throbber
(19) United States
`(12) Patent Application Publication (10) Pub. No.: US 2002/0110245 A1
`(43) Pub. Date:
`Aug. 15, 2002
`Gruia
`
`US 2002O110245A1
`
`(54)
`
`(76)
`
`(21)
`(22)
`
`METHOD AND SYSTEM FOR
`SYNCHRONIZING SECURITY KEYS INA
`POINT-TO-MULTIPOINT PASSIVE OPTICAL
`NETWORK
`
`Inventor: Dumitru Gruia, San Ramon, CA (US)
`Correspondence Address:
`Mark A. Wilson
`Wilson & Ham
`PMB: 348
`2530 Berryessa Road
`San Jose, CA 95132 (US)
`Appl. No.:
`09/783,239
`
`Filed:
`
`Feb. 13, 2001
`
`Publication Classification
`
`(51)
`
`Int. Cl. ............................ H04L 9/00; H04K 1/00
`
`(52) U.S. Cl. ............................................ 380/278; 380/274
`
`(57)
`
`ABSTRACT
`
`Security key Synchronization is maintained between nodes
`in an optical communications System utilizing out-of-band
`Signaling to indicate that a new key is being used to encrypt
`Subsequent information blocks at the transmitting point and
`that the new key should be used to decrypt Subsequent
`information blocks at the receiving point. A Switch-to-new
`key code can be Selected from a group of unused codes in an
`eight bit to ten bit encoding Scheme. The Switch-to-new-key
`code can replace an idle code that is used to create Sufficient
`spacing between information blockS. Receipt of the Switch
`to-new-key code indicates that the new key is being used to
`encrypt Subsequent information blocks at the transmitting
`point and triggers a Switch to the new key for decrypting
`Subsequent information blocks at the receiving point.
`
`OLT
`
`608
`
`—n nEZnHill -
`New Key - Til
`Irzai in
`616
`%
`
`610
`
`ONU
`
`New Key
`Request
`
`fb
`"out-of-band"
`Switch-to-new-key
`Code
`
`Comcast, Ex. 1221
`
`1
`
`

`

`Patent Application Publication Aug. 15, 2002 Sheet 1 of 10
`
`US 2002/0110245 A1
`
`
`
`2
`
`

`

`Patent Application Publication Aug. 15, 2002 Sheet 2 of 10
`
`US 2002/0110245 A1
`
`2
`
`O
`
`e 2 A2
`
`rt
`is is
`5
`is
`st
`
`e
`CN
`
`Se
`Cn
`
`sy
`CN
`
`N
`Cn
`
`s
`
`3
`
`

`

`Patent Application Publication Aug. 15, 2002 Sheet 3 of 10
`
`US 2002/0110245 A1
`
`s:
`
`X08 d0L 10S
`
`719
`
`s:
`
`QUOQd3!? L
`
`
`
`4
`
`

`

`Patent Application Publication Aug. 15, 2002 Sheet 4 of 10
`
`US 2002/0110245 A1
`
`
`
`
`
`
`
`
`
`
`
`Optical
`Receiver
`
`
`
`530
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`OLT
`
`402
`
`Packet
`Controller
`Ke fictator
`Encryption
`Controller
`Key
`Synchronization
`Unit
`
`420
`
`422
`
`424
`
`426
`
`FIG. 4
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Optical
`Transmitter
`428
`
`Optical
`Receiver
`
`430
`
`ONU
`
`Packet
`Controller
`
`504
`
`520
`
`Key
`522
`Generator
`Encryption E. 524
`Key
`Synchronization
`Unit
`
`526
`
`
`
`FIG. 5
`
`
`
`
`
`
`
`
`
`5
`
`

`

`Patent Application Publication Aug. 15, 2002 Sheet 5 of 10
`
`US 2002/0110245 A1
`
`OLT
`
`ONU
`
`608
`
`New Key - it
`
`n n Zai-n-Ti. New Key
`Request
`in
`rzari in
`n=n, Finn . "out-of-band"
`Switch-to-new-key
`Code
`
`610
`
`616
`
`FIG. 6
`
`6
`
`

`

`Patent Application Publication Aug. 15, 2002. Sheet 6 of 10
`
`US 2002/0110245 A1
`
`
`
`
`
`RIOS DIRIXOVI. ?zÚ8 GOEILIORITTØTTØTTØROS]]
`
`
`
`
`
`
`
`
`
`JOS||IRIXOVI 5,08 €IRIOGILIZZLIIIIIII|IOS
`
`?776ZZ6
`
`8 "OIH
`
`
`
`
`
`
`
`
`
`
`
`†ZOIZZOI9ZOI OZOIOÇOI ^p00 KQX-MOU-01-?O?AS 6 'OIH
`
`
`
`
`
`ROEDIZI
`
`7
`
`

`

`Patent Application Publication Aug. 15, 2002. Sheet 7 of 10
`
`US 2002/0110245 A1
`
`|| "OIH
`
`
`
`
`
`8
`
`

`

`Patent Application Publication Aug. 15, 2002. Sheet 8 of 10
`
`US 2002/0110245 A1
`
`
`
`
`
`ÁQX QQA?d AQUÍ
`
`
`
`310au35 01 |Sºnbº?-???????????????????????????
`
`
`
`?ÇZI |Sºnbº?
`
`
`
`
`
`Áo), upanSdn MôN-???????????????????????????????
`
`Z#ZI ÁÐX MON
`
`#777
`
`
`
`O?zI ÁÐX MON
`
`—??????????????????M0N
`
`
`
`
`
`[]NO3âub?oxq Áox ubansdnJTO
`
`
`
`WZI "OIHÁÐH
`
`0??ººds-ûNO
`
`9
`
`

`

`Patent Application Publication Aug. 15, 2002. Sheet 9 of 10
`
`US 2002/0110245 A1
`
`
`
`{{ ?0IS QU?I,W 101S QU'IL
`
`
`
`
`
`
`
`OZI "OIH
`
`
`
`10
`
`

`

`Patent Application Publication Aug. 15, 2002. Sheet 10 of 10
`
`US 2002/0110245 A1
`
`Distribute a new key between a first node and a second node
`
`Signal, to one of the first and Second nodes, a Switch to a new key with a
`Switch-to-new-key code that is not part of a header or a payload of any
`information blocks that are transmitted between the first and second nodes
`FIG. 13
`1304
`
`Generate a new key at either a Source node or a destination node
`1402
`
`Transmit the new key from the node where the new key was
`generated to the other of the Source and destination nodes
`
`
`
`Generate a Switch-to-new-key code that is not part of the
`header or the payload of any information blocks that are
`transmitted from the Source node to the destination node
`
`1404
`
`1406
`
`Transmit the Switch-to-new-key code from the SOurce node
`to the destination node
`
`1408
`Encrypt, with the new key, the payload of the information blocks that are
`transmitted from the Source node after the Switch-to-new-key code is transmitted
`1410
`Decrypt, with the new key, the payload of the information blocks that are
`received at the destination node after the Switch-to-new-key code is received
`FIG. 14
`1412
`
`11
`
`

`

`US 2002/0110245 A1
`
`Aug. 15, 2002
`
`METHOD AND SYSTEM FOR SYNCHRONIZING
`SECURITY KEYS IN A POINT-TO-MULTIPOINT
`PASSIVE OPTICAL NETWORK
`
`FIELD OF THE INVENTION
`0001. The invention relates generally to broadband opti
`cal communications networks, and more particularly to
`encryption messaging in point-to-multipoint passive optical
`networks.
`
`BACKGROUND OF THE INVENTION
`0002 The explosion of the Internet and the desire to
`provide multiple communications and entertainment Ser
`vices to end users have created a need for a broadband
`network architecture that improves access to end users. One
`broadband network architecture that improves access to end
`users is a point-to-multipoint passive optical network
`(PON). A point-to-multipoint PON is an optical access
`network architecture that facilitates broadband communica
`tions between an optical line terminal (OLT) and multiple
`remote optical network units (ONUs) over a purely passive
`optical distribution network. A point-to-multipoint PON
`utilizes passive fiber optic Splitters and couplers to passively
`distribute optical signals between the OLT and the remote
`ONUS.
`0003 FIGS. 1A and 1B represent the downstream and
`upstream flow of network traffic between an OLT 102 and
`three ONUs 104 in a point-to-multipoint PON. Although
`only three ONUs are depicted, more than three ONUs may
`be included in a point-to-multipoint PON. Referring to FIG.
`1A, downstream traffic containing ONU-specific informa
`tion blocks is transmitted from the OLT. The downstream
`traffic is optically split by a passive optical Splitter 112 into
`three separate signals that each carries all of the ONU
`specific information blocks. Because all of the ONU-specific
`information blocks are transmitted to each ONU, it is
`possible for each ONU to read information blocks that are
`intended for the other ONUs. In order to prevent ONU
`Specific information blocks from being read by the wrong
`ONUs, the information blocks intended for each ONU are
`encrypted and decrypted with encryption/decryption keys
`that are specific to each ONU. For example, information
`blocks intended for ONU-1 are encrypted and decrypted
`with a key that is specific to ONU-1, information blocks
`intended for ONU-2 are encrypted and decrypted with a key
`that is specific to ONU-2, and information blocks intended
`for ONU-3 are encrypted and decrypted with a key that is
`specific to ONU-3. Although ONU-1 receives encrypted
`information blockS 1, 2, and 3, it can only decrypt informa
`tion block 1 with its ONU-specific key. Likewise, ONU-2
`can only decrypt information block 2 and ONU-3 can only
`decrypt information block 3.
`0004 Although encrypting and decrypting downstream
`information blocks with ONU-specific keys works well to
`create Secure downstream connections between the OLT and
`each ONU, the longer the same key is used to encrypt and
`decrypt a stream of information blocks, the easier it is for an
`intruder to figure out the key and decrypt the encrypted
`information blocks. One technique for improving a Secure
`downstream connection between an OLT and an ONU
`involves continuously changing the key used between the
`OLT and the ONU for encryption and decryption. While
`
`continuously changing the key used between an OLT and an
`ONU improves security, the OLT and the ONU must be
`continuously Synchronized So that they are always using the
`Same key to encrypt and decrypt the same information
`blocks. If the OLT and the ONUs are not using the same keys
`to encrypt and decrypt the same information blocks, then the
`ONU will not be able to decrypt the encrypted downstream
`information blocks.
`0005. In an ATM based point-to-multipoint PON as
`described in the Full Service Access Network (FSAN)
`specification 983.1 developed through the International
`Telecommunications Union (ITU), Security messages are
`exchanged between the OLT and the ONUs in 53 byte ATM
`cells that are dedicated to carrying operations and mainte
`nance (OAM) information (OAM cells). According to the
`FSAN specifications and as depicted in FIG. 2, a key
`request 208 is sent in an OAM cell from the OLT to an ONU.
`In response to the key request, the ONU sends a new key 210
`to the OLT in another OAM cell. Once the key has been sent
`to the OLT, the OLT sends a key synchronization signal 212
`(in an OAM cell), which causes the ONU to switch to the
`new key for decrypting Subsequent downstream cells. The
`ONU sends an acknowledge signal 214 to the OLT in an
`OAM cell to acknowledge that the key switch has been
`made. The process of passing a key and Synchronizing the
`key Switch is repeated for each ONU that is connected to the
`OLT.
`0006 Although the Security messaging technique speci
`fied in the FSAN specification works well, the security
`messaging transmissions consume bandwidth that could be
`used for other data transmissions. While the amount of
`bandwidth consumed by Security messaging may be Small
`for a single exchange between an OLT and an ONU, the
`amount of bandwidth consumed by Security messaging
`increases directly with the number of ONUs in the point
`to-multipoint PON and with the rate of key changing.
`0007. In view of the bandwidth consumed by security
`messaging, what is needed is a Security messaging System
`that consumes less bandwidth.
`
`SUMMARY OF THE INVENTION
`0008. A method and system for maintaining security key
`Synchronization between nodes in a communications System
`involves utilizing out-of-band Signaling to indicate that a
`new key is being used to encrypt Subsequent information
`blocks at the transmitting point and that the new key should
`be used to decrypt Subsequent information blocks at the
`receiving point. In an embodiment, a Switch-to-new-key
`code is Selected from a group of unused codes in an eight bit
`to ten bit encoding Scheme. The Switch-to-new-key code
`replaces an idle code that is used to create Sufficient spacing
`between information blocks. Receipt of the Switch-to-new
`key code indicates that the new key is being used to encrypt
`Subsequent information blocks at the transmitting point and
`triggers a Switch to the new key for decrypting Subsequent
`information blocks at the receiving point.
`0009 Amethod for maintaining synchronization between
`a key used by a first node to encrypt information and a key
`used by a Second node to decrypt information includes
`distributing a new key between a first node and a Second
`node, Signaling, to one of the first and Second nodes, a Switch
`to the new key with a Switch-to-new-key code that is not part
`
`12
`
`

`

`US 2002/0110245 A1
`
`Aug. 15, 2002
`
`of the header or the payload of any of the information blocks
`that are being transmitted between the first and Second
`nodes.
`0010. In an embodiment of the method, the first node is
`an optical line terminal (OLT) of a point-to-multipoint
`optical communications network and the Second node is one
`of multiple optical network units (ONUs) in the point-to
`multipoint optical communications network. A further
`embodiment of the method includes a step of broadcasting
`the Switch-to-new-key code to all of the multiple ONUs. A
`further embodiment of the method includes a step of Switch
`ing to new keys at the ONUs in response to the broadcast of
`the Switch-to-new-key code. In an embodiment, information
`is formatted according to the IEEE 802.3 protocol. In an
`embodiment, an unused ten bit code in an eight bit to ten bit
`encoding Scheme is used to generate the Switch-to-new-key
`code. In an embodiment, an idle code between two packets
`is replaced with the Switch-to-new-key code.
`0.011) A system for maintaining synchronization between
`a key used by a first node to encrypt information and a key
`used by a Second node to decrypt information includes an
`OLT and a group of ONUs. The OLT includes an encryption
`controller and a key Synchronization unit. The encryption
`controller encrypts information within information blockS
`using ONU-Specific keys. The key Synchronization unit
`generates a Switch-to-new-key code that is not part of a
`header or a payload of any information blocks that are
`transmitted from the OLT to the group of ONUs and causes
`the OLT encryption controller to use new ONU-specific keys
`to encrypt information within information blocks that are
`transmitted after the Switch-to-new-key code is transmitted
`to the group of ONUs. Each of the ONUs includes a key
`generator, an ONU encryption controller, and a key Syn
`chronization unit. The key generator generates a new ONU
`specific key that is transmitted to the OLT. The ONU
`encryption controller decrypts information within informa
`tion blocks using an ONU-Specific key and the key Synchro
`nization unit identifies the Switch-to-new-code that is trans
`mitted from the OLT and causes the ONU encryption
`controller to use the new ONU-specific key to decrypt
`information within the information blocks after the Switch
`to-new-key code is received from the OLT.
`0012. Other aspects and advantages of the present inven
`tion will become apparent from the following detailed
`description, taken in conjunction with the accompanying
`drawings, illustrating by way of example the principles of
`the invention.
`BRIEF DESCRIPTION OF THE DRAWINGS
`0013 FIG. 1A depicts the downstream flow of traffic
`from an OLT to multiple ONUs in a point-to-multipoint
`PON.
`0014 FIG. 1B depicts the upstream flow of traffic from
`multiple ONUs to an OLT in a point-to-multipoint PON.
`0.015 FIG.2 depicts the security messaging protocol that
`is defined by the FSAN specification in accordance with the
`prior art.
`0016 FIG. 3 depicts a point-to-multipoint PON with a
`tree topology.
`0017 FIG. 4 depicts functional blocks of an OLT that is
`used to carry out Security messaging, in accordance with an
`embodiment of the invention.
`
`0018 FIG.5 depicts functional blocks of an ONU that is
`used to carry out Security messaging, in accordance with an
`embodiment of the invention.
`0019 FIG. 6 depicts a security messaging technique that
`utilizes out-of-band Signaling to maintain Synchronization
`between keys used to encrypt and decrypt information in
`accordance with an embodiment of the invention.
`0020 FIG. 7 depicts six consecutive idle codes that
`separate packets as required by the 1000BASE-X specifi
`cation of the IEEE 802.3 protocol.
`0021
`FIG. 8 depicts a Switch-to-new-key code that has
`been inserted between two packets in the place of an idle
`code in accordance with an embodiment of the invention.
`0022 FIG. 9 depicts multiple switch-to-new-key codes
`that have been inserted between two packets in the place of
`idle codes in accordance with an embodiment of the inven
`tion.
`0023 FIG. 10 depicts Switch-to-new-key codes that have
`been inserted in the place of idle codes in at least two
`different idle Spaces between packets in accordance with an
`embodiment of the invention.
`0024 FIG. 11 depicts a Switch-to-new-key code that is
`inserted at the beginning of an upstream time slot in accor
`dance with an embodiment of the invention.
`0025 FIGS. 12A-12C depict an embodiment of an
`encryption messaging technique for two-way encryption
`that utilizes out-of-band signaling for key Synchronization.
`0026 FIG. 13 is a process flow diagram of a method for
`maintaining Security key Synchronization in accordance
`with an embodiment of the invention.
`0027 FIG. 14 is a process flow diagram of a method for
`maintaining Security key Synchronization in accordance
`with another embodiment of the invention.
`
`DETAILED DESCRIPTION OF THE
`INVENTION
`0028. A method and system for maintaining security key
`Synchronization between nodes in a communications System
`involves utilizing out-of-band Signaling to indicate that a
`new key is being used to encrypt Subsequent information
`blocks at the transmitting point and that the new key should
`be used to decrypt Subsequent information blocks at the
`receiving point. In an embodiment, a Switch-to-new-key
`code is Selected from a group of unused codes in an eight bit
`to ten bit encoding Scheme. The Switch-to-new-key code
`replaces an idle code that is used to create Sufficient spacing
`between information blocks.
`0029 Receipt of the Switch-to-new-key code indicates
`that the new key is being used to encrypt Subsequent
`information blocks at the transmitting point and triggerS a
`Switch to the new key for decrypting Subsequent information
`blocks at the receiving point.
`0030 FIG. 3 depicts an example point-to-multipoint
`PON 300. The point-to-multipoint PON includes an OLT
`302 and multiple ONUs 304 that are connected by a passive
`optical distribution network. In an embodiment, the OLT is
`connected to a service station 310 Such as a Central Office
`and/or a head-end Station. Services provided at the Service
`
`13
`
`

`

`US 2002/0110245 A1
`
`Aug. 15, 2002
`
`Station may include data network access, voice network
`access, and/or video network access. Example connection
`protocols utilized between the service station and the OLT
`may include OC-X, Ethernet, E1/T1, DS3, and broadband
`video. In an embodiment, the ONUs are connected to an end
`user System or Systems 214, which may include a local area
`network, personal computers, a PBX, telephones, Set-top
`boxes, and/or televisions. Example connection protocols
`utilized between the end user systems and the ONUs may
`include 10/100 Mb/s Ethernet, T1, and plain old telephone
`service (POTS).
`0031. The passive optical distribution network shown in
`FIG. 3 has a tree topology that includes a common optical
`fiber 310 (trunk fiber) and multiple different fibers 316 that
`are connected by a passive optical Splitter/coupler 312 to the
`trunk fiber. An optical Signal transmitted in the downstream
`direction (from the OLT 302 to the ONUs 304) is optically
`Split into multiple ONU-specific optical Signals that all carry
`the Same information. Because of the broadcast nature of
`downstream transmissions in a point-to-multipoint PON, all
`of the ONUs always receive the same information from the
`OLT. Although all of the ONUs receive the same informa
`tion from the OLT, the actual receipt time of the Signals may
`vary slightly from ONU to ONU because of differences in
`travel distances.
`0.032
`Optical signals transmitted in the upstream direc
`tion (from the ONUs to the OLT) are optically coupled into
`the trunk fiber that is connected between the coupler and the
`OLT. The coupler is a directional coupler that passes
`upstream transmissions from the ONUs to the OLT and does
`not allow upstream transmissions to be received by any
`other ONUs. Time division multiplexing is utilized in the
`upstream direction to prevent collisions of upstream trans
`missions from two or more ONUs.
`0033. In the embodiment of FIG. 3, an optical signal in
`the downstream direction is transmitted at a different wave
`length (or frequency) than an optical signal in the upstream
`direction. In an embodiment, downstream traffic is transmit
`ted in the 1550 nm wavelength band and upstream traffic is
`transmitted in the 1310 nm wavelength band. Utilizing
`different wavelengths in the upstream and downstream
`directions allows a Single optical fiber to Simultaneously
`carry downstream and upstream traffic without interfering
`collisions. In an alternative embodiment, Separate down
`Stream and upstream fiberS may be utilized for the passive
`optical distribution network. In addition, wavelength divi
`sion multiplexing (WDM), multi-state modulation beyond
`the binary State, or other techniques may be used in the
`downstream and/or upstream directions to increase trans
`mission bandwidth.
`0034. Although the passive optical distribution network
`of FIG.3 has a tree topology, alternative network topologies
`are possible. Alternative network topologies include a bus
`topology and a ring topology. In addition, although the
`distribution network of FIG. 3 depicts only single fiber
`connections between network components, redundant fibers
`may be added between network components to provide fault
`protection.
`0035 FIG. 4 is an expanded view of an example OLT
`402 in the point-to-multipoint PON 300 of FIG. 3. Func
`tional units included within the OLT that are used to carry
`out Security messaging are a packet controller 420, a key
`
`generator 422, an encryption controller 424, a key Synchro
`nization unit 426, an optical transmitter 428, and an optical
`receiver 430. The OLT may also include other well known
`functional units that are not depicted. The packet controller
`receives downstream digital data from a Service Station and
`formats the downstream digital data into information blockS
`referred to as packets. The packet controller may be embod
`ied in hardware and/or Software and is Sometimes referred to
`as the media access control (MAC) unit. In an embodiment,
`each packet includes a fixed-length header at the front of the
`packet, a variable-length payload after the header, and a
`fixed-length error detection field (such as a frame check
`sequence (FCS) field) at the end of the packet. In an
`embodiment, the downstream packets are formatted accord
`ing to the IEEE 802.3 standard (commonly referred to as
`Ethernet) or any of the related IEEE 802.3x sub-standards.
`In an embodiment, the downstream packets are transmitted
`over optical fiber at a rate of 1 gigabit per Second (Gb/s) as
`defined by IEEE 802.3Z (commonly referred to as gigabit
`Ethernet) using the 1000BASE-X specification. Lower or
`higher transmission rates may be utilized in other embodi
`mentS.
`0036) The key generator 422 is a functional unit that
`generates new keys for encryption and decryption. Typi
`cally, the key generator uses a random number generator to
`generate new keys. The encryption controller 424 is a
`functional unit that encrypts and decrypts the information
`within packets. In an embodiment, only the payload portions
`of packets are encrypted and decrypted although in other
`embodiments entire packets are encrypted and decrypted.
`When entire packets are encrypted, all of the received
`packets are decrypted and checked to see if they are valid
`packets that are intended for the respective ONU. In a
`System that implements only downstream encryption, the
`encryption controller of the OLT only performs encryption.
`In a System that implements downstream and upstream
`encryption, the encryption controller of the OLT performs
`both downstream encryption and upstream decryption. The
`key Synchronization 426 unit is a functional unit that main
`tains Synchronization between the keys that are used to
`encrypt information within packets and the keys that are
`used to decrypt information within packets. Example
`embodiments of the key Synchronization proceSS are
`described below with reference to FIGS. 6-13.
`0037. The optical transmitter 428 and the optical receiver
`430 provide the interface between optical and electrical
`Signals. Optical transmitters and receivers are well known in
`the field of point-to-multipoint PONs and are not described
`in further detail. FIG. 5 is an expanded view of an example
`ONU 504 in the point-to-multipoint PON 300 of FIG. 3.
`Functional units included within the ONUs that are used to
`carry out Security messaging are a packet controller 520, a
`key generator 522, an encryption controller 524, a key
`synchronization unit 526, an optical transmitter 528, and an
`optical receiver 530. The ONUs may also include other well
`known functional units that are not depicted. The packet
`controller receives upstream digital data from end user
`Systems and formats the upstream digital data into informa
`tion blocks referred to as packets, with each packet including
`a header, a payload, and an error detection field as described
`above with reference to the downstream traffic. The packet
`controller is embodied in hardware and/or Software and is
`Sometimes referred to as the MAC unit. As with the down
`Stream traffic, in an embodiment, the upstream packets are
`
`14
`
`

`

`US 2002/0110245 A1
`
`Aug. 15, 2002
`
`formatted according to the IEEE 802.3 standard and trans
`mitted at a rate of 1 Gb/s. Although ONU refers to optical
`network unit, ONU may also refer to a functionally equiva
`lent optical node unit.
`0.038. The key generator 522 is a functional unit that
`generates new ONU-specific keys for encryption and
`decryption. Typically, the key generator uses a random
`number generator to generate new ONU-specific keys. The
`encryption controller 524 is a functional unit that encrypts
`and decrypts the information within packets. In an embodi
`ment, only the payload portions of packets are encrypted and
`decrypted. In a System that implements only downstream
`encryption, the encryption controller of the ONU decrypts
`encrypted packets. In a System that implements downstream
`and upstream encryption, the encryption controller performs
`both downstream decryption and upstream encryption. The
`key Synchronization 526 unit is a functional unit that main
`tains Synchronization between the keys that are used to
`encrypt information within packets and the keys that are
`used to decrypt information within packets. Example
`embodiments of the key Synchronization proceSS are
`described below with reference to FIGS. 6-13.
`0039. The optical transmitter 528 and the optical receiver
`530 provide the interface between optical and electrical
`Signals. Optical transmitters and receivers are well known in
`the field of point-to-multipoint PONs and are not described
`in further detail.
`0040 FIG. 6 depicts an embodiment of a method for
`Security messaging in a point-to-multipoint PON that ulti
`lizes “out-of-band' Signaling to maintain Synchronization
`between keys used to encrypt and decrypt information. In
`the embodiment of FIG. 6, a new key request is generated
`by the encryption controller of the OLT for each ONU and
`the new key requests are transmitted from the OLT to the
`ONUs. In an embodiment, the new key requests are carried
`in packets that are addressed to specific ONUS. AS Shown in
`FIG. 6, a new key request 608 is transmitted from the OLT
`in an Ethernet packet having a header and a payload. In
`response to the ONU-Specific key requests, the key genera
`tor of each individual ONU generates a new ONU-specific
`key 610 and the new ONU-specific key is transmitted
`upstream to the OLT. In an embodiment, the new ONU
`Specific keys are transmitted upstream in the payload of
`packets. Referring to FIG. 3, a new ONU-specific key is
`transmitted from each of the ONUs in the point-to-multi
`point PON.
`0041. Once new ONU-specific keys have been passed
`from all of the ONUs to the OLT, the key synchronization
`unit of the OLT initiates a system-wide Switch to the new
`ONU-specific keys. The key synchronization unit of the
`OLT initiates the Switch to the new ONU-specific keys by
`generating and transmitting a Switch-to-new-key code that is
`not part of any of the packets that are being transmitted to
`the ONUs. That is, the Switch-to-new-key code is a special
`code that is transmitted between packets and that does not
`conform to a packet format. Referring to FIG. 6, an example
`Switch to-new-key code 616 is represented as a Signal that is
`transmitted between two packets. Embodiments of the
`Switch-to-new-key code are described below in more detail.
`0042. Once the Switch-to-new-key code is transmitted
`from the OLT, the encryption controller of the OLT encrypts
`Subsequently transmitted ONU-Specific packets using the
`
`new ONU-specific keys that were previously supplied to the
`OLT. Once the Switch-to-new-key code is received by the
`ONUs and identified by the respective key synchronization
`unit, the key Synchronization unit causes the encryption
`controller of the ONU to decrypt subsequent packets with
`the new ONU-specific key. The process of Switching keys is
`continuously repeated to prevent the same key from being
`used for an extended period of time.
`0043. As described above, an embodiment of the system
`and method utilizes gigabit Ethernet over optical fiber. The
`IEEE 802.3 specification for gigabit Ethernet over single
`mode and multimode mode optical fiber is defined in the
`1000BASE-X specification. The 1000BASE-X specification
`uses an eight bit-to-ten bit (8B/10B) encoding scheme in
`which eight bits of data (one byte) are encoded into ten bit
`codes. Among other reasons, the 8B/10B encoding is imple
`mented to ensure Sufficient Signal transitions for clock
`recovery at the receiver. Because eight bits can represent 256
`different data values while ten bits can represent 1,024
`different data values, there are more ten bit codes available
`than there are values to encode. According to the
`1000BASE-X specification, the available code space is
`divided into two groups of codes, the "D' group of codes
`and the “K” group of codes. The "D" group of codes are
`used to encode data bytes and the “K” group of codes (also
`referred to as the special codes) are used to encode special
`control characters. The Special codes are interpreted at the
`physical layer and provide for “out-of-band' Signaling, that
`is signaling that is not part of a packet. In order to ensure
`DC-balance in a bitstream, each byte value and each special
`code is represented by two different ten bit codes. Although
`there are two different ten bit codes designated for each byte
`value and for each special code, there are still many codes
`available that exhibit Sufficient Signal transitions and that
`have not been designated for use as a byte value or a special
`code by IEEE 802.3.
`0044) In addition to the 8B/10 encoding, the 1000BASE
`X Specification requires that each packet in a transmission be
`Separated by a minimum amount of time (96 us) in order to
`allow receivers enough time to recover between packets and
`to prepare to receive the next packet. Referring to FIG. 7,
`the minimum amount of Spacing between packets is created
`using a Series of Special codes referred to as idle codes 720.
`According to the 1000BASE-X specification, an idle code
`can be an idle 1 code (I1) or an idle 2 code (I2). The I1 and
`I2 codes each include two code words (/K28.5/D5.6/ and
`/K28.5/D16.2/, respectively) and the minimum spacing
`between packets of 96 uS is created by inserting at least Six
`consecutive idle codes between packets. In FIG. 7, each
`packet 722 is bordered by start-of packet (SOP) and end
`of-packet (EOP) control signals 724 and 726. The inner
`portion of the packet is defined as an “in-band' signal and
`the SOP, EOP, and idle codes are defined as “out-of-band'
`Signals. Both the in-band and out-of-band Signals are trans
`mitted using the same carrier wavelength.
`0045. In an embodiment of the method and system for
`maintaining key Synchronization, at least one of the unused
`ten bit code words is used to generate the Switch-to-new-key
`code. In an embodiment, the Switch-to-new-key code
`includes two ten bit code words so that the Switch-to-new
`key code has the same bit length as the idle codes. The
`Switch-to-new-key code is inserted in the place of one of the
`Six idle codes to initiate key Switching with an out-of-band
`
`15
`
`

`

`US 2002/0110245 A1
`
`Aug. 15, 2002
`
`Signal. The Switch-to-new-key code indicates that Subse
`quent packets are encrypted using the new key and therefore
`should be decrypted using the new key. FIG. 8 depicts a
`Switch-to-new-key code 830 that has been inserted between
`two packets in the place of an idle code. AS described above,
`the purpose of the idle codes is to provide a minimum
`amount of Spacing between packets. By replacing an idle
`code with a Switch-to-new-key code of equal bit length, the
`minimum spacing between packets is main

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket