Search

CN-122002153-A - Method, apparatus, device and medium for passive optical network activation

CN122002153ACN 122002153 ACN122002153 ACN 122002153ACN-122002153-A

Abstract

Example embodiments of the present disclosure relate to methods, apparatus, devices, and media for passive optical network activation. According to an example embodiment of the present disclosure, a first device receives a key control message from a second device during a key exchange. The key control message instructs the first device to generate a key by employing an encryption algorithm to be used and transmit the key, or to confirm the key corresponding to the encryption algorithm currently used. The key control message also instructs the first device to generate a key report based on the key control message and to send the key report to the second device. In this way, the key and the encryption algorithm in the communication process of the first device and the second device can be matched, and the stability of the channel operation is improved.

Inventors

  • GENG DAN
  • W. Van Hoff
  • LU HAIJUN

Assignees

  • 诺基亚通信(上海)股份有限公司
  • 诺基亚通信公司

Dates

Publication Date
20260508
Application Date
20241028

Claims (20)

  1. 1. A first apparatus for a Passive Optical Network (PON), comprising: At least one processor, and At least one memory storing instructions that, when executed by the at least one processor, cause the first apparatus to at least: receiving a key control message from a second device during a key exchange, the key control message indicating the first device: By generating a key by employing an encryption algorithm to be used and transmitting the key, or Confirming a key corresponding to the currently used encryption algorithm; generating a key report based on the key control message, and The key report is sent to the second device.
  2. 2. The first apparatus of claim 1, wherein generating the key report comprises: If it is determined that the key control message indicates that the first device generates the key by employing the encryption algorithm to be used and transmits the key, generates the key by the encryption algorithm to be used, and The key report is generated, the key report indicating the key and the encryption algorithm used to generate the key.
  3. 3. The first device of claim 2, wherein the instructions, when executed by the at least one processor, further cause the first device to: Reporting the key and the encryption algorithm to the second device if it is determined that another key control message is received from the second device indicating that the first device confirms a key corresponding to the currently used encryption algorithm, and Use of the key for communication between the first device and the second device is initiated.
  4. 4. The first apparatus of claim 1, wherein generating the key report comprises: If it is determined that the key control message indicates that the first device confirms a key corresponding to the currently used encryption algorithm, generating the key report, the key report indicating the key and the currently used encryption algorithm.
  5. 5. The first device of claim 4, wherein the instructions, when executed by the at least one processor, further cause the first device to: the key is maintained for use in communication between the first device and the second device.
  6. 6. The first apparatus of claim 1, wherein the first apparatus uses a first key corresponding to a first encryption algorithm, and wherein generating the key report further comprises: removing a configuration associated with an optical network unit management and control interface OMCI if it is determined that a management information base MIB reset message is received, while maintaining use of the first key; Generating a second key based on the key control message if it is determined that receipt of the key control message indicates the first device to generate and transmit a second key corresponding to a second encryption algorithm, the second encryption algorithm being the same as or different from the first encryption algorithm, and The key report is sent to the second device, the key report indicating the second key and the second encryption algorithm.
  7. 7. The first device of claim 6, wherein the second encryption algorithm is a default encryption algorithm.
  8. 8. The first device of claim 1, wherein the first device uses a first key corresponding to a first encryption algorithm, and wherein the instructions, when executed by the at least one processor, further cause the first device to: removing a configuration associated with an optical network unit management and control interface OMCI if it is determined that a management information base MIB reset message is received, while maintaining use of the first key; if it is determined that receipt of the key control message indicates that the first device confirms the first key corresponding to the currently used first encryption algorithm, maintaining use of the first key for communication between the first device and the second device, and The key report is sent to the second device, the key report indicating the first key and the first encryption algorithm.
  9. 9. The first apparatus of any of claims 1-8, wherein the key control message is received in a physical layer operations, administration, and maintenance PLOAM message.
  10. 10. The first apparatus of any of claims 6-8, wherein the MIB reset message is received through the OMCI.
  11. 11. The first device according to claim 1, wherein the first device comprises an optical network unit, ONU, and the second device comprises an optical line terminal, OLT.
  12. 12. A second apparatus for a Passive Optical Network (PON), comprising: At least one processor, and At least one memory storing instructions that, when executed by the at least one processor, cause the second apparatus to at least: transmitting a key control message to a first device during a key exchange, the key control message indicating the first device: By generating a key by employing an encryption algorithm to be used and transmitting the key, or Validating a key corresponding to the currently used encryption algorithm, and A key report is received from the first device, the key report generated by the first device based on the key control message.
  13. 13. The second device of claim 12, wherein the key control message is sent in a physical layer operations, administration, and maintenance PLOAM message.
  14. 14. The second device of claim 12, wherein the instructions, when executed by the at least one processor, further cause the second device to: The key report is received, the key report indicating the key generated by employing the encryption algorithm and the encryption algorithm to be used.
  15. 15. The second device of claim 12, wherein the instructions, when executed by the at least one processor, further cause the second device to: And receiving the key report, wherein the key report indicates the key corresponding to the currently used encryption algorithm and the currently used encryption algorithm.
  16. 16. The second apparatus according to claim 12, wherein the first apparatus comprises an optical network unit, ONU, and the second apparatus comprises an optical line terminal, OLT.
  17. 17. A method of communication, comprising: Receiving a key control message from a second device during a key exchange, the key control message indicating to the first device: By generating a key by employing an encryption algorithm to be used and transmitting the key, or Confirming a key corresponding to the currently used encryption algorithm; generating a key report based on the key control message, and The key report is sent to the second device.
  18. 18. A method of communication, comprising: transmitting a key control message to a first device during a key exchange, the key control message indicating the first device: By generating a key by employing an encryption algorithm to be used and transmitting the key, or Validating a key corresponding to the currently used encryption algorithm, and A key report is received from the first device, the key report generated by the first device based on the key control message.
  19. 19. An apparatus for communication, comprising: Means for receiving a key control message from a second device during a key exchange, the key control message indicating to the first device: By generating a key by employing an encryption algorithm to be used and transmitting the key, or Confirming a key corresponding to the currently used encryption algorithm; means for generating a key report based on the key control message, and Means for sending the key report to the second device.
  20. 20. An apparatus for communication, comprising: Means for sending a key control message to a first device during a key exchange, the key control message indicating the first device: By generating a key by employing an encryption algorithm to be used and transmitting the key, or Validating a key corresponding to the currently used encryption algorithm, and Means for receiving a key report from the first apparatus, the key report generated by the first apparatus based on the key control message.

Description

Method, apparatus, device and medium for passive optical network activation Technical Field Example embodiments of the present disclosure relate to the field of communications technology, and more particularly, to methods, apparatus, devices, and computer-readable media for passive optical network activation. Background With the rapid development of modern communication technology, the construction and optimization of network infrastructure has become an important factor in promoting the development of information society. Optical fiber communication is widely applied and popularized as a transmission medium with high bandwidth and low loss. Among many optical fiber communication technologies, passive optical networks (Passive Optical Network, PON) are a major choice for broadband access networks such as Fiber To The Home (FTTH) because of their high efficiency and economy. The architecture design of the passive optical network aims at reducing the number of active devices in the network, distributing signals to a plurality of users through an optical fiber distribution network, and reducing construction and maintenance costs. With the continuous progress of technology, new passive optical network technologies and activation methods are proposed, and these technologies not only improve the performance and stability of the network, but also provide more possibilities for future network development. Therefore, the research and optimization of the activation process of the passive optical network are of great significance for improving the overall network performance. Disclosure of Invention In a first aspect of the present disclosure, a first apparatus for passive optical network activation is provided. The first device includes at least one processor and at least one memory storing instructions that, when executed by the at least one processor, cause the first device to at least receive a key control message from a second device during a key exchange, the key control message instructing the first device to generate a key by employing an encryption algorithm to be used and send the key, or to confirm the key corresponding to the currently used encryption algorithm, generate a key report based on the key control message, and send the key report to the second device. In a second aspect of the present disclosure, a second apparatus for passive optical network activation is provided. The second device includes at least one processor and at least one memory storing instructions that, when executed by the at least one processor, cause the second device to at least send a key control message to the first device during a key exchange, the key control message instructing the first device to either generate a key by employing an encryption algorithm to be used and send the key, or confirm the key corresponding to the currently used encryption algorithm, and receive a key report from the first device, the key report generated by the first device based on the key control message. In a third aspect of the present disclosure, a communication system is provided. The communication system comprises a first apparatus according to the first aspect of the present disclosure, or a second apparatus according to the second aspect. In a fourth aspect of the present disclosure, a communication method is provided. The communication method includes receiving a key control message from a second device during a key exchange, the key control message indicating a first device to generate a key by employing an encryption algorithm to be used and transmit the key, or to confirm the key corresponding to the encryption algorithm currently used, generating a key report based on the key control message, and transmitting the key report to the second device. In a fifth aspect of the present disclosure, a communication method is provided. The communication method includes transmitting a key control message to a first device during a key exchange, the key control message instructing the first device to generate a key by employing an encryption algorithm to be used and transmit the key, or to confirm the key corresponding to the currently used encryption algorithm, and receiving a key report from the first device, the key report being generated by the first device based on the key control message. In a sixth aspect of the present disclosure, an apparatus for communication is provided. The apparatus includes means for receiving a key control message from a second apparatus during a key exchange, the key control message indicating the first apparatus to generate a key by employing an encryption algorithm to be used and transmit the key, or to confirm the key corresponding to the encryption algorithm currently used, generating a key report based on the key control message, and transmitting the key report to the second apparatus. In a seventh aspect of the present disclosure, an apparatus for communication is provided. The apparatus includes means for tr