3示出了本申请一示例性实施例示出的电子设备1800的结构框图。所述电子设备1800包括中央处理单元(Central Processing Unit,CPU)1801、包括随机存取存储器(Random Access Memory,RAM)1802和只读存储器(Read-Only Memory,ROM)1803的系统存储器1804,以及连接系统存储器1804和中央处理单元1801的系统总线1805。所述电子设备1800还包括用于存储操作系统1809、客户端1810和其他程序模块1811的存储设备1806。FIG3 shows a block diagram of an electronic device 1800 according to an exemplary embodiment of the present application. The electronic device 1800 includes a central processing unit (CPU) 1801, a system memory 1804 including a random access memory (RAM) 1802 and a read-only memory (ROM) 1803, and a system bus 1805 connecting the system memory 1804 and the central processing unit 1801. The electronic device 1800 also includes a storage device 1806 for storing an operating system 1809, a client 1810, and other program modules 1811.

不失一般性,所述计算机可读介质可以包括计算机存储介质和通信介质。计算机存储介质包括以用于存储诸如计算机可读指令、数据结构、程序模块或其他数据等信息的任何方法或技术实现的易失性和非易失性、可移动和不可移动介质。计算机存储介质包括RAM、ROM、可擦除可编程只读寄存器(Erasable Programmable Read Only Memory,EPROM)、电子抹除式可复写只读存储器(Electrically-Erasable Programmable Read-OnlyMemory,EEPROM)闪存或其他固态存储其技术,CD-ROM、数字多功能光盘(DigitalVersatile Disc,DVD)或其他光学存储、磁带盒、磁带、磁盘存储或其他磁性存储设备。当然,本领域技术人员可知所述计算机存储介质不局限于上述几种。上述的系统存储器1804和存储设备1806可以统称为存储器。Without loss of generality, the computer-readable medium may include computer storage media and communication media. Computer storage media include volatile and non-volatile, removable and non-removable media implemented by any method or technology for storing information such as computer-readable instructions, data structures, program modules or other data. Computer storage media include RAM, ROM, Erasable Programmable Read Only Memory (EPROM), Electronically-Erasable Programmable Read-Only Memory (EEPROM) flash memory or other solid-state storage technology, CD-ROM, Digital Versatile Disc (DVD) or other optical storage, tape cassettes, tapes, disk storage or other magnetic storage devices. Of course, those skilled in the art will know that the computer storage medium is not limited to the above. The above-mentioned system memory 1804 and storage device 1806 can be collectively referred to as memory.

根据本公开的各种实施例,所述电子设备1800还可以通过诸如因特网等网络连接到网络上的远程计算机运行。也即电子设备1800可以通过连接在所述系统总线1805上的网络接口单元1807连接到网络1808,或者说,也可以使用网络接口单元1807来连接到其他类型的网络或远程计算机系统(未示出)。According to various embodiments of the present disclosure, the electronic device 1800 can also be connected to a remote computer on the network through a network such as the Internet. That is, the electronic device 1800 can be connected to the network 1808 through the network interface unit 1807 connected to the system bus 1805, or the network interface unit 1807 can be used to connect to other types of networks or remote computer systems (not shown).

所述存储器还包括至少一条指令、至少一段程序、代码集或指令集,所述至少一条指令、至少一段程序、代码集或指令集存储于存储器中,中央处理器1801通过执行该至少一条指令、至少一段程序、代码集或指令集来实现上述各个实施例所示的无源光网络系统的业务加密方法中的全部或部分步骤。The memory also includes at least one instruction, at least one program, code set or instruction set, and the at least one instruction, at least one program, code set or instruction set is stored in the memory. The central processor 1801 implements all or part of the steps in the service encryption method of the passive optical network system shown in the above-mentioned embodiments by executing the at least one instruction, at least one program, code set or instruction set.

在一示例性实施例中,还提供了一种计算机可读存储介质,该计算机可读存储介质中存储有至少一条计算机程序,该计算机程序由处理器加载并执行以实现上述无源光网络系统的业务加密方法中的全部或部分步骤,或者实现上述无源光网络系统的业务加密方法中的全部或部分步骤。例如,该计算机可读存储介质可以是只读存储器(Read-OnlyMemory,ROM)、随机存取存储器(Random Access Memory,RAM)、只读光盘(Compact DiscRead-Only Memory,CD-ROM)、磁带、软盘和光数据存储设备等。In an exemplary embodiment, a computer-readable storage medium is also provided, in which at least one computer program is stored, and the computer program is loaded and executed by a processor to implement all or part of the steps in the service encryption method of the above-mentioned passive optical network system, or to implement all or part of the steps in the service encryption method of the above-mentioned passive optical network system. For example, the computer-readable storage medium can be a read-only memory (ROM), a random access memory (RAM), a compact disc (CD-ROM), a magnetic tape, a floppy disk, an optical data storage device, etc.

在一示例性实施例中,还提供了一种计算机程序产品,该计算机程序产品包括至少一条计算机程序,该计算机程序由处理器加载并执行上述任一实施例所示的上述无源光网络系统的业务加密方法中的全部或部分步骤,或者上述无源光网络系统的业务加密方法中的全部或部分步骤。In an exemplary embodiment, a computer program product is also provided, which includes at least one computer program, which is loaded by a processor and executes all or part of the steps in the service encryption method of the above-mentioned passive optical network system shown in any of the above-mentioned embodiments, or all or part of the steps in the service encryption method of the above-mentioned passive optical network system.

本领域技术人员在考虑说明书及实践这里公开的发明后,将容易想到本申请的其它实施方案。本申请旨在涵盖本申请的任何变型、用途或者适应性变化,这些变型、用途或者适应性变化遵循本申请的一般性原理并包括本申请未公开的本技术领域中的公知常识或惯用技术手段。说明书和实施例仅被视为示例性的,本申请的真正范围和精神由权利要求指出。Those skilled in the art will readily appreciate other embodiments of the present application after considering the specification and practicing the invention disclosed herein. The present application is intended to cover any modification, use or adaptation of the present application, which follows the general principles of the present application and includes common knowledge or customary techniques in the art that are not disclosed in the present application. The specification and examples are intended to be exemplary only, and the true scope and spirit of the present application are indicated by the claims.

应当理解的是,本申请并不局限于上面已经描述并在附图中示出的精确结构,并且可以在不脱离其范围进行各种修改和改变。本申请的范围仅由所附的权利要求来限制。It should be understood that the present application is not limited to the precise structures that have been described above and shown in the drawings, and that various modifications and changes may be made without departing from the scope thereof. The scope of the present application is limited only by the appended claims.

Claims (12)

1. A service encryption method of a passive optical network system, the service encryption method being applied to an optical line terminal OLT, comprising:
Transmitting encryption enabling information to an Optical Network Unit (ONU), wherein the encryption enabling information is used for indicating whether encryption is not started, only uplink encryption is started, only downlink encryption is started or uplink and downlink encryption is started currently;
After enabling to start up-down encryption or starting up-down encryption, dynamically switching an encryption algorithm adopted by the OLT and the ONU currently in negotiation through an OMCI entity ONU 2-G;
according to the encryption algorithm after the dynamic switching, key synchronization is carried out between the ONU and the encryption algorithm after the dynamic switching;
After the Key synchronization, determining to use a new Key or a new encryption algorithm from a designated frame according to a target value or a Key Index of a superframe counter, and transmitting the target value or the Key Index of the superframe counter to the ONU;
Wherein, when the passive optical network system is a GPON asymmetric system or a GPON symmetric system, in an upstream direction, a burst of a GTC framing sub-layer is divided into a plurality of data blocks of 4 bytes, and each data block is numbered sequentially from S to (s+x);
Wherein s= |_ target StartTime/m_ |indicates that target StartTime/m_ is rounded down, target StartTime is the first allocated STARTTIME, STARTTIME of the DLL framing sublayer burst for indicating the start time of the bandwidth allocation slot, X is the number of data blocks minus one,
M is a value preset for an uplink data transmission rate, where m=4 for 1.25G uplink and m=2 for 2.5G uplink;
the superframe counter includes an intra-frame counter and an inter-frame counter, wherein the value of the intra-frame counter includes all FEC check bytes.
2. The traffic encryption method according to claim 1, wherein determining to use a new Key or a new encryption algorithm from a designated frame based on a target value of a superframe counter or Key Index, comprises:
When the passive optical network system is a GPON asymmetric system or a GPON symmetric system, a new key or a new encryption algorithm is used from a designated frame according to the target value of the superframe counter;
in the case where the passive optical network system is an XGPON or XGSPON system, a new Key or a new encryption algorithm is used from a designated frame according to a change in Key Index.
3. The traffic encryption method according to claim 1, wherein the step of performing key synchronization with the ONU according to the dynamically switched encryption algorithm includes:
According to the encryption algorithm after the dynamic switching, the ONU is instructed to generate a new key;
after receiving a new key reported by the ONU, designating key switching time when the new key starts to take effect, and notifying the ONU of the key switching time;
After receiving the response of the ONU fed back to the received key switching time, setting the new key into a register of the currently used key at the key switching time.
4. A traffic encryption method according to claim 3, characterized in that the method further comprises:
instructing the ONU to generate a new Key by sending a Key Request message, a request_Key message;
And notifying the ONU of the Key Switching Time by sending a Key Switching Time message Key_switching_Time message.
5. The traffic encryption method according to claim 4, wherein in case that the passive optical network system is a GPON asymmetric system or a GPON symmetric system, the target value of the super frame counter is transmitted to the ONU by means of a PLOAM message, wherein the step of transmitting the target value of the super frame counter to the ONU comprises:
And sending an encrypted_Port_ID message to the ONU, wherein the encrypted_Port_ID message carries the target value of the superframe counter.
6. The traffic encryption method according to any one of claims 1 to 5, wherein the encryption enabling information carries an encryption enabling identifier by:
Carrying an encryption enabling identifier by a specified bit of a PTI field in the encryption enabling information, wherein the specified bit value is a first specified value and indicates that encryption is not started, the specified bit value is a second specified value and indicates that only upstream encryption is started, the specified bit value is a third specified value and indicates that only downstream encryption is started, and the specified bit value is a fourth specified value and indicates that upstream encryption and downstream encryption are started.
7. The traffic encryption method according to claim 1, wherein said OLT and all said ONUs use said super-frame counter synchronized, said super-frame counter including an intra-frame counter and an inter-frame counter, said super-frame counter having a width of 46 bits, wherein a lower 16 bits is said intra-frame counter and an upper 30 bits is said inter-frame counter, said intra-frame counter being set to 0 at an upstream frame start for said upstream encryption, and incremented every 4 bytes, said inter-frame counter being included in a GTC HEADER field of a downstream GTC frame, said GTC HEADER field specifying an upstream GTC burst for transmitting an upstream GEM frame.
8. A service encryption method of a passive optical network system, the service encryption method being applied to an optical network unit ONU, comprising:
receiving encryption enabling information sent by an Optical Line Terminal (OLT), wherein the encryption enabling information is used for indicating whether encryption is not started, only uplink encryption is started, only downlink encryption is started or uplink and downlink encryption is started currently;
After enabling to start up-down encryption or starting up-down encryption, dynamically switching an encryption algorithm adopted by the OLT and the ONU currently in negotiation through an OMCI entity ONU 2-G;
according to the encryption algorithm after the dynamic switching, key synchronization is carried out between the encryption algorithm and the OLT;
After the Key synchronization, receiving a target value or Key Index of a superframe counter sent by the OLT, and determining to use a new Key or a new encryption algorithm from a designated frame according to the target value or Key Index of the superframe counter;
Wherein, when the passive optical network system is a GPON asymmetric system or a GPON symmetric system, in an upstream direction, a burst of a GTC framing sub-layer is divided into a plurality of data blocks of 4 bytes, and each data block is numbered sequentially from S to (s+x);
Wherein s= |_ target StartTime/m_ |indicates that target StartTime/m_ is rounded down, target StartTime is the first allocated STARTTIME, STARTTIME of the DLL framing sublayer burst for indicating the start time of the bandwidth allocation slot, X is the number of data blocks minus one,
M is a value preset for an uplink data transmission rate, where m=4 for 1.25G uplink and m=2 for 2.5G uplink;
the superframe counter includes an intra-frame counter and an inter-frame counter, wherein the value of the intra-frame counter includes all FEC check bytes.
9. A traffic encryption method of a passive optical network system, the traffic encryption method being applied to FTTR main equipment MFU, comprising:
Transmitting encryption enabling information to FTTR slave equipment SFU, wherein the encryption enabling information is used for indicating whether encryption is not started, only uplink encryption is started, only downlink encryption is started or uplink and downlink encryption is started currently;
after enabling to start up and down encryption or starting up encryption, dynamically switching an encryption algorithm adopted by the MFU and the SFU in current negotiation through an OMCI entity ONU 2-G;
according to the encryption algorithm after dynamic switching, key synchronization is carried out between the SFU and the encryption algorithm after dynamic switching;
After the Key synchronization, determining to use a new Key or a new encryption algorithm from a designated frame according to a target value or a Key Index of a superframe counter, and transmitting the target value or the Key Index of the superframe counter to the SFU;
Wherein, when the passive optical network system is a GPON asymmetric system or a GPON symmetric system, in an upstream direction, a burst of a GTC framing sub-layer is divided into a plurality of data blocks of 4 bytes, and each data block is numbered sequentially from S to (s+x);
Wherein s= |_ target StartTime/m_ |indicates that target StartTime/m_ is rounded down, target StartTime is the first allocated STARTTIME, STARTTIME of the DLL framing sublayer burst for indicating the start time of the bandwidth allocation slot, X is the number of data blocks minus one,
M is a value preset for an uplink data transmission rate, where m=4 for 1.25G uplink and m=2 for 2.5G uplink;
the superframe counter includes an intra-frame counter and an inter-frame counter, wherein the value of the intra-frame counter includes all FEC check bytes.
10. A service encryption method of a passive optical network system, the service encryption method being applied to FTTR slave devices SFU, comprising:
receiving FTTR encryption enabling information sent by a main device MFU, wherein the encryption enabling information is used for indicating that encryption is not started, only uplink encryption is started, only downlink encryption is started or uplink and downlink encryption is started currently;
after enabling to start up and down encryption or starting up encryption, dynamically switching an encryption algorithm adopted by the MFU and the SFU in current negotiation through an OMCI entity ONU 2-G;
According to the encryption algorithm after dynamic switching, key synchronization is carried out between the MFU and the MFU;
After the Key synchronization, receiving a target value or Key Index of a superframe counter sent by the MFU, and determining to use a new Key or a new encryption algorithm from a designated frame according to the target value or Key Index of the superframe counter;
Wherein, when the passive optical network system is a GPON asymmetric system or a GPON symmetric system, in an upstream direction, a burst of a GTC framing sub-layer is divided into a plurality of data blocks of 4 bytes, and each data block is numbered sequentially from S to (s+x);
Wherein s= |_ target StartTime/m_ |indicates that target StartTime/m_ is rounded down, target StartTime is the first allocated STARTTIME, STARTTIME of the DLL framing sublayer burst for indicating the start time of the bandwidth allocation slot, X is the number of data blocks minus one,
M is a value preset for an uplink data transmission rate, where m=4 for 1.25G uplink and m=2 for 2.5G uplink;
the superframe counter includes an intra-frame counter and an inter-frame counter, wherein the value of the intra-frame counter includes all FEC check bytes.
11. An electronic device, comprising: memory, a processor and a traffic encryption program of a passive optical network system stored on the memory and operable on the processor, which when executed by the processor, implements the traffic encryption method of a passive optical network system according to any one of claims 1 to 10.
12. A storage medium, characterized in that the storage medium is a computer-readable storage medium, on which a traffic encryption program of a passive optical network system is stored, which, when executed by a processor, implements the traffic encryption method of a passive optical network system according to any one of claims 1 to 10.
CN202410063582.1A 2024-01-17 2024-01-17 Service encryption method of passive optical network system, electronic equipment and storage medium Active CN117579182B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202410063582.1A CN117579182B (en) 2024-01-17 2024-01-17 Service encryption method of passive optical network system, electronic equipment and storage medium
PCT/CN2025/071772 WO2025152864A1 (en) 2024-01-17 2025-01-10 Service encryption method for passive optical network system, and electronic device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410063582.1A CN117579182B (en) 2024-01-17 2024-01-17 Service encryption method of passive optical network system, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN117579182A CN117579182A (en) 2024-02-20
CN117579182B true CN117579182B (en) 2024-05-03

Family

ID=89895953

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410063582.1A Active CN117579182B (en) 2024-01-17 2024-01-17 Service encryption method of passive optical network system, electronic equipment and storage medium

Country Status (2)

Country Link
CN (1) CN117579182B (en)
WO (1) WO2025152864A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117579182B (en) * 2024-01-17 2024-05-03 中兴通讯股份有限公司 Service encryption method of passive optical network system, electronic equipment and storage medium
CN119094127B (en) * 2024-09-30 2025-07-15 烽火通信科技股份有限公司 Encryption algorithm dynamic negotiation method, device, equipment and readable storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101064719A (en) * 2006-04-27 2007-10-31 华为技术有限公司 Cryptographic algorithm negotiating method in PON system
CN101197663A (en) * 2008-01-03 2008-06-11 中兴通讯股份有限公司 Protection method for Gigabit passive optical network encryption service
CN102104478A (en) * 2009-12-16 2011-06-22 中兴通讯股份有限公司 Method and device for improving safety of EPON system
CN102148682A (en) * 2010-02-08 2011-08-10 中兴通讯股份有限公司 Method and system for accurately positioning ONU (Optical Network Unit) with exceptional luminescence
CN103138918A (en) * 2011-11-28 2013-06-05 中兴通讯股份有限公司 Method, device and system of avoiding gigabit passive optical network (GPON) system encryption enabling instant packet loss
CN103516515A (en) * 2012-06-28 2014-01-15 中兴通讯股份有限公司 Encryption/decryption seamless switch achieving method, OLT and ONU in GPON system
CN117318812A (en) * 2022-06-22 2023-12-29 华为技术有限公司 A data transmission method and device

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7591012B2 (en) * 2004-03-02 2009-09-15 Microsoft Corporation Dynamic negotiation of encryption protocols
CN117579182B (en) * 2024-01-17 2024-05-03 中兴通讯股份有限公司 Service encryption method of passive optical network system, electronic equipment and storage medium

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101064719A (en) * 2006-04-27 2007-10-31 华为技术有限公司 Cryptographic algorithm negotiating method in PON system
CN101197663A (en) * 2008-01-03 2008-06-11 中兴通讯股份有限公司 Protection method for Gigabit passive optical network encryption service
CN102104478A (en) * 2009-12-16 2011-06-22 中兴通讯股份有限公司 Method and device for improving safety of EPON system
CN102148682A (en) * 2010-02-08 2011-08-10 中兴通讯股份有限公司 Method and system for accurately positioning ONU (Optical Network Unit) with exceptional luminescence
CN103138918A (en) * 2011-11-28 2013-06-05 中兴通讯股份有限公司 Method, device and system of avoiding gigabit passive optical network (GPON) system encryption enabling instant packet loss
CN103516515A (en) * 2012-06-28 2014-01-15 中兴通讯股份有限公司 Encryption/decryption seamless switch achieving method, OLT and ONU in GPON system
CN117318812A (en) * 2022-06-22 2023-12-29 华为技术有限公司 A data transmission method and device

Also Published As

Publication number Publication date
WO2025152864A1 (en) 2025-07-24
CN117579182A (en) 2024-02-20

Similar Documents

Publication Publication Date Title
CN102037663B (en) Method and device for data security in passive optical network
US10484098B2 (en) Channel bonding in passive optical networks
US20220271839A1 (en) Passive optical network (pon) channel bonding protocol
CN117579182B (en) Service encryption method of passive optical network system, electronic equipment and storage medium
JP4169595B2 (en) Point-to-multipoint passive optical network using variable-length packets
CN103430572B (en) Wavelength indication in multiple-wavelength passive optical networks
US8718087B1 (en) Processing architecture for passive optical network
EP3654554B1 (en) Framing method and apparatus in passive optical network and system
US20020110245A1 (en) Method and system for synchronizing security keys in a point-to-multipoint passive optical network
US9178713B1 (en) Optical line termination in a passive optical network
US8457494B2 (en) PON multicast communication system, multicast management method, and corresponding devices
US20130315594A1 (en) Method, system, and device for transmittng optical network terminal management and control interface message
JPWO2007135858A1 (en) Optical communication system, station side device, and subscriber side device
JPWO2005112336A1 (en) PON system with encryption function and encryption method for PON system
WO2020015338A1 (en) Method and system for negotiating encryption algorithm in passive optical network system
US11902718B2 (en) Service data transmission method, related device, and digital processing chip
EP4322546B1 (en) Data frame fragmentation method, data frame parsing method and related device
CN101102152B (en) Method for guaranteeing data security in passive optical network
KR100789383B1 (en) Frame transmission device and method in optical fiber termination device of high speed passive optical subscriber network
RU2809182C1 (en) Service data transmission method, corresponding device and digital processing chip
Hongwu et al. Researching the EPON technology in the intelligent communication network
HK1155862B (en) Method and apparatus for data privacy in passive optical networks
HK1155862A (en) Method and apparatus for data privacy in passive optical networks

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant