A method comprising generating an updated security key upon expiration of a key exchange timer, transferring the updated security key to a coaxial network unit (CNU), retaining an original key, wherein the updated security key comprises a different key identification number than the original key, accepting and decrypting upstream traffic that employs either the original key or the updated key, after transferring the updated security key to the CNU, creating a key switchover timer, before the key switchover timer expires, verify that upstream traffic transferred from the CNU on a logical link uses the updated security key, and when upstream traffic is encrypted using the updated security key, begin using the updated security key to encrypt downstream traffic and clear the key switchover timer.
|
4. A method comprising:
generating, by an optical line terminal (OLT), an updated security key upon expiration of a key exchange timer;
transferring, by the OLT, the updated security key to an endpoint, wherein the endpoint is at least one of a fiber coaxial unit (fcu) and a coaxial network unit (CNU), wherein the OLT transfers the updated security key to the fcu via a passive optical network (pon) when the endpoint is the fcu, and wherein the OLT transfers the updated security key to the CNU via the fcu and an ethernet pon over coaxial (epoc) network when the endpoint is the CNU;
retaining an original security key, wherein the updated security key comprises a different key identification number than the original security key;
accepting and decrypting upstream traffic that employs either the original security key or the updated security key;
after transferring the updated security key to the endpoint, creating a key switchover timer;
before the key switchover timer expires, verify that upstream traffic transferred from the endpoint on a logical link uses the updated security key; and
begin, in response to upstream traffic being encrypted using the updated security key, using the updated security key to encrypt downstream traffic and clear the key switchover timer.
1. An optical line terminal (OLT) comprising:
a receiver coupled to a passive optical network (pon) and configured to receive a security key request from a fiber coaxial unit (fcu) via the pon wherein the receiver is further configured to receive an upstream message from a coaxial network unit (CNU) via the fcu and an ethernet pon over coaxial (epoc) network;
a processor coupled to the receiver and configured to:
generate a first security key responsive to the security key request from the fcu;
encrypt the first security key in a security key response message;
encrypt a downstream message with the first security key;
decrypt the upstream first security key; and
initiate a switchover from the first security key to a second security key upon expiration of a timer;
a transmitter coupled to the processor and configured to transmit the security key response message comprising the encrypted first security key to the fcu via the pon, wherein the transmitter is further configured to transmit the downstream message toward the CNU via the fcu and the epoc network,
wherein the switchover comprises:
generating and encrypting the second security key by the processor;
transmitting the encrypted second security key toward the CNU by the transmitter;
encrypting downstream traffic with the first security key until the receiver receives upstream traffic from the CNU that is encrypted with the second security key; and
encrypting downstream traffic with the second security key in response to receiving upstream traffic that is encrypted with the second security key.
2. The OLT of
3. The OLT of
5. The method of
|
The present application claims priority to U.S. Provisional Patent Application 61/809,162, filed Apr. 5, 2013 by Yanbin Sun, et. al., and entitled “Method and Apparatus for Authentication and Initial Key Exchange in an Ethernet Passive Optical Network Protocol over Coax” and U.S. Provisional Patent Application 61/823,506, filed May 15, 2013 by Yanbin Sun, et. al., and entitled “Method and Apparatus for Authentication and Initial Key Exchange in an Ethernet Passive Optical Network Protocol over Coax”, both of which are incorporated herein by reference as if reproduced in their entirety.
Not applicable.
Not applicable.
A Passive Optical Network (PON) is one system for providing core network access to end users. A PON may be a Point-to-Multipoint (P2MP) network with passive splitters positioned in an Optical Distribution Network (ODN) to enable a single feeding fiber from a central office to serve multiple customer premises. PON may employ different wavelengths for upstream and downstream transmissions. Ethernet PON (EPON) is a PON standard developed by the Institute of Electrical and Electronics Engineers (IEEE) and specified in IEEE documents 802.3ah and 802.3av, both of which are incorporated herein by reference. Hybrid access networks employing both EPON and other network types have attracted growing attention.
In one embodiment, the disclosure includes a Fiber Coaxial Unit (FCU) comprising an optical interface configured to couple to an Optical Line Terminal (OLT) via a PON, a processor coupled to the optical interface, an electrical interface coupled to the processor and configured to couple to the Coaxial Network Unit (CNU) via an Ethernet PON over coaxial (EPoC) network, and forward a plurality of encrypted security keys to the CNU via the EPoC.
In another embodiment, the disclosure includes an OLT comprising a receiver coupled to a PON and configured to receive a security key request from an FCU via the PON, a processor coupled to the receiver and configured to generate a first security key responsive to the security key request from the FCU, and encrypt the first security key in a security key response message, and a transmitter coupled to the processor and configured to transmit the security key response message comprising the encrypted first security key to the FCU via the PON.
In another embodiment, the disclosure includes a method comprising generating an updated security key upon expiration of a key exchange timer, transferring the updated security key to a CNU, retaining an original key, wherein the updated security key comprises a different key identification number than the original key, accepting and decrypting upstream traffic that employs either the original key or the updated key, after transferring the updated security key to the CNU, creating a key switchover timer, before the key switchover timer expires, verify that upstream traffic transferred from the CNU on a logical link uses the updated security key, and when upstream traffic is encrypted using the updated security key, begin using the updated security key to encrypt downstream traffic and clear the key switchover timer.
These and other features will be more clearly understood from the following detailed description taken in conjunction with the accompanying drawings and claims.
For a more complete understanding of this disclosure, reference is now made to the following brief description, taken in connection with the accompanying drawings and detailed description, wherein like reference numerals represent like parts.
It should be understood at the outset that, although an illustrative implementation of one or more embodiments are provided below, the disclosed systems and/or methods may be implemented using any number of techniques, whether currently known or in existence. The disclosure should in no way be limited to the illustrative implementations, drawings, and techniques illustrated below, including the exemplary designs and implementations illustrated and described herein, but may be modified within the scope of the appended claims along with their full scope of equivalents.
An EPoC system may be a hybrid access network employing both optical and coaxial technologies. The EPoC may comprise an optical segment that may comprise a PON, and a coaxial segment that may comprise a coaxial cable network. In the PON segment, an OLT may be positioned in a local exchange or central office where the OLT may connect the EPoC access network to an Internet Protocol (IP), Synchronous Optical Network (SONET), and/or Asynchronous Transfer Mode (ATM) backbone. In the coaxial segment, CNUs may be positioned at end-user locations, and each CNU may serve a plurality (e.g. three to four) of end users which may be known as subscribers. An FCU may merge the interface between the PON segment and the coaxial segment of the network. The FCU may be a single box unit that may be located where the optical and electrical networks are coupled together, for example, at a curb or at a basement of an apartment building.
PON systems may be assumed secure as all elements of a PON system may be controlled by a PON operator. CNUs may be positioned on a customer premises, and, due to the passive tree transmission nature of an EPoC network, each CNU may receive data directed to other CNUs. As each CNU may receive other CNUs data, CNUs may be subjected to eavesdropping, and may not be considered secure. As such, EPoC CNUs may create security concerns that may not be present in optical only networks.
Disclosed herein are mechanisms to exchange and update security keys with CNUs in an EPoC network. The keys may be employed to encrypt and/or decrypt messages to defeat eavesdropping by listeners other than the intended CNU. In an embodiment, the CNU may request and receive a security key from an OLT upon being authenticated into an EPoC network. The key may be encrypted to prevent the key from being obtained by other listeners. The FCU positioned between the OLT and CNU, may act as a repeater, and may transparently pass the key to the CNU. In another embodiment, the FCU may be configured in a bridge mode and may act as a proxy by generating key(s) and/or maintaining separate security domains in the optical network and the electrical network. Such keys may be employed to encrypt downstream messages only and/or bi-directional messages. The FCU and/or OLT may further transfer updated security keys upon expiration of a timer. The OLT and/or FCU may also verify that a switchover to an updated key is successful.
The optical domain 150 of the network 100 may comprise a PON. The optical domain 150 may be a communications network that may not require active components to distribute data between the OLT 110 and the FCU 120. Instead, the optical domain 150 may employ the passive optical components in the ODN 115 to distribute data between the OLT 110 and the FCU 120. Examples of suitable protocols that may be implemented in the optical domain 150 may include asynchronous transfer mode PON (APON) or broadband PON (BPON) defined by the International Telecommunication Union (ITU) Telecommunication Standardization Sector (ITU-T) document G.983, Gigabit PON (GPON) defined by ITU-T document G.984, the EPON defined by IEEE documents 802.3ah and 802.3av, all of which are incorporated by reference as if reproduced in their entirety, the wavelength division multiplexing (WDM) PON (WDM-PON), and the Next Generation EPON (NGEPON) in development by IEEE.
The OLT 110 may be any device configured to communicate with the CNUs 130 via the FCU 120. The OLT 110 may act as an intermediary between the FCUs 120 and/or CNUs 130 and another backbone network (e.g. the Internet). The OLT 110 may forward data received from a backbone network to the FCUs 120 and/or CNUs 130 and forward data received from the FCUs 120 or CNUs 130 onto the backbone network. Although the specific configuration of the OLT 110 may vary depending on the type of optical protocol implemented in the optical domain 150, in an embodiment, OLT 110 may comprise an optical transmitter and an optical receiver. When the backbone network employs a network protocol that is different from the protocol used in the optical domain 150, OLT 110 may comprise a converter that may convert the backbone network protocol into the protocol of the optical domain 150. The OLT converter may also convert the optical domain 150 protocol into the backbone network protocol. In an embodiment, the OLT 110 may be configured to act as a Data Over Cable Service Interface Specification (DOCSIS) device, and may implement a DOCSIS Provisioning of EPON (DPoE) scheme and/or a DOCSIS Provisioning of GPON (DPoG) scheme as discussed in DOCSIS document DPoE-SP-IPNEv1.0-106-130808, which is incorporated by reference.
The ODN 115 may be a data distribution system that may comprise optical fiber cables, couplers, splitters, distributors, and/or other equipment. In an embodiment, the optical fiber cables, couplers, splitters, distributors, and/or other equipment may be passive optical components. Specifically, the optical fiber cables, couplers, splitters, distributors, and/or other equipment may be components that do not require any power to distribute data signals between the OLT 110 and the FCU 120. It should be noted that the optical fiber cables may be replaced by any optical transmission media in some embodiments. In some embodiments, the ODN 115 may comprise one or more optical amplifiers. In some embodiments, data distributed across the ODN may be combined with cable television (CATV) services using multiplexing schemes. The ODN 115 may extend from the OLT 110 to the FCU 120 and any optional ONUs 170 in a branching configuration as shown in
The FCU 120 may be any device or component configured to forward downstream data from the OLT 110 to the corresponding CNUs 130 and forward upstream data from the CNUs 130 to the OLT 110. The FCU 120 may convert the downstream and upstream data appropriately to transfer the data between the optical domain 150 and the coaxial domain 152. The data transferred over the ODN 115 may be transmitted and/or received in the form of optical signals, and the data transferred over the EDN 135 may be transmitted and/or received in the form of electrical signals that may have the same or different logical structure as compared with the optical signals. As such, the FCU 120 may encapsulate or frame the data in the optical domain 150 and the coaxial portion 152 differently. In an embodiment, the FCU 120 may include a Media Access Control (MAC) layer and physical (PHY) layers, corresponding to the type of signals carried over the respective media. The MAC layer may provide addressing and channel access control services to the PHY layers. As such, the PHY may comprise an optical PHY and a coaxial PHY. In many embodiments, the FCU 120 may be transparent to the CNU 130 and OLT 110 in that the frames sent from the OLT 110 to the CNU 130 may be directly addressed to the CNU 130 (e.g. in the destination address), and vice-versa. As such, the FCU 120 may intermediate between network portions, namely an optical domain 150 and a coaxial portion 152 in the example of
The ONUs 170 may be any devices that are configured to communicate with the OLT 110 and may terminate the optical domain 150 of the network. The ONUs 170 may present customer service interfaces to end users.
The coaxial domain 152 of the network 100 may be similar to any known electrical communication system. The coaxial domain 152 may not require any active components to distribute data between the FCU 120 and the CNU 130. Instead, the coaxial domain 152 may use the passive electrical components in the EDN 135 to distribute data between the FCU 120 and the CNUs 130. Alternatively, the coaxial domain 152 may use some active components, such as amplifiers. Examples of suitable protocols that may be implemented in the coaxial domain 152 include Multimedia over Coax Alliance (MoCA), G.hn, Home Phoneline Networking Alliance (HPNA), and Home Plug A/V.
The EDN 135 may be a data distribution system that may comprise electrical cables (e.g. coaxial cables, twisted wires, etc.), couplers, splitters, distributors, and/or other equipment. In an embodiment, the electrical cables, couplers, splitters, distributors, and/or other equipment may be passive electrical components. Specifically, the electrical cables, couplers, splitters, distributors, and/or other equipment may be components that do not require any power to distribute data signals between the FCU 120 and the CNU 130. It should be noted that the electrical cables may be replaced by any electrical transmission media in some embodiments. In some embodiments, the EDN 135 may comprise one or more electrical amplifiers. The EDN 135 may extend from the FCU 120 to the CNU 130 in a branching configuration as shown in
In an embodiment, the CNUs 130 may be any devices that are configured to communicate with the OLT 110, the FCU 120, and any subscriber devices 140. The CNUs 130 may act as intermediaries between the FCU 120 and the subscriber devices 140. For instance, the CNUs 130 may forward data received from the FCU 120 to the subscriber devices 140, and may forward data received from the subscriber devices 140 toward the OLT 110. Although the specific configuration of the CNUs 130 may vary depending on the type of network 100, in an embodiment, the CNUs 130 may comprise an electrical transmitter configured to send electrical signals to the FCU 120 and an electrical receiver configured to receive electrical signals from the FCU 120. Additionally, the CNUs 130 may comprise a converter that may convert FCU 120 electrical signals into electrical signals for the subscriber devices 140, such as signals in IEEE 802.11 wireless local area network (WiFi) protocol. The CNUs 130 may further comprise a second transmitter and/or receiver that may send and/or receive the converted electrical signals to the subscriber devices 140. The CNUs 130 may be typically located at distributed locations, such as the customer premises, but may be located at other locations as well.
The subscriber devices 140 may be any devices configured to interface with a user or a user device. For example, the subscribed devices 140 may include cable modems (CMs) desktop computers, laptop computers, tablets, mobile telephones, residential gateways, televisions, set-top boxes (STBs), and similar devices.
Due to the nature of fiber optic communications, PONs such as ODN 115 may be naturally secure from eavesdropping and other forms of security threats. As such, PONs may not generally transport encrypted communications. In contrast, electrical networks such as EDN 135 may be susceptible to such security threats, for example because electrical lines may be passively monitored without interrupting a connection. Further, unauthorized devices may attempt to take advantage of the broadcast nature of an EPoC network to eavesdrop on communications received at a first CNU 130 that are intended for an unrelated second CNU 130. Additionally, unauthorized devices may actively attempt to impersonate an authorized CNU 130. As such, EDN 135 may not be considered secure. Accordingly, network 100 may employ any of the protocols discussed herein to encrypt and exchange security keys between an OLT 110, a specific FCU 120, and a specific CNU 130. Once keys are securely exchanged, network 100 may encrypt and/or decrypt communications by employing the keys. Further, keys may be set to expire, for example based on a timer. Network 100 may employ any of the protocols disclosed herein to switchover from a first key/set of keys to a second key/set of keys and/or verify completion of the switchover.
It is understood that by programming and/or loading executable instructions onto the NE 200, at least one of the processor 230, memory device 232, Tx/Rx 210, downstream ports 220, and/or upstream ports 250 are changed, transforming the NE 200 in part into a particular machine or apparatus, e.g., a multi-core forwarding architecture, having the novel functionality taught by the present disclosure. It is fundamental to the electrical engineering and software engineering arts that functionality that can be implemented by loading executable software into a computer can be converted to a hardware implementation by well-known design rules. Decisions between implementing a concept in software versus hardware typically hinge on considerations of stability of the design and numbers of units to be produced rather than any issues involved in translating from the software domain to the hardware domain. Generally, a design that is still subject to frequent change may be preferred to be implemented in software, because re-spinning a hardware implementation is more expensive than re-spinning a software design. Generally, a design that is stable that will be produced in large volume may be preferred to be implemented in hardware, for example in an ASIC, because for large production runs the hardware implementation may be less expensive than the software implementation. Often a design may be developed and tested in a software form and later transformed, by well-known design rules, to an equivalent hardware implementation in an ASIC that hardwires the instructions of the software. In the same manner as a machine controlled by a new ASIC is a particular machine or apparatus, likewise a computer that has been programmed and/or loaded with executable instructions may be viewed as a particular machine or apparatus.
CNU authentication may be performed at step 310 by performing steps 311, 313, 315, and/or 317. At step 311, the CNU may transmit a Transport Layer Security (TLS) client hello message to the OLT, which may initiate a handshake with the OLT. At step 313, in response to the TLS client hello, the OLT may transmit one or more messages comprising a TLS server hello, a certificate request to request a certificate from the CNU, and a TLS hello done to indicate that the handshake is complete. At step 315, the CNU may transmit the requested TLS certificate to the OLT. The certificate may be employed by the OLT to verify that the CNU is an authorized CNU and not an intruder. The CNU may further transmit certificate verify and/or finished message(s) to request that the OLT verify the certificate and indicate that the certificate transmission is complete. At step 317, the OLT may transmit a certificate finished message to indicate that the certificate is verified and the CNU is authenticated. It should be noted that the OLT may also transmit a separate success message to indicate successful verification in some embodiments.
At step 320, the OLT may exchange security keys with the CNU for use in communication encryption by employing steps 321, 323, and/or 325. At step 321, the CNU may transmit an initiate key exchange request to the OLT. The initiate key exchange request may comprise a public key for the CNU. At step 323, the OLT may select a random Secure Attention Key (SAK) for communications with the CNU. The SAK may be encrypted with a Rivest, Shamir, Adleman (RSA) algorithm by employing the public key from the CNU. The OLT may then transmit RSA encrypted SAK to the CNU along with a hash of the SAK, which may be employed by the CNU to validate the SAK. At step 325, the CNU may employ a private key associated with the public key to decrypt and validate the SAK. The CNU may then transmit an acknowledgment to the OLT to indicate that the SAK has been received and/or installed. The public key and private key may be selected in accordance to ITU-T document recommendation X.509, which is incorporated by reference. Once decrypted and/or installed on the CNU, the SAK may be employed to encrypt/decrypt downstream and/or upstream communications between the OLT and the CNU, in order to ensure the CNU and the OLT (but not unauthorized devices) can decrypt the communications. Method 300 may be employed to prevent CNUs and/or unauthorized devices connected to the CNUs from eavesdropping on downstream communications associated with other CNUs. As such, each CNU on a tree from the OLT may receive downstream frames for all other CNUs on the tree. However, each CNU may only be capable of decrypting its own frames. Further, unauthorized listening devices positioned between the CNU and the OLT may be unable to decrypt frames transmitted between the OLT and CNU (e.g. upstream and/or downstream).
At step 515, the CNU may initiate bidirectional authentication by transmitting a TLS certificate upon receiving the certificate request of step 513. The CNU may also transmit a client key exchange message, and/or a certificate verify message to request verification of the certificate. The CNU may generate a PMS to include in the client key exchange message, which may be employed by the FCU when generating an associated SAK. The PMS value may be encrypted using an RSA algorithm and a public key associated with the FCU. The FCU may be aware of the private key associated with the public key and may employ the private key to decrypt the PMS. A bridge mode FCU may not comprise a certificate and/or authentication function, so the FCU may relay the CNU TLS certificate and the certificate verify to the OLT at step 516 in a manner similar to step 416. The OLT may transmit a certificate finished message at step 517 to acknowledge receipt of the certificate in a manner similar to step 417. At step 518, the OLT may further transmit a success message to indicate successful authentication of the CNU certificate.
Upon receiving the success message of step 518, the FCU may perform step 520 to generate the SAK for message encryption. For example, the PMS received from the CNU at step 515 may be employed to generate a Connectivity Association Key (CAK). An Advanced Encryption Standard (AES) Cipher-based Message Authentication Code (CMAC) may be applied to the CAK to generate a Key Encryption Key (KEK). AES CMAC is discussed in Internet Engineering Task Force (IETF) document Request For Comment (RFC) 4493, which is incorporated by reference. CAK and KEK are discussed in IEEE document 802.1x, which is incorporated by reference. The FCU may employ a Random Number Generator (RNG) to generate a random SAK and encrypt the SAK using the KEK by employing an AES key wrap algorithm as discussed in IETF document RFC 3394, which is incorporated by reference. The encrypted SAK may be transmitted to the CNU using a MACsec Key Agreement (MKA) protocol message as discussed in IEEE 802.1AE, which is incorporated by reference.
At step 521, the CNU may generate the KEK from the PMS in a manner similar to step 520. Upon receiving the MKA message from step 523, the CNU may employ the derived KEK to decrypt the message and obtain the SAK. The SAK may then be employed by the CNU and/or FCU to encrypt upstream and/or downstream communications across the electrical domain. Such communications may be encrypted/decrypted by the FCU for transmission to/from the optical domain. Such communications may be encrypted when transmitted across the optical domain by employing a key transmitted in step 501, employing some other encryption mechanism, and/or may be transmitted in plain text.
At step 728, the FCU may have received the updated/new SAK. The FCU may continue to employ the current/old SAK until use by the CNU is detected to prevent messages already in transit from becoming unusable by the CNU (e.g. in case such messages arrive before the updated SAK is configured at the CNU). At step 729, the CNU may receive the updated SAK and may begin employing the updated SAK for all upstream communications. As the FCU sent the updated SAK, the CNU may assume the FCU can already employ the updated SAK. The CNU may also retain the current SAK for decrypting downstream communications until the switchover is complete. At step 731, all upstream communications may employ the updated SAK, while all downstream communications may continue to employ the current SAK. The FCU may maintain both the updated and the current key and may accept and decrypt any received cipher-text with either key. At step 733, the FCU may receive a message from the CNU that employs the updated key. The FCU may detect that the message employs the updated key by key identification data stored in the frame preamble of the message. The FCU may then switchover and begin transmitting all downstream messages with the updated key. At step 735, both downstream and upstream communications may employ the updated SAK. At step 737, the CNU may begin receiving downstream communications encrypted by the updated key, at which point the SAK usage may be synchronized and switchover may be considered complete. The updated SAK may be employed for bidirectional communication until the updated SAK expires, for example due to a timer expiration. Such a timer may be initiated upon transmission of the MKA message at step 723 and/or 724, upon synchronization detection at step 733, and/or any other step in method 700. Upon expiration of the timer, the updated SAK may be treated as a current/old SAK and another updated/new SAK may be assigned via method 700.
In summary of the material discussed herein, this disclosure describes extensions to DPoE specifications to support subscriber data privacy and traffic encryption in an EPoC network. Subscriber data privacy may include device authentication and key exchanges to verify that FCU and CNU (and accompanying certificates) can ensure data path encryption for subscriber data. In an EPoC Network, the DPoE System may use the FCU fiber interface (FCU-F) MAC address as the identity of the FCU, and use the CNU MAC address as the identity of the CNU. When a CNU that is connected to a repeater FCU (R-FCU) is powered on, each logical link may report its MAC address to the DPoE System through a Multi-Point Control Protocol (MPCP) discovery process. When a CNU that is connected to bridge FCU (B-FCU) is powered on, the CNU may register its logical links with the B-FCU. The B-FCU may report the MAC address of each logical link to the DPoE System using an OAM message as discussed herein. When a B-FCU or an R-FCU is powered on, it may report each logical link coupled to the EPON to the DPoE System.
In an EPoC network the DPoE System (e.g. in the OLT) may authenticate each CNU and FCU using ITU-T X.509 certificates as specified herein. This disclosure specifies mechanisms and protocols to support bidirectional traffic encryption between a DPoE System and a CNU through an R-FCU, bidirectional traffic encryption between an B-FCU and a CNU over a coax link, and bidirectional traffic encryption between a DPoE System and a B-FCU over an EPON link.
An EPoC Network with a Repeater FCU, a DPoE System and a CNU may support bidirectional end-to-end traffic encryption and CNU authentication as specified herein. In an EPoC Network with a Bridge FCU, the traffic may be encrypted in two separate domains: the optical domain and coax domain. The B-FCU and CNU may support bidirectional traffic encryption in the coax domain as specified herein. The DPoE System and the B-FCU may support bidirectional traffic encryption in the optical domain as specified herein. To be able to forward traffic, B-FCU may decrypt traffic received from any one of the two domains. The B-FCU may encrypt traffic before forwarding it to the coax domain, when the coax domain uses different encryption keys. The B-FCU may encrypt traffic before forwarding it to the optical domain, when the optical domain uses different encryption keys.
The DPoE System may authenticate CNUs using X.509 certificates which may be retrieved using an Extensible Authentication Protocol (EAP)-TLS as discussed herein. The DPoE System may validate the CNU certificates and deny service to CNUs that present invalid certificates. Once the CNU has been successfully authenticated, LLID traffic can be encrypted using keys that are exchanged using the key exchange protocol specified herein.
When a key exchange occurs, the DPoE System may create a timer initialized to a configured value which may be at least 10 seconds and may not exceed 65,535 seconds. This timer may be used for a Key Exchange Timer Expiration Event. When a given logical link has been configured as a secure channel, the DPoE System may generate a 128-bit random key string associated with the link. The key string may be used to encrypt and decrypt data between the DPoE System and the CNU. New keys may be transmitted to the CNU using the MACSec Key Agreement (MKA) protocol. The key exchange mechanism may expire keys to limit the useful lifetime of a successful key extraction attack. The expiration of the key exchange timer may trigger the DPoE System to generate a new security key and transfer the new key to the CNU. The DPoE System may retain the original key and may transfer the new key with a different key identification number from the original. The DPoE System may accept and decrypt cipher-text with either the active or the next key. The key identification number transferred in the preamble of the cipher-text may identify the encryption key used by the CNU for that frame.
After transferring a new-SAK to a CNU, the DPoE System may create a key switchover timer. Before this timer expires, the DPoE System may verify that the CNU is transferring cipher-text on the upstream logical link using the new-SAK. If the upstream logical link is still receiving plain-text, or traffic encrypted with the previous key when the key switchover timer expires, the DPoE System may signal an alarm to a management software, and may retransmit the key to the CNU. If after three consecutive attempts, the DPOE System does not detect that the upstream traffic on the logical link is using the new-SAK, the DPOE System may deregister the logical link. If the upstream traffic is encrypted using the new-SAK, the DPoE System may start using the new-SAK to encrypt downstream traffic and clear the key switchover timer
A DPoE System and B-FCU may support authentication and bidirectional key exchange procedures as described herein. The authentication and bidirectional key exchange procedure between DPoE System and B-FCU may be similar to bidirectional procedures used between a DPoE System and a CNU with an R-FCU. After a CNU has successfully registered to a B-FCU, the DPoE System may employ procedures as discussed herein to authenticate the CNU. A DPoE System, B-FCU, and a CNU may use the key exchange procedures described herein to support bidirectional encryption over coax link. The DPoE System may send the MSK to B-FCU using an OAM message. When the B-FCU receives the OAM message the B-FCU may generate a CAK, KEK, and a new SAK. When a SAK is successfully installed in the CNU, the CNU may encrypt frames transmitted using the SAK. The B-FCU may decrypt frames received from the CNU using the same SAK. The B-FCU may encrypt the frame using the optical domain SAK prior to upstream transmission, when the optical domain SAK is different from the SAK of the coax domain. In the downstream direction, the B-FCU may decrypt frames received from the DPoE System using the optical domain SAK. The B-FCU may process decrypted frames to determine the forwarding behavior for every frame. Prior to transmitting a frame to the CNU, the B-FCU may encrypt the frame using the coaxial domain SAK, when the optical domain SAK is different from the SAK of the coax domain.
When a key exchange occurs, the B-FCU may create a timer initialized to a configured value which may be at least ten seconds and may not exceed 65,535 seconds. When this timer expires, the B-FCU may generate a new SAK. When a given CNU logical link has been configured as a secure channel, the B-FCU may generate a 128 bit random key string associated with the link. The key string (e.g. SAK) may be used to encrypt and decrypt data between the B-FCU and the CNU. The first time the SAK is generated may be when the B-FCU receives an MSK from a DPoE System. Afterwards the B-FCU may generate the SAK when the key exchange timer expires. New keys may be sent to the CNU using the MKA protocol. After the B-FCU has sent a new SAK to the CNU, the B-FCU may start a switchover timer. The B-FCU may retain the current SAK and the new SAK. The B-FCU may continue to use the current-SAK for downstream traffic encryption until it detects that the CNU upstream traffic is encrypted with the new SAK. As shown in
At least one embodiment is disclosed and variations, combinations, and/or modifications of the embodiment(s) and/or features of the embodiment(s) made by a person having ordinary skill in the art are within the scope of the disclosure. Alternative embodiments that result from combining, integrating, and/or omitting features of the embodiment(s) are also within the scope of the disclosure. Where numerical ranges or limitations are expressly stated, such express ranges or limitations should be understood to include iterative ranges or limitations of like magnitude falling within the expressly stated ranges or limitations (e.g. from about 1 to about 10 includes, 2, 3, 4, etc.; greater than 0.10 includes 0.11, 0.12, 0.13, etc.). For example, whenever a numerical range with a lower limit, Rl, and an upper limit, Ru, is disclosed, any number falling within the range is specifically disclosed. In particular, the following numbers within the range are specifically disclosed: R=Rl+k*(Ru−Rl), wherein k is a variable ranging from 1 percent to 100 percent with a 1 percent increment, i.e., k is 1 percent, 2 percent, 3 percent, 4 percent, 7 percent, . . . , 70 percent, 71 percent, 72 percent, . . . , 97 percent, 96 percent, 97 percent, 98 percent, 99 percent, or 100 percent. Moreover, any numerical range defined by two R numbers as defined in the above is also specifically disclosed. Unless otherwise stated, the term “about” means±10% of the subsequent number. Use of the term “optionally” with respect to any element of a claim means that the element is required, or alternatively, the element is not required, both alternatives being within the scope of the claim. Use of broader terms such as comprises, includes, and having should be understood to provide support for narrower terms such as consisting of, consisting essentially of, and comprised substantially of. Accordingly, the scope of protection is not limited by the description set out above but is defined by the claims that follow, that scope including all equivalents of the subject matter of the claims. Each and every claim is incorporated as further disclosure into the specification and the claims are embodiment(s) of the present disclosure. The discussion of a reference in the disclosure is not an admission that it is prior art, especially any reference that has a publication date after the priority date of this application. The disclosure of all patents, patent applications, and publications cited in the disclosure are hereby incorporated by reference, to the extent that they provide exemplary, procedural, or other details supplementary to the disclosure.
While several embodiments have been provided in the present disclosure, it should be understood that the disclosed systems and methods might be embodied in many other specific forms without departing from the spirit or scope of the present disclosure. The present examples are to be considered as illustrative and not restrictive, and the intention is not to be limited to the details given herein. For example, the various elements or components may be combined or integrated in another system or certain features may be omitted, or not implemented.
In addition, techniques, systems, subsystems, and methods described and illustrated in the various embodiments as discrete or separate may be combined or integrated with other systems, modules, techniques, or methods without departing from the scope of the present disclosure. Other items shown or discussed as coupled or directly coupled or communicating with each other may be indirectly coupled or communicating through some interface, device, or intermediate component whether electrically, mechanically, or otherwise. Other examples of changes, substitutions, and alterations are ascertainable by one skilled in the art and could be made without departing from the spirit and scope disclosed herein.
Chen, Jim, Zhang, Li, Wu, Guangsheng, Sun, Yanbin
Patent | Priority | Assignee | Title |
10686595, | Nov 17 2017 | Hewlett Packard Enterprise Development LP | Configuring connectivity association key and connectivity association name in a media access control security capable device |
11700390, | Dec 26 2019 | BYTEDANCE INC. | Profile, tier and layer indication in video coding |
11743505, | Dec 26 2019 | BYTEDANCE INC. | Constraints on signaling of hypothetical reference decoder parameters in video bitstreams |
11765393, | Dec 27 2019 | BYTEDANCE INC. | Syntax for signaling video subpictures |
11778220, | Dec 26 2019 | BYTEDANCE INC. | Constraints on signaling of video layers in coded bitstreams |
11812062, | Dec 27 2019 | BYTEDANCE INC | Syntax for signaling video subpictures |
11831894, | Dec 26 2019 | BYTEDANCE INC | Constraints on signaling of video layers in coded bitstreams |
11843726, | Dec 26 2019 | BYTEDANCE INC. | Signaling of decoded picture buffer parameters in layered video |
11876995, | Dec 26 2019 | BYTEDANCE INC. | Signaling of slice type and video layers |
Patent | Priority | Assignee | Title |
20050113024, | |||
20050135609, | |||
20050201564, | |||
20080247550, | |||
20110004760, | |||
20110058813, | |||
20110317834, | |||
CN101388818, | |||
CN101715099, | |||
EP1534027, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Apr 01 2014 | CHEN, JIM | FUTUREWEI TECHNOLOGIES, INC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 032608 | /0729 | |
Apr 02 2014 | Futurewei Technologies, Inc. | (assignment on the face of the patent) | / | |||
Apr 02 2014 | SUN, YANBIN | FUTUREWEI TECHNOLOGIES, INC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 032608 | /0729 | |
Apr 02 2014 | WU, GUANGSHENG | FUTUREWEI TECHNOLOGIES, INC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 032608 | /0729 | |
Apr 02 2014 | ZHANG, LI | FUTUREWEI TECHNOLOGIES, INC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 032608 | /0729 |
Date | Maintenance Fee Events |
Aug 08 2019 | M1551: Payment of Maintenance Fee, 4th Year, Large Entity. |
Aug 09 2023 | M1552: Payment of Maintenance Fee, 8th Year, Large Entity. |
Date | Maintenance Schedule |
Feb 23 2019 | 4 years fee payment window open |
Aug 23 2019 | 6 months grace period start (w surcharge) |
Feb 23 2020 | patent expiry (for year 4) |
Feb 23 2022 | 2 years to revive unintentionally abandoned end. (for year 4) |
Feb 23 2023 | 8 years fee payment window open |
Aug 23 2023 | 6 months grace period start (w surcharge) |
Feb 23 2024 | patent expiry (for year 8) |
Feb 23 2026 | 2 years to revive unintentionally abandoned end. (for year 8) |
Feb 23 2027 | 12 years fee payment window open |
Aug 23 2027 | 6 months grace period start (w surcharge) |
Feb 23 2028 | patent expiry (for year 12) |
Feb 23 2030 | 2 years to revive unintentionally abandoned end. (for year 12) |