WO2008122182A1 - A data transmission method and terminals - Google Patents

A data transmission method and terminals Download PDF

Info

Publication number
WO2008122182A1
WO2008122182A1 PCT/CN2007/071307 CN2007071307W WO2008122182A1 WO 2008122182 A1 WO2008122182 A1 WO 2008122182A1 CN 2007071307 W CN2007071307 W CN 2007071307W WO 2008122182 A1 WO2008122182 A1 WO 2008122182A1
Authority
WO
WIPO (PCT)
Prior art keywords
scrambling code
downlink
uplink
data
cnu
Prior art date
Application number
PCT/CN2007/071307
Other languages
English (en)
French (fr)
Inventor
Yang Yu
Original Assignee
Hangzhou H3C Technologies Co., Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou H3C Technologies Co., Ltd. filed Critical Hangzhou H3C Technologies Co., Ltd.
Priority to US12/524,899 priority Critical patent/US8311217B2/en
Publication of WO2008122182A1 publication Critical patent/WO2008122182A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]

Definitions

  • the present invention relates to Ethernet communication technologies, and in particular, to a data transmission method and terminal. Background of the invention
  • Ethernet Pssive Coaxiable Network (EPCN) technology uses Ethernet as the carrier, adopts point-to-multipoint structure and passive coaxial cable transmission, and uplinks transmit data streams in burst Ethernet packets.
  • FIG. 1 is a schematic diagram of networking of an EPCN system.
  • the EPCN system mainly includes a Coaxial-cable Line Terminal (CLT), a splitter/divider, and a Coaxial-Cable Network Unit (CNU).
  • the EPCN system connects various Ethernet devices other than the EPCN system through the CLT and connects the user devices through the CNU.
  • the EPCN system can be used in a variety of business environments. Currently, the most common use is Ethernet broadband in the building.
  • the basic process of data transmission is: In the downstream direction, the CLT sends data to a splitter/distributor that connects different users, and the data is sent to the CNU of each user through a splitter/distributor that connects different users; In the upstream direction, each CNU sends its own data to a splitter/distributor connected to a different user at a certain transmission level, through which data is sent to the CLT.
  • the splitter/distributor connecting different users has a fixed isolation, which is greater than the upstream data in the CLT and the branch.
  • Transmission path loss between the transmitter/distributor for example Usually 25dB, as long as the transmission level used by the CNU to send uplink data is smaller than the isolation of the splitter/distributor, the splitter/divider connected to different users can isolate the uplink data, that is, only send the uplink data. Give the CLT, but not the upstream data to the CNU of other users.
  • the amplitude of the transmission level used by all CNUs to transmit uplink data is usually uniform, and the uniform transmission level is determined according to the maximum transmission level required by each CNU.
  • the maximum transmission level is often higher than the isolation of the splitter/divider connected to different users, so that the splitter/distributor connecting different users cannot isolate the uplink data sent by the CNU, resulting in a user's CNU sending.
  • the uplink data is stolen by other users' CNUs, which greatly reduces the security of uplink data transmission and reduces the quality of service services. Summary of the invention
  • An object of the present invention is to provide a data transmission method, and another object of the present invention is to provide a CNU. Another object of the present invention is to provide a CLT, so as to fundamentally ensure uplink data transmission in an EPCN system. safety.
  • a data transmission method comprising:
  • the CLT obtains the uplink receiving scrambling code, and decrypts the data sent by the CNU using the uplink sending scrambling code by using the acquired uplink receiving scrambling code;
  • the CNU obtains the downlink reception scrambling code, and decrypts the received data by using the acquired downlink reception scrambling code.
  • a CNU the CNU includes: a scrambling code acquisition unit, a decryption execution unit, and a data exchange Mutual unit, where
  • the scrambling code obtaining unit obtains a downlink receiving scrambling code different from the uplink receiving scrambling code, and sends the obtained downlink receiving scrambling code to the decrypting execution unit;
  • a data interaction unit configured to send externally sent data to the decryption execution unit; and a decryption execution unit, configured to decrypt the data sent by the data interaction unit according to the received downlink reception scrambling code.
  • a CLT includes: a scrambling code processing unit, a decryption processing unit, and a data interaction unit, wherein
  • the scrambling code processing unit is configured to acquire an uplink receiving scrambling code different from the downlink receiving scrambling code, and send the obtained uplink receiving scrambling code to the decryption processing unit;
  • a data interaction unit configured to send externally sent data to the decryption processing unit; and a decryption processing unit configured to decrypt the data sent by the data interaction unit by using an uplink received scrambling code sent by the scrambling code processing unit.
  • An EPCN system including:
  • the CLT is configured to obtain a downlink transmission scrambling code and an uplink reception scrambling code that is different from the downlink reception scrambling code, decrypt the received uplink data by using the acquired uplink reception scrambling code, and use the acquired downlink transmission scrambling code to downlink data. After being encrypted, it is sent to each CNU through a splitter/distributor;
  • Each CNU is configured to obtain an uplink transmission scrambling code and a downlink reception scrambling code that is different from the uplink reception scrambling code, decrypt the received downlink data by using the acquired downlink reception scrambling code, and use the acquired uplink transmission scrambling code pair.
  • the upstream data is encrypted and sent to the CLT through the splitter/distributor.
  • An access device is used in a data network, where the network includes at least two access devices and at least one aggregation device, where the signal carrying the data sent by the access device can reach the convergence device and at least one other connection Into the device, and the access device includes:
  • the uplink sending unit is configured to encrypt and send the data that needs to be uplinked in an encryption manner, where the encryption manner is adapted to a decryption manner used when the aggregation device receives data, but is received by at least one other access device.
  • the decryption method used in the data is not adapted.
  • An aggregation device configured to be used in a data network, where the network includes first and second access devices and at least one aggregation device, wherein a signal carrying data carried by the first access device can reach the convergence device and The second access device, and the aggregation device includes: an uplink receiving unit, configured to receive and decrypt the encrypted data sent by the first or second access device in uplink;
  • a downlink sending unit configured to send downlink data to the first access device, and encrypt the data in an encryption manner used when sending the uplink transmission different from the second access device.
  • a transceiver device for accessing a network device in a network sharing a transmission medium, configured to establish uplink and downlink channels with transceivers of other network devices, and encrypting the uplink channel and the downlink channel different.
  • a first transceiver device for the first network device in the network sharing the transmission medium
  • the network further comprises at least one second network device having the second transceiver device and including a third device having the third transceiver device a network device
  • the first transceiver device and the second transceiver device establish a first uplink channel and a first downlink channel
  • the third transceiver device and the second transceiver device establish a second uplink channel and a second downlink channel
  • the encryption manner of the first uplink channel is different from the encryption manner of the second downlink channel.
  • Another first transceiver device for a first network device in a network sharing a transmission medium wherein the network further comprises at least one second network device having a second transceiver device and including a third transceiver device
  • the third network device, and the first transceiver device and the second transceiver device establish a first uplink channel and a first downlink channel
  • the third transceiver device and the second transceiver device establish a second uplink channel to Downstream channel
  • said The encryption mode of the first uplink channel is different from the encryption mode of the second downlink channel.
  • the uplink received data must be decoded using the uplink received scrambling code, and the downlink data must be decrypted using the downlink received scrambling code.
  • the uplink receiving scrambling code and the downlink receiving scrambling code set by the present invention are different from each other, and a user's
  • the CNU can only obtain the downlink receiving scrambling code, so that even if the CNU receives the uplink data sent by the CNU of other users, the CNU can only use the downlink receiving scrambling code to decrypt the uplink data, so that the CRU cannot be correctly decrypted.
  • the content of the uplink data avoids the uplink data sent by one user's CNU being stolen by other users' CNU, which fundamentally guarantees the security of uplink data transmission in the EPCN system and greatly improves the service quality of the service.
  • FIG. 1 is a schematic diagram of networking of an EPCN system.
  • FIG. 2 is a flow chart of implementing data transmission in an EPCN system according to an embodiment of the present invention.
  • FIG. 3 is a schematic structural diagram of an internal CNU according to an embodiment of the present invention.
  • FIG. 4 is a schematic structural diagram of the inside of a CLT according to an embodiment of the present invention. Mode for carrying out the invention
  • the present invention proposes a method of data transmission in an EPCN system.
  • the uplink receiving scrambling code and the uplink sending scrambling code are saved, and the downlink receiving scrambling code and the downlink sending scrambling code are saved, wherein the uplink receiving scrambling code is different from the downlink receiving scrambling code;
  • the CLT acquires the uplink receiving scrambling code, and utilizes The obtained uplink receiving scrambling code decrypts the data sent by the CNU after the uplink transmission scrambling code is encrypted;
  • the CNU acquires the downlink receiving scrambling code, and decrypts the received data by using the acquired downlink receiving scrambling code.
  • FIG. 2 is a flow chart of implementing data transmission in an EPCN system according to an embodiment of the present invention.
  • the data transmission process in the EPCN system specifically includes the following steps:
  • Step 201 Set an uplink receiving scrambling code and an uplink sending scrambling code, and save.
  • the uplink reception scrambling code and the uplink transmission scrambling code are set in order to perform encryption and decryption processing on the uplink data in the subsequent process.
  • Step 202 Set a downlink receiving scrambling code and a downlink sending scrambling code, and save.
  • the downlink reception scrambling code and the downlink transmission scrambling code are set in order to perform encryption and decryption processing on the downlink data in the subsequent process.
  • step 201 and step 202 is different from the downlink receiving scrambling code.
  • step 201 the process of setting the uplink receiving scrambling code and the uplink sending scrambling code can be implemented in the following two manners:
  • the first method is to set an uplink receiving scrambling code corresponding to each CNU for the CLT, and set a corresponding uplink sending scrambling code for each CNU.
  • any two uplink receiving scrambling codes are different, and any two uplink transmitting scrambling codes are different, thereby further ensuring the security of uplink data transmission.
  • Manner 2 Set the uplink receive scrambling code corresponding to all CNUs for the CLT, and set the same uplink transmit scrambling code for all CNUs.
  • the process of setting the downlink receiving scrambling code and the downlink sending scrambling code may also be implemented in the following two manners:
  • Manner A Set a corresponding downlink receive scrambling code for each CNU, and set a downlink transmit scrambling code corresponding to each CNU for the CLT.
  • any two downlink receiving scrambling codes can be different, and any two downlink transmission scrambling codes are different, thereby further ensuring the security of downlink data transmission.
  • Mode B Set the downlink transmission scrambling code corresponding to all CNUs for CLT, and set the same downlink reception scrambling code for all CNUs.
  • the device that uses the uplink transmission scrambling code and the downlink reception scrambling code is the CNU. Therefore, in the foregoing step 201 and step 202, the uplink transmission scrambling code and the downlink reception scrambling code used for the CNU may be directly set on each CNU. Thus, the uplink transmission scrambling code and the downlink reception scrambling code are stored on the CNU. Since the device that uses the downlink transmission scrambling code and the uplink reception scrambling code is a CLT, in the foregoing steps 201 and 202, the downlink transmission scrambling code and the uplink reception scrambling code used for each CNU can be directly set on the CLT. Thus, the downlink transmission scrambling code and the uplink reception scrambling code are stored on each CLT.
  • the present invention may also provide a third-party device other than the CLT and the CNU in the EPCN system, and in the above steps 201 and 202, the CLT and the CNU may be set and saved on the third-party device. All scrambling codes. In this way, the implementation of the service and the centralized maintenance and management of the subsequent services are more advantageous, for example, it is easy to perform subsequent modification operations of a large number of CNU uplink receiving scrambling codes.
  • Step 203 A CNU such as CNU1 obtains an uplink transmission scrambling code and a downlink reception scrambling code used for itself.
  • step 201 and step 202 the uplink transmission scrambling code and the downlink reception scrambling code used for it are directly set on each CNU, then, in this step, CNU1 acquires itself for use according to its own setting. Uplink transmission scrambling code and downlink reception scrambling code.
  • step 201 and step 202 all the scrambling codes set directly on the third-party device, then, in this step, the CNU1 obtains the uplink transmission scrambling code and the downlink reception scrambling code used by the CNU1 from the third-party device.
  • the specific acquisition process can be:
  • the third-party device After the scrambling code is set on the third-party device, the third-party device actively sends the uplink sending scrambling code and the downlink receiving scrambling code used by each CNU to the corresponding CNU. For example, the third-party device will use the CNU1.
  • the uplink transmission scrambling code and the downlink reception scrambling code are sent to the CNU1
  • the uplink transmission scrambling code and the downlink reception scrambling code used by the CNU2 are sent to the CNU2, etc.
  • the CNU1 obtains the uplink transmission scrambling code and the downlink reception scrambling code used for its own use.
  • the request message is sent by the CNU1 to the third-party device.
  • the third-party device After receiving the request message sent by the CNU1, the third-party device sends the uplink transmission scrambling code and the downlink reception scrambling code used by the CNU1 to the CNU1, CNU1.
  • the uplink transmission scrambling code and the downlink reception scrambling code used for its acquisition are obtained by receiving.
  • the CNU and the third party device can perform the above interaction process by using the newly defined message of the present invention.
  • Step 204 The CNU1 encrypts the uplink data that needs to be sent to the CLT by using the obtained uplink transmission scrambling code, and sends the encrypted uplink data to the branch/distributor that is connected to different users.
  • Step 205 The uplink data is sent to the CLT through a splitter/distributor that connects different users.
  • the uplink receiving scrambling code and the downlink sending scrambling code set directly on the CLT then, in this step, the CLT can obtain as follows according to its own setting.
  • step 201 and step 202 which are all scrambling codes set directly on the third-party device
  • the CLT obtains the uplink receiving scrambling code and the downlink sending scrambling code used by the CNU1 from the third-party device.
  • the specific acquisition process can be: After the scrambling code is set on the third-party device, the third-party device actively sends the uplink receiving scrambling code and the downlink sending scrambling code used by each CNU to the CLT, and the CLT obtains the uplink receiving interference used by the CNU1. Code and downlink transmission scrambling code;
  • the request message is sent to the third party device by the CLT.
  • the third party device After receiving the request message sent by the CLT, the third party device sends the uplink receiving scrambling code and the downlink sending scrambling code used by each CNU to the CLT, CLT.
  • the uplink reception scrambling code and the downlink transmission scrambling code used for acquiring the CNU1 are obtained by receiving.
  • the CLT and the third party device can perform the above interaction process by using the newly defined message of the present invention.
  • step 204 if the uplink data sent by the CNU1 reaches the splitter/allocator connecting different users, the transmission level is higher than the isolation of the splitter/distributor, then, in the above steps.
  • the uplink data is not only sent to the CLT through the splitter/distributor connecting different users, but also further penetrates the branch/distributor connecting different users to other CNUs such as CNU2, at this time, although the CNU2 receives
  • the uplink data sent by the CNU1 since the uplink data is encrypted by using the uplink transmission scrambling code, that is, the uplink data can only be decrypted by the uplink reception scrambling code, so that the CNU2 uses a downlink reception scrambling code different from the uplink reception scrambling code.
  • the content of the uplink data cannot be decrypted, thereby improving the security of the uplink data transmission.
  • Step 207 The CLT decrypts the uplink data sent by the CNU1 by using the obtained uplink receiving scrambling code used by the CNU1.
  • Step 208 When the downlink data needs to be sent to the CNU1, the CLT encrypts the downlink data by using the obtained downlink transmission scrambling code used by the CNU1, and sends the encrypted downlink data to the branch/distributor connected to different users.
  • Step 209 The downlink data is sent to CNU1 through a splitter/distributor that connects different users.
  • FIG. 3 is a schematic structural diagram of an internal CNU according to an embodiment of the present invention.
  • an internal structure of a CNU may include: a scrambling code acquiring unit, a decrypting executing unit, and a data interaction unit, where
  • the scrambling code obtaining unit obtains a downlink receiving scrambling code different from the uplink receiving scrambling code, and sends the obtained downlink receiving scrambling code to the decrypting execution unit;
  • a data interaction unit configured to send externally sent data to the decryption execution unit; and a decryption execution unit, configured to decrypt the data sent by the data interaction unit according to the received downlink reception scrambling code.
  • the process of acquiring the downlink receiving scrambling code by the scrambling code acquiring unit may be: the scrambling code acquiring unit acquires the information according to configuration information input by a management personnel. And receiving, by the third-party device, the downlink receiving scrambling code.
  • FIG. 4 is a schematic structural diagram of the inside of a CLT according to an embodiment of the present invention.
  • the internal structure of the CLT may include: a scrambling code processing unit, a decryption processing unit, and a data interaction unit, where the scrambling code processing unit is configured to acquire a different scrambling code from the downlink receiving. Receiving the scrambling code in the uplink, and sending the obtained uplink receiving scrambling code to the decryption processing unit;
  • a data interaction unit configured to send externally sent data to the decryption processing unit; and a decryption processing unit configured to decrypt the data sent by the data interaction unit by using an uplink received scrambling code sent by the scrambling code processing unit.
  • an embodiment of the present invention also proposes an EPCN system. See Figure 1, in this
  • the networking mode of the EPCN system is the same as that of the prior art network shown in FIG. 1, that is, the CLT, the splitter/distributor, and the plurality of CNUs.
  • the functions of the CLT and the CNU are different from the prior art, wherein
  • the CLT is configured to obtain a downlink transmission scrambling code and an uplink reception scrambling code that is different from the downlink reception scrambling code, decrypt the received uplink data by using the acquired uplink reception scrambling code, and use the acquired downlink transmission scrambling code to downlink data. After being encrypted, it is sent to each CNU through a splitter/distributor;
  • Each CNU is configured to obtain an uplink transmission scrambling code and a downlink reception scrambling code that is different from the uplink reception scrambling code, decrypt the received downlink data by using the acquired downlink reception scrambling code, and use the acquired uplink transmission scrambling code pair.
  • the upstream data is encrypted and sent to the CLT through the splitter/distributor.
  • the EPCN system in the embodiment of the present invention may further include a third-party device, configured to store an uplink transmission scrambling code and an uplink reception scrambling code, and a downlink transmission scrambling code and a downlink different from the uplink reception scrambling code.
  • a third-party device configured to store an uplink transmission scrambling code and an uplink reception scrambling code, and a downlink transmission scrambling code and a downlink different from the uplink reception scrambling code.
  • the downlink reception scrambling code is sent to each CNU, so that each CNU acquires an uplink transmission scrambling code and a downlink reception scrambling code that is different from the uplink reception scrambling code.
  • the third-party device may be a new dedicated device of the present invention, or may be an existing device in the Ethernet.
  • an access device can be obtained.
  • the access device is used in a data network, where the network includes at least two access devices and at least one aggregation device, where the signal carrying the data sent by the access device can reach the convergence device and at least one other access device.
  • the access device includes:
  • the uplink sending unit is configured to encrypt the data that needs to be uplinked by using an encryption method.
  • the encryption mode is adapted to the decryption mode used when the aggregation device receives data, but is not adapted to the decryption mode used by at least one other access device when receiving data.
  • the access device may further include a downlink receiving unit, configured to decrypt the received data in a decryption manner, where the decryption mode is adapted to an encryption manner when the aggregation device sends data, but the at least one Other access devices use different encryption methods when sending data.
  • a downlink receiving unit configured to decrypt the received data in a decryption manner, where the decryption mode is adapted to an encryption manner when the aggregation device sends data, but the at least one Other access devices use different encryption methods when sending data.
  • the data network may be a data network sharing a transmission medium.
  • the encryption and decryption are scrambling code encryption and scrambling code decryption.
  • a convergence device can also be obtained.
  • the aggregation device is used in a data network, where the network includes the first and second access devices and the at least one aggregation device, where the signal of the bearer data sent by the first access device can reach the convergence device and the second interface Into the device, in particular, the aggregation device includes:
  • An uplink receiving unit configured to receive and decrypt the encrypted data sent by the first access device or the second access device;
  • a downlink sending unit configured to send downlink data to the first access device, and encrypt the data in an encryption manner used when sending the uplink transmission different from the second access device.
  • the data network is a data network sharing a transmission medium.
  • the uplink receiving unit decrypts data sent by all access devices in the same manner by using the same decryption method.
  • the downlink sending unit encrypts data sent to all access devices in the downlink by the same encryption method.
  • the encryption and decryption are scrambling code encryption and interference. Code decryption.
  • a transceiver device can also be obtained.
  • the transceiver is used on an access network device in a network for sharing a transmission medium, and is configured to establish uplink and downlink channels with transceivers of other network devices.
  • the uplink channel and the downlink channel are encrypted differently.
  • a first transceiver device is also provided for the first network device in the network sharing the transmission medium, wherein the network further includes at least one second network having the second transceiver device
  • the device includes a third network device having a third transceiver, and the first transceiver device and the second transceiver device establish a first uplink channel and a first downlink channel, and the third transceiver device and the second transceiver device
  • the transceiver device establishes a second uplink channel and a second downlink channel.
  • the encryption mode of the first uplink channel is different from the second downlink channel encryption mode.
  • another first transceiver device can be obtained for the first network device in the network sharing the transmission medium, wherein the network further includes at least one second device having the second transceiver device
  • the network device includes a third network device having a third transceiver, and the first transceiver and the second transceiver establish a first uplink channel and a first downlink channel, and the third transceiver device
  • the second transceiver device establishes the second uplink channel as the second downlink channel.
  • the encryption mode of the first uplink channel is different from the second downlink channel encryption mode.
  • the present invention can be implemented by software with the generalized computer device (which can be understood as a hardware platform with certain versatility) capable of running the software. To achieve; of course, can also be achieved by hardware design; but in many cases the former is a better implementation. Based on such understanding, the technical solution of the present invention, which is essential or contributes to the prior art, can be embodied in the form of a software product stored in a storage. The method described in the example.

Description

一种数据传输方法和终端
技术领域
本发明涉及以太网通信技术,特别是涉及一种数据传输方法和终端。 发明背景
以太网无源同轴网络( EPCN , Ethernet Pssive Coaxiable Network ) 技术是以以太网为载体, 采用点到多点结构、 无源同轴电缆传输方式, 上行以突发的以太网包方式发送数据流的技术。
图 1是 EPCN系统的组网示意图。 参见图 1 , EPCN系统主要包括 同轴线路终端(CLT, Coaxial-cable Line Terminal ), 分支器 /分配器、 以 及多个同轴网络终端 ( CNU, Coaxial-Cable Network Unit )。 EPCN系统 通过 CLT连接 EPCN系统以外的各种以太网设备, 并通过 CNU连接用 户设备。 EPCN 系统可以应用于多种业务环境中, 目前最为常用的就是 在楼内的以太网宽带到户使用。
在 EPCN系统中, 数据传输的基本过程为: 在下行方向, CLT将数 据发送至连接不同用户的分支器 /分配器,数据通过连接不同用户的分支 器 /分配器被发送至各个用户的 CNU; 在上行方向, 各个 CNU按照一定 的发送电平将自身的数据发送至连接不同用户的分支器 /分配器,数据通 过该分支器 /分配器被发送至 CLT。
通过 EPCN系统中的数据传输过程可以看出, 在上行方向, 任意一 个 CNU的数据必须经过分支器 /分配器进行传输,才能到达 CLT。 因此, 为了避免一个 CNU发送给 CLT的上行数据穿透分支器 /分配器到达另一 个 CNU, 连接不同用户的分支器 /分配器具有固定的隔离度, 该隔离度 大于上行数据在 CLT与该分支器 /分配器间传输的传输路径损耗, 比如 通常为 25dB, 只要 CNU发送上行数据时所采用的发送电平幅度小于分 支器 /分配器的隔离度, 连接不同用户的分支器 /分配器就可以对上行数 据进行隔离, 即只将上行数据发送给 CLT, 而不会将上行数据发送给其 它用户的 CNU。
然而, 在实际的业务实现中, 所有 CNU发送上行数据时所采用的 发送电平幅度通常是统一的, 而这个统一的发送电平幅度是按照各个 CNU所需要的最大发送电平幅度确定,该最大的发送电平幅度经常会高 于连接不同用户的分支器 /分配器的隔离度,从而使得连接不同用户的分 支器 /分配器无法对 CNU发送的上行数据进行隔离, 导致一个用户的 CNU发送的上行数据被其他用户的 CNU窃取, 大大降低了上行数据传 输的安全性, 降低了业务服务质量。 发明内容
本发明的一个目的在于提供一种数据传输方法, 本发明的另一目的 在于提供一种 CNU,本发明的又一目的在于提供一种 CLT, 以便于从根 本上保证 EPCN系统中上行数据传输的安全性。
为了达到上述目的, 本发明的技术方案是这样实现的:
一种数据传输方法, 该方法包括:
保存上行接收扰码及上行发送扰码, 并保存下行接收扰码及下行发 送扰码, 其中, 上行接收扰码与下行接收扰码不同;
CLT获取上行接收扰码, 并利用所获取的上行接收扰码对 CNU使 用上行发送扰码加密后发来的数据进行解密;
CNU获取下行接收扰码,并利用所获取的下行接收扰码对接收到的 数据进行解密。
一种 CNU, 该 CNU包括: 扰码获取单元, 解密执行单元和数据交 互单元, 其中,
扰码获取单元, 获取与上行接收扰码不同的下行接收扰码, 并将获 取的下行接收扰码发送至解密执行单元;
数据交互单元, 用于将外部发来的数据发送至解密执行单元; 解密执行单元, 用于根据接收到的下行接收扰码对数据交互单元发 来的数据进行解密。
一种 CLT, 该 CLT包括: 扰码处理单元、 解密处理单元和数据交互 单元, 其中,
扰码处理单元, 用于获取与下行接收扰码不同的上行接收扰码, 将 获取的上行接收扰码发送至解密处理单元;
数据交互单元, 用于将外部发来的数据发送至解密处理单元; 解密处理单元, 用于利用扰码处理单元发来的上行接收扰码对数据 交互单元发来的数据进行解密。
一种 EPCN系统, 包括:
CLT, 用于获取下行发送扰码和与下行接收扰码不相同的上行接收 扰码, 利用获取的上行接收扰码对接收到的上行数据进行解密, 并利用 获取的下行发送扰码对下行数据进行加密后通过分支器 /分配器发送给 各个 CNU;
每一个 CNU,用于获取上行发送扰码以及与上行接收扰码不相同的 下行接收扰码, 利用获取的下行接收扰码对接收到的下行数据进行解 密, 并利用获取的上行发送扰码对上行数据进行加密后通过分支器 /分 配器发送给 CLT。
一种接入设备, 用于数据网络中, 该网络包括至少两个接入设备以 及至少一个汇聚设备, 其中, 该接入设备发送的承载数据的信号能够到 达所述汇聚设备以及至少一个其他接入设备, 并且, 该接入设备包括: 上行发送单元, 用以将需要上行的数据一种加密方式进行加密后发 送, 其中所述加密方式与所述汇聚设备接收数据时使用的解密方式适 配, 但与至少一个其他接入设备在接收数据时所使用的解密方式不适 配。
一种汇聚设备, 用于数据网络中, 该网络包括第一和第二两个接入 设备以及至少一个汇聚设备, 其中第一接入设备发送的承载数据的信号 能够到达所述汇聚设备以及第二接入设备, 并且, 该汇聚设备包括: 上行接收单元, 用以接收并解密第一或第二接入设备上行发送的加 密数据;
下行发送单元, 用以向第一接入设备发送下行数据, 并且在发送以 不同于第二接入设备上行发送时采用的加密方式对该数据进行加密。
一种收发装置, 该收发装置用于共享传输媒介的网络中的接入网络 设备上,用以与其他网络设备的收发装置建立上行以及下行通道,并且, 所述上行通道与下行通道的加密方式不同。
第一收发装置, 其用于共享传输媒介的网络中的第一网络设备上, 其中该网络至少还包括一个具有第二收发装置的第二网络设备用以及 包括一个具有第三收发装置的第三网络设备, 并且, 所述第一收发装置 与第二收发装置建立第一上行通道以及第一下行通道, 所述第三收发装 置与第二收发装置建立第二上行通道以第二下行通道, 并且, 所述第一 上行通道的加密方式与第二下行通道加密方式不同。
另一种第一收发装置, 其用于共享传输媒介的网络中的第一网络设 备上, 其中该网络至少还包括一个具有第二收发装置的第二网络设备用 以及包括一个具有第三收发装置的第三网络设备, 并且, 所述第一收发 装置与第二收发装置建立第一上行通道以及第一下行通道, 所述第三收 发装置与第二收发装置建立第二上行通道以第二下行通道, 并且, 所述 第一上行通道的加密方式与第二下行通道加密方式不同。
由此可见, 在本发明中, 必须利用上行接收扰码来对上行数据进行 解码, 并且, 必须利用下行接收扰码对下行数据进行解密。 而由于本发 明所设置的上行接收扰码和下行接收扰码互不相同, 并且, 一个用户的
CNU只能获取下行接收扰码,这样,即使该 CNU接收到其他用户的 CNU 所发送的上行数据, 那么, 该 CNU只能使用下行接收扰码来对该上行 数据进行解密, 从而无法正确解密出上行数据的内容, 避免了一个用户 的 CNU发送的上行数据被其他用户的 CNU窃取,从根本上保证了 EPCN 系统中上行数据传输的安全性, 大大提高了业务服务质量。 附图简要说明
图 1是 EPCN系统的组网示意图。
图 2是本发明实施例在 EPCN系统中实现数据传输的流程图。
图 3是本发明实施例提出的 CNU内部的结构示意图。
图 4是本发明实施例提出的 CLT内部的结构示意图。 实施本发明的方式
为使本发明的目的、 技术方案和优点更加清楚, 下面结合附图及具 体实施例对本发明作进一步地详细描述。
对 EPCN系统中上行数据的传输过程进行分析可知,只要一个 CNU 发送上行数据时所采用的发送电平幅度大于分支器的隔离度,其他 CNU 就可以接收到该上行数据。 这样, 如果要想使得 CNU之间无法相互窃 取上行数据信息, 保证上行数据的安全性, 一种可行的方式则是使得 CNU即使能够接收到其他 CNU发送的上行数据, 但也无法正确解密出 该上行数据。 因此, 本发明提出了一种在 EPCN系统中数据传输的方法。 在该方 法中, 保存上行接收扰码及上行发送扰码, 并保存下行接收扰码及下行 发送扰码, 其中, 上行接收扰码与下行接收扰码不同; CLT获取上行接 收扰码, 并利用所获取的上行接收扰码对 CNU使用上行发送扰码加密 后发来的数据进行解密; CNU获取下行接收扰码, 并利用所获取的下行 接收扰码对接收到的数据进行解密。
图 2是本发明实施例在 EPCN系统中实现数据传输的流程图。 参见 图 2, 在本发明实施例中, EPCN 系统中数据传输过程具体包括以下步 骤:
步骤 201: 设置上行接收扰码及上行发送扰码, 并保存。
这里, 设置上行接收扰码及上行发送扰码是为了在后续过程中, 能 够对上行数据进行加解密处理。
步骤 202: 设置下行接收扰码及下行发送扰码, 并保存。
这里, 设置下行接收扰码及下行发送扰码是为了在后续过程中, 能 够对下行数据进行加解密处理。
需要特别说明的是, 上述步骤 201和步骤 202所设置的上行接收扰 码与下行接收扰码不同。
在上述步骤 201中, 设置上行接收扰码和上行发送扰码的过程可以 通过如下两种方式来实现:
方式一、 为 CLT设置分别对应于每一个 CNU的上行接收扰码, 以 及为每一个 CNU分别设置对应的上行发送扰码。
在该方式一中, 可以使得任意两个上行接收扰码不同, 以及任意两 个上行发送扰码不同, 从而进一步确保上行数据传输的安全性。
方式二、 为 CLT设置对应于所有 CNU的上行接收扰码, 以及为所 有 CNU设置相同的上行发送扰码。 在上述步骤 202中, 设置下行接收扰码和下行发送扰码的过程也可 以通过如下两种方式来实现:
方式 A、为每一个 CNU分别设置对应的下行接收扰码,以及为 CLT 设置分别对应于每一个 CNU的下行发送扰码。
在该方式 A中, 可以使得任意两个下行接收扰码不同, 以及任意两 个下行发送扰码不同, 从而进一步确保下行数据传输的安全性。
方式 B、 为 CLT设置对应于所有 CNU的下行发送扰码, 以及为所 有 CNU设置相同的下行接收扰码。
由于使用上行发送扰码和下行接收扰码的设备是 CNU, 因此, 在上 述步骤 201和步骤 202中, 可以分别在每一个 CNU上直接设置为其使 用的上行发送扰码和下行接收扰码, 这样, 上行发送扰码和下行接收扰 码则保存在 CNU上。 由于使用下行发送扰码和上行接收扰码的设备是 CLT, 因此, 在上述步骤 201和步骤 202中, 可以直接在 CLT上设置出 为每一个 CNU使用的下行发送扰码和上行接收扰码, 这样, 下行发送 扰码和上行接收扰码则保存在每一个 CLT上。
另外, 本发明也可以在 EPCN系统中设置一个除 CLT和 CNU之外 的第三方设备, 并且, 在上述步骤 201和步骤 202中, 可以在该第三方 设备上设置并保存 CLT以及 CNU所需要的所有扰码。 此种方式下, 可 以更加有利于业务的实现和后续业务的集中维护管理, 比如, 易于进行 后续大量 CNU上行接收扰码的修改操作等。
步骤 203: —个 CNU比如 CNU1 , 获取为自身使用的上行发送扰码 和下行接收扰码。
这里, 当在步骤 201和步骤 202中, 是直接在每一个 CNU上设置 为其使用的上行发送扰码和下行接收扰码, 那么, 在本步骤中, CNU1 根据自身设置, 获取为自身使用的上行发送扰码和下行接收扰码。 当在步骤 201和步骤 202中, 是直接在第三方设备上设置的所有扰 码, 那么, 在本步骤中, CNU1从第三方设备中获取为该 CNU1使用的 上行发送扰码和下行接收扰码, 具体的获取过程可以是:
在所述第三方设备上设置了扰码后, 由第三方设备主动将为每一个 CNU使用的上行发送扰码和下行接收扰码分别发送至对应的 CNU, 比 如, 第三方设备将为 CNU1使用的上行发送扰码和下行接收扰码发送至 CNU1 , 将为 CNU2使用的上行发送扰码和下行接收扰码发送至 CNU2 等, CNU1通过接收获取为自身使用的上行发送扰码和下行接收扰码; 或者, 首先由 CNU1将请求消息发送至所述第三方设备, 第三方设 备在接收到 CNU1发来的请求消息后,将为 CNU1使用的上行发送扰码 和下行接收扰码发送至 CNU1 , CNU1通过接收获取为其使用的上行发 送扰码和下行接收扰码。
其中, CNU与所述第三方设备可以利用本发明新定义的消息执行上 述的交互过程。
步骤 204: CNU1利用获取的上行发送扰码对需要发送给 CLT的上 行数据进行加密, 将加密后的上行数据发送至连接不同用户的分支器 / 分配器。
步骤 205:上行数据通过连接不同用户的分支器 /分配器发送至 CLT。 步骤 206: CLT获取为 CNU1使用的上行接收扰码和下行发送扰码。 当在步骤 201和步骤 202中,是直接在 CLT上设置的上行接收扰码 和下行发送扰码, 那么, 在本步骤中, CLT可以根据自身设置, 获取为
CNU1使用的上行接收扰码和下行发送扰码。
当在步骤 201和步骤 202中, 是直接在第三方设备上设置的所有扰 码, 那么, 在本步骤中, CLT从第三方设备中获取为 CNU1使用的上行 接收扰码和下行发送扰码, 具体的获取过程可以是: 在所述第三方设备上设置了扰码后, 由第三方设备主动将设置的每 一个 CNU使用的上行接收扰码和下行发送扰码发送至 CLT, CLT通过 接收获取为 CNU1使用的上行接收扰码和下行发送扰码;
或者, 首先由 CLT将请求消息发送至所述第三方设备, 第三方设备 在接收到 CLT发来的请求消息后, 将每一个 CNU使用的上行接收扰码 和下行发送扰码发送至 CLT, CLT通过接收获取为 CNU1使用的上行接 收扰码和下行发送扰码。
其中, CLT与所述第三方设备可以利用本发明新定义的消息执行上 述的交互过程。
需要说明的是, 在上述步骤 204中, 如果 CNU1发送的上行数据到 达连接不同用户的分支器 /分配器时的发送电平幅度高于该分支器 /分配 器的隔离度, 那么, 在上述步骤 205中, 上行数据不仅会通过连接不同 用户的分支器 /分配器发送至 CLT,而且还会进一步穿透连接不同用户的 分支器 /分配器而到达其他 CNU如 CNU2, 此时, 虽然 CNU2接收到了 CNU1发来的上行数据, 但是, 由于该上行数据是利用上行发送扰码加 密, 即该上行数据只能被上行接收扰码所解密, 这样, CNU2利用与上 行接收扰码不同的下行接收扰码则无法解密出该上行数据的内容, 从而 提高了上行数据传输的安全性。
步骤 207: CLT 利用所获取的为 CNU1 使用的上行接收扰码, 对 CNU1发来的上行数据进行解密。
步骤 208: 当需要给 CNU1 发送下行数据时, CLT 利用获取的为 CNU1使用的下行发送扰码对下行数据进行加密, 将加密后的下行数据 发送至连接不同用户的分支器 /分配器。
步骤 209 : 下行数据通过连接不同用户的分支器 /分配器发送至 CNU1。 步骤 210: CNU1 根据所获取的为其使用的下行接收扰码对接收到 的下行数据进行解密。
相应地, 本发明还提出了一种 CNU。 图 3 是本发明实施例提出的 CNU 内部的结构示意图。 参见图 3, 在本发明的一个实施例中, CNU 的内部结构可以包括: 扰码获取单元, 解密执行单元和数据交互单元, 其中,
扰码获取单元, 获取与上行接收扰码不同的下行接收扰码, 并将获 取的下行接收扰码发送至解密执行单元;
数据交互单元, 用于将外部发来的数据发送至解密执行单元; 解密执行单元, 用于根据接收到的下行接收扰码对数据交互单元发 来的数据进行解密。
参见图 3, 在本发明实施例所提出的 CNU中, 所述扰码获取单元获 取所述下行接收扰码的过程可以是: 所述扰码获取单元根据管理人员输 入的配置信息, 获取所述下行接收扰码; 或者, 所述扰码获取单元直接 接收或在向第三方设备发送请求消息后接收, 由第三方设备发来的所述 下行接收扰码。
相应地,本发明还提出了一种 CLT。图 4是本发明实施例提出的 CLT 内部的结构示意图。 参见图 4, 在本发明的一个实施例中, CLT的内部 结构可以包括: 扰码处理单元、 解密处理单元和数据交互单元, 其中, 扰码处理单元, 用于获取与下行接收扰码不同的上行接收扰码, 将 获取的上行接收扰码发送至解密处理单元;
数据交互单元, 用于将外部发来的数据发送至解密处理单元; 解密处理单元, 用于利用扰码处理单元发来的上行接收扰码对数据 交互单元发来的数据进行解密。
相应地, 本发明实施例还提出了一种 EPCN系统。 参见图 1 , 在本 发明实施例中, EPCN系统的组网方式与图 1所示的现有技术的组网方 式相同, 即由 CLT、 分支器 /分配器以及多个 CNU组成。 但是, 在本发 明的实施例中, CLT和 CNU的功能与现有技术不同, 其中,
CLT, 用于获取下行发送扰码和与下行接收扰码不相同的上行接收 扰码, 利用获取的上行接收扰码对接收到的上行数据进行解密, 并利用 获取的下行发送扰码对下行数据进行加密后通过分支器 /分配器发送给 各个 CNU;
每一个 CNU,用于获取上行发送扰码以及与上行接收扰码不相同的 下行接收扰码, 利用获取的下行接收扰码对接收到的下行数据进行解 密, 并利用获取的上行发送扰码对上行数据进行加密后通过分支器 /分 配器发送给 CLT。
较佳地, 在本发明实施例提出的 EPCN系统中, 还可以进一步包括 第三方设备, 用于保存上行发送扰码及上行接收扰码, 以及下行发送扰 码及与上行接收扰码不同的下行接收扰码, 将保存的下行发送扰码和上 行接收扰码发送给 CLT,使得 CLT获取了下行发送扰码和与下行接收扰 码不相同的上行接收扰码,, 并将上行发送扰码以及下行接收扰码发送 给每一个 CNU, 使得每一个 CNU获取了上行发送扰码以及与上行接收 扰码不相同的下行接收扰码。
在本发明实施例中, 第三方设备可以是本发明新增的专用设备, 也 可以是以太网中的已有设备。
通过本发明的上述实施例, 可以得到一种接入设备。 该接入设备用 于数据网络中, 该网络包括至少两个接入设备以及至少一个汇聚设备, 其中, 该接入设备发送的承载数据的信号能够到达所述汇聚设备以及至 少一个其他接入设备, 特别的是, 该接入设备包括:
上行发送单元, 用以将需要上行的数据一种加密方式进行加密后发 送, 其中所述加密方式与所述汇聚设备接收数据时使用的解密方式适 配, 但与至少一个其他接入设备在接收数据时所使用的解密方式不适 配。
在上述接入设备, 还可以包括下行接收单元, 用以将接收到的数据 以一种解密方式进行解密, 其中该解密方式与汇聚设备发送数据时的加 密方式适配, 但与所述至少一个其他接入设备发送数据时采用的加密方 式不同。
较佳地, 在上述接入设备中, 所述数据网络可以为共享传输媒介的 数据网络。
较佳地, 在上述接入设备中, 所述加密以及解密是扰码加密以及扰 码解密。
通过本发明的上述实施例, 还可以得到一种汇聚设备。 该汇聚设备 用于数据网络中, 该网络包括第一和第二两个接入设备以及至少一个汇 聚设备, 其中第一接入设备发送的承载数据的信号能够到达所述汇聚设 备以及第二接入设备, 特别的是, 该汇聚设备包括:
上行接收单元, 用以接收并解密第一或第二接入设备上行发送的加 密数据;
下行发送单元, 用以向第一接入设备发送下行数据, 并且在发送以 不同于第二接入设备上行发送时采用的加密方式对该数据进行加密。
在上述汇聚设备中, 所述数据网络为共享传输媒介的数据网络。 在上述汇聚设备中, 所述上行接收单元用同一种解密方式对所有接 入设备上行发送的数据进行解密。
在上述汇聚设备中, 所述下行发送单元用同一种加密方式对下行发 送给所有接入设备数据进行加密。
较佳地, 在上述汇聚设备中, 所述加密以及解密是扰码加密以及扰 码解密。
通过本发明的上述实施例, 还可以得到一种收发装置。 该收发装置 用于共享传输媒介的网络中的接入网络设备上, 用以与其他网络设备的 收发装置建立上行以及下行通道, 特别的是, 所述上行通道与下行通道 的加密方式不同。
通过本发明的上述实施例, 还可以得到一种第一收发装置, 其用于 共享传输媒介的网络中的第一网络设备上, 其中该网络至少还包括一个 具有第二收发装置的第二网络设备用以及包括一个具有第三收发装置 的第三网络设备, 并且, 所述第一收发装置与第二收发装置建立第一上 行通道以及第一下行通道, 所述第三收发装置与第二收发装置建立第二 上行通道以第二下行通道, 特别的是, 所述第一上行通道的加密方式与 第二下行通道加密方式不同。
通过本发明的上述实施例, 还可以得到另一种第一收发装置, 其用 于共享传输媒介的网络中的第一网络设备上, 其中该网络至少还包括一 个具有第二收发装置的第二网络设备用以及包括一个具有第三收发装 置的第三网络设备, 并且, 所述第一收发装置与第二收发装置建立第一 上行通道以及第一下行通道, 所述第三收发装置与第二收发装置建立第 二上行通道以第二下行通道, 特别的是, 所述第一上行通道的加密方式 与第二下行通道加密方式不同。
通过以上的实施方式的描述, 本领域的一般技术人员可以清楚地了 解到本发明可借助软件加有能力运行该软件的通用的广义计算机设备 (可以理解为具有一定通用性的硬件平台) 的方式来实现; 当然也可以 采用硬件设计的方式实现; 但很多情况下前者是更佳的实施方式。 基于 这样的理解, 本发明的技术方案本质上或者说对现有技术做出贡献的部 分可以以软件产品的形式体现出来, 该计算机软件产品存储在一个存储 例所述的方法。
总之, 以上所述仅为本发明的较佳实施例而已, 并非用于限定本发 明的保护范围。 凡在本发明的精神和原则之内, 所作的任何修改、 等同 替换、 改进等, 均应包含在本发明的保护范围之内。

Claims

权利要求书
1、 一种数据传输方法, 其特征在于, 该方法包括:
保存上行接收扰码及上行发送扰码, 并保存下行接收扰码及下行发 送扰码, 其中, 上行接收扰码与下行接收扰码不同;
CLT获取上行接收扰码, 并利用所获取的上行接收扰码对 CNU使 用上行发送扰码加密后发来的数据进行解密;
CNU获取下行接收扰码,并利用所获取的下行接收扰码对接收到的 数据进行解密。
2、 根据权利要求 1所述的方法, 其特征在于, 所述 CNU接收到的 数据为: 所述 CLT发来的使用下行发送扰码加密后的数据; 或者, 其他 CNU发来的使用上行发送扰码加密后的数据。
3、根据权利要求 1所述的方法, 其特征在于, 所述保存上行接收扰 码及上行发送扰码的步骤包括: 针对每一个 CNU分别保存其对应的上 行接收扰码及上行发送扰码;
所述 CNU使用的上行发送扰码为对应于该 CNU的上行发送扰码; 所述 CLT所获取并利用的上行接收扰码为对应于所述 CNU的上行 接收扰码。
4、根据权利要求 1所述的方法, 其特征在于, 所述保存上行接收扰 码及上行发送扰码的步骤包括: 针对所有 CNU保存同一个上行接收扰 码及上行发送扰码;
所述 CNU使用的上行发送扰码为对应于所有 CNU 的上行发送扰 码;
所述 CLT所获取并利用的上行接收扰码为对应于所有 CNU的上行 接收扰码。
5、根据权利要求 1所述的方法, 其特征在于, 所述保存下行接收扰 码及下行发送扰码的步骤包括: 针对每一个 CNU分别保存其对应的下 行接收扰码及下行发送扰码;
所述 CLT向所述 CNU发送下行数据时使用的下行发送扰码为对应 于所述 CNU的下行发送扰码;
所述 CNU所获取并利用的下行接收扰码为对应于该 CNU的下行接 收扰码。
6、根据权利要求 1所述的方法, 其特征在于, 所述保存下行接收扰 码及下行发送扰码的步骤包括: 针对所有 CNU保存同一个下行接收扰 码及下行发送扰码;
所述 CLT向所述 CNU发送下行数据时使用的下行发送扰码为对应 于所有 CNU的下行发送扰码;
所述 CNU所获取并利用的下行接收扰码为对应于所有 CNU的下行 接收扰码。
7、根据权利要求 1至 6中任意一项所述的方法, 其特征在于, 在所 述 CLT上保存上行接收扰码及下行发送扰码;
在每一个 CNU上分别保存下行接收扰码及上行发送扰码; 获取所述扰码的步骤包括: 根据自身保存的信息, 获取所述扰码。
8、根据权利要求 1至 6中任意一项所述的方法, 其特征在于, 在除 CLT和 CNU之外的第三方设备上保存所述扰码;
获取所述扰码的步骤包括: 从第三方设备中获取所述扰码。
9、 一种 CNU, 其特征在于, 该 CNU包括: 扰码获取单元, 解密执 行单元和数据交互单元, 其中,
扰码获取单元, 获取与上行接收扰码不同的下行接收扰码, 并将获 取的下行接收扰码发送至解密执行单元;
数据交互单元, 用于将外部发来的数据发送至解密执行单元; 解密执行单元, 用于根据接收到的下行接收扰码对数据交互单元发 来的数据进行解密。
10、根据权利要求 9所述的 CNU,其特征在于,所述扰码获取单元, 根据管理人员输入的配置信息, 获取所述下行接收扰码。
11、根据权利要求 9所述的 CNU,其特征在于,所述扰码获取单元, 用于直接接收或在向第三方设备发送请求消息后接收, 由第三方设备发 来的所述下行接收扰码。
12、 一种 CLT, 其特征在于, 该 CLT包括: 扰码处理单元、 解密处 理单元和数据交互单元, 其中,
扰码处理单元, 用于获取与下行接收扰码不同的上行接收扰码, 将 获取的上行接收扰码发送至解密处理单元;
数据交互单元, 用于将外部发来的数据发送至解密处理单元; 解密处理单元, 用于利用扰码处理单元发来的上行接收扰码对数据 交互单元发来的数据进行解密。
13、 一种以太网无源同轴网络 EPCN系统, 其特征在于, 该系统包 括:
CLT, 用于获取下行发送扰码和与下行接收扰码不相同的上行接收 扰码, 利用获取的上行接收扰码对接收到的上行数据进行解密, 并利用 获取的下行发送扰码对下行数据进行加密后通过分支器 /分配器发送给 各个 CNU;
每一个 CNU,用于获取上行发送扰码以及与上行接收扰码不相同的 下行接收扰码, 利用获取的下行接收扰码对接收到的下行数据进行解 密,并利用获取的上行发送扰码对上行数据进行加密后通过分支器 /分配 器发送给 CLT。
14、根据权利要求 13所述的系统, 其特征在于, 该系统进一步包括 第三方设备, 用于保存上行发送扰码、 上行接收扰码、 下行发送扰码及 与上行接收扰码不同的下行接收扰码, 将保存的下行发送扰码和上行接 收扰码发送给 CLT, 并将上行发送扰码以及下行接收扰码发送给每一个
CNU。
15、根据权利要求 14所述的系统, 其特征在于, 所述第三方设备为 新增的专用设备或以太网中的已有设备。
16、 一种接入设备, 用于数据网络中, 该网络包括至少两个接入设 备以及至少一个汇聚设备, 其中, 该接入设备发送的承载数据的信号能 够到达所述汇聚设备以及至少一个其他接入设备, 其特征在于, 该接入 设备包括:
上行发送单元, 用以将需要上行的数据一种加密方式进行加密后发 送, 其中所述加密方式与所述汇聚设备接收数据时使用的解密方式适 配, 但与至少一个其他接入设备在接收数据时所使用的解密方式不适 配。
17、如权利要求 16所述的接入设备, 其特征在于, 还包括下行接收 单元, 用以将接收到的数据以一种解密方式进行解密, 其中该解密方式 与汇聚设备发送数据时的加密方式适配, 但与所述至少一个其他接入设 备发送数据时采用的加密方式不同。
18、如权利要求 17所述的接入设备, 其特征在于, 所述数据网络为 共享传输媒介的数据网络。
19、如权利要求 17所述的接入设备, 其特征在于, 所述加密以及解 密是扰码加密以及扰码解密。
20、 一种汇聚设备, 用于数据网络中, 该网络包括第一和第二两个 接入设备以及至少一个汇聚设备, 其中第一接入设备发送的承载数据的 信号能够到达所述汇聚设备以及第二接入设备, 其特征在于, 该汇聚设 备包括:
上行接收单元, 用以接收并解密第一或第二接入设备上行发送的加 密数据;
下行发送单元, 用以向第一接入设备发送下行数据, 并且在发送以 不同于第二接入设备上行发送时采用的加密方式对该数据进行加密。
21、如权利要求 20所述的汇聚设备, 其特征在于, 所述数据网络为 共享传输媒介的数据网络。
22、 如权利要求 20所述的汇聚设备, 其特征在于, 所述上行接收单 元用同一种解密方式对所有接入设备上行发送的数据进行解密。
23、 如权利要求 22所述的汇聚设备, 其特征在于, 所述下行发送单 元用同一种加密方式对下行发送给所有接入设备数据进行加密。
24、如权利要求 23所述的汇聚设备,所述加密以及解密是扰码加密 以及扰码解密。
25、 一种收发装置, 其用于共享传输媒介的网络中的接入网络设备 上, 用以与其他网络设备的收发装置建立上行以及下行通道, 其特征在 于, 所述上行通道与下行通道的加密方式不同。
26、 一种第一收发装置, 其用于共享传输媒介的网络中的第一网络 设备上 , 其中该网络至少还包括一个具有第二收发装置的第二网络设备 用以及包括一个具有第三收发装置的第三网络设备, 其特征在于, 所述 第一收发装置与第二收发装置建立第一上行通道以及第一下行通道, 所 述第三收发装置与第二收发装置建立第二上行通道以第二下行通道, 其 特征在于, 所述第一上行通道的加密方式与第二下行通道加密方式不 同。
27、 一种第一收发装置, 其用于共享传输媒介的网络中的第一网络 设备上, 其中该网络至少还包括一个具有第二收发装置的第二网络设备 用以及包括一个具有第三收发装置的第三网络设备, 其特征在于, 所述 第一收发装置与第二收发装置建立第一上行通道以及第一下行通道, 所 述第三收发装置与第二收发装置建立第二上行通道以第二下行通道, 其 特征在于, 所述第一上行通道的加密方式与第二下行通道加密方式不 同。
PCT/CN2007/071307 2007-04-06 2007-12-21 A data transmission method and terminals WO2008122182A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US12/524,899 US8311217B2 (en) 2007-04-06 2007-12-21 Data transmission method and terminal

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN2007100904222A CN101282177B (zh) 2007-04-06 2007-04-06 一种数据传输方法和终端
CN200710090422.2 2007-04-06

Publications (1)

Publication Number Publication Date
WO2008122182A1 true WO2008122182A1 (en) 2008-10-16

Family

ID=39830464

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2007/071307 WO2008122182A1 (en) 2007-04-06 2007-12-21 A data transmission method and terminals

Country Status (3)

Country Link
US (1) US8311217B2 (zh)
CN (1) CN101282177B (zh)
WO (1) WO2008122182A1 (zh)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102754462B (zh) * 2010-05-12 2016-05-11 中兴通讯股份有限公司 一种实现移动终端转账的方法和业务平台
CN102130832B (zh) * 2011-03-02 2015-09-16 上海中兴思秸通讯有限公司 同轴网络中的终端注册方法及系统
WO2013082568A1 (en) * 2011-12-02 2013-06-06 Huawei Technologies Co., Ltd. Apparatus and method for registering a coaxial network unit on an optical network
CN103875255B (zh) * 2012-09-27 2017-10-24 华为技术有限公司 逻辑链路标记llid注册方法、装置及系统
WO2014098901A1 (en) * 2012-12-21 2014-06-26 Hewlett-Packard Development Company, L.P. Active component embedded in cable

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001076166A2 (en) * 2000-03-31 2001-10-11 Marconi Communications, Inc. Bidirectional transmission over a single optical fiber using different codes for upstream and downstream
US20050135609A1 (en) * 2003-12-18 2005-06-23 Hak-Phil Lee Gigabit Ethernet passive optical network for securely transferring data through exchange of encryption key and data encryption method using the same

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0957604B1 (en) * 1998-05-15 2005-11-30 Sony Deutschland Gmbh Transmitter and transmitting method increasing the flexibility of code assignment
KR100547722B1 (ko) * 2001-11-10 2006-02-01 삼성전자주식회사 기가비트 이더넷 수동 광 네트워크 시스템 및 그 매체접속 제어 방법
US20050166219A1 (en) * 2004-01-22 2005-07-28 Chen Annie O. Method and apparatus for providing access protection in a digital television distribution system
KR101227793B1 (ko) * 2005-05-03 2013-01-29 엘지전자 주식회사 단말과 네트워크간 무선 접속 설정 변경 방법
US7920866B2 (en) * 2005-07-07 2011-04-05 Alcatel-Lucent Usa Inc. Method of hard handover in a wireless communication system
KR100715679B1 (ko) * 2005-12-05 2007-05-09 한국전자통신연구원 인증 암호화를 통해 보안 전송을 가능하게 하는 gpon시스템 및 그 인증 암호화 방법
CN1897500A (zh) * 2006-05-11 2007-01-17 中国电信股份有限公司 一种应用于以太网无源光网络系统的搅动密钥更新与同步机制

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001076166A2 (en) * 2000-03-31 2001-10-11 Marconi Communications, Inc. Bidirectional transmission over a single optical fiber using different codes for upstream and downstream
US20050135609A1 (en) * 2003-12-18 2005-06-23 Hak-Phil Lee Gigabit Ethernet passive optical network for securely transferring data through exchange of encryption key and data encryption method using the same

Also Published As

Publication number Publication date
US20090323939A1 (en) 2009-12-31
CN101282177A (zh) 2008-10-08
US8311217B2 (en) 2012-11-13
CN101282177B (zh) 2010-11-03

Similar Documents

Publication Publication Date Title
CN111052672B (zh) 无证书或预共享对称密钥的安全密钥传输协议
US5311596A (en) Continuous authentication using an in-band or out-of-band side channel
CN107113594B (zh) 设备到设备通信系统的安全发送和接收发现消息的方法
US8509442B2 (en) Association, authentication, and security in a network
CN101765057B (zh) 一种向WiFi访问终端提供组播业务的方法、设备及系统
CN102202299A (zh) 一种基于3g/b3g的端到端语音加密系统的实现方法
CN103581901A (zh) 一种Wi-Fi无线网络接入配置信息的处理方法和设备
WO2015164999A1 (zh) 虚拟卡下载方法、终端及中间设备
US11552791B2 (en) Access technology agnostic service network authentication
CN111835997B (zh) 基于量子密钥加密的云视频会议系统及其加解密方法
WO2008122182A1 (en) A data transmission method and terminals
CN113194476B (zh) 一种设备激活及鉴权绑定方法
CN104812093B (zh) 用于智能家居的wifi设备接入网络的方法及装置
JP2005303449A (ja) 無線通信システム、アクセスポイント、端末および無線通信方法
US8942378B2 (en) Method and device for encrypting multicast service in passive optical network system
CN100571133C (zh) 媒体流安全传输的实现方法
US20110302416A1 (en) Method and system for secured communication in a non-ctms environment
JP4739419B2 (ja) イーサネットポンにおける保安チャネルの制御方法及び装置
CN101166177B (zh) 一种非接入层初始信令传送的方法及系统
CN111934995B (zh) 一种物联网网关系统
CN111132143A (zh) 一体化多媒体智能设备安全保护系统及方法
WO2024041498A1 (zh) 一种保密通信处理方法、第一终端及存储介质
EP3589028B1 (en) Management frame encryption and decryption
WO2021109998A1 (zh) 媒体内容传送方法、装置和存储介质
CN1322727C (zh) 无线网络系统的封包过滤的方法

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 07846133

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 12524899

Country of ref document: US

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 07846133

Country of ref document: EP

Kind code of ref document: A1