Gigabit Ethernet passive optical network for securely transferring data through exchange of encryption key and data encryption method using the same
First Claim
Patent Images
1. A Gigabit Ethernet passive optical network (GE-PON) comprising:
- an optical line terminal (OLT) configured for receiving a public key through a transmission medium, using the public key to encrypt a secret key, transmitting the encrypted secret key, using the encrypted secret key to encrypt data, and transmitting the encrypted data; and
at least one optical network terminal (ONT) configured for transmitting said public key to said OLT;
receiving the transmitted, encrypted secret key;
using a private key to decrypt the received, encrypted secret key; and
using the decrypted secret key to decrypt said encrypted data.
1 Assignment
0 Petitions
Accused Products
Abstract
A Gigabit Ethernet passive optical network (GE-PON) for securely transferring data through exchange of an encryption key comprises an optical line terminal (OLT) for encrypting a secret key using a public key received through a transmission medium, transmitting the encrypted secret key, encrypting data using the encrypted secret key, and transmitting the encrypted data, and at least one optical network terminal (ONT) for transmitting the public key to the OLT, decrypting the encrypted secret key transmitted from the OLT using a private key, and decrypting the data encrypted with the encrypted secret key, transmitted from the OLT, using the decrypted secret key.
37 Citations
25 Claims
-
1. A Gigabit Ethernet passive optical network (GE-PON) comprising:
-
an optical line terminal (OLT) configured for receiving a public key through a transmission medium, using the public key to encrypt a secret key, transmitting the encrypted secret key, using the encrypted secret key to encrypt data, and transmitting the encrypted data; and
at least one optical network terminal (ONT) configured for transmitting said public key to said OLT;
receiving the transmitted, encrypted secret key;
using a private key to decrypt the received, encrypted secret key; and
using the decrypted secret key to decrypt said encrypted data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A data encryption method for securely transmitting and receiving data between an OLT and at least one ONT in a GE-PON structure, comprising the steps of:
-
a) said ONT transmitting a public key to said OLT;
b) said OLT receiving said public key, using the received public key to encrypt a secret key, and transmitting the encrypted secret key to said ONT;
c) said ONT using a private key to decrypt said encrypted secret key transmitted from said OLT;
d) said OLT using said secret key to be encrypted to encrypt the data and transmitting the encrypted data to said ONT; and
e) said ONT using the decrypted secret key to decrypt said encrypted data. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. A data encryption method for securely transmitting and receiving data between an OLT and at least one ONT in a GE-PON structure, comprising the steps of:
-
a) upon being powered on and driven, said OLT transmitting to all ONTs connected with the OLT a gate signal via a transmission medium to discover the ONTs;
b) said at least one ONT transmitting to said OLT in response to said gate signal a registration request signal and a public key;
c) said OLT, in response to receipt of the transmitted registration request signal, registering said ONT, allocating to said ONT an LLID (Logical Link IDentification) and transmitting to said ONT information about the allocated LLID;
d) said OLT using said public key to encrypt a secret key and transmitting the encrypted secret key to said ONT;
e) said ONT using a private key to decrypt said the transmitted encrypted secret key;
f) said OLT and ONT confirming their sharing of said public key and of said secret key and then allocating a data transmission bandwidth from said OLT to said ONT;
g) said OLT using said secret key to encrypt the data and transmitting the encrypted data to said ONT; and
h) said ONT using the decrypted secret key to decrypt said the transmitted encrypted data.
-
Specification