+

WO2010145599A1 - Method and system for implementing information interaction security in passive optical network - Google Patents

Method and system for implementing information interaction security in passive optical network Download PDF

Info

Publication number
WO2010145599A1
WO2010145599A1 PCT/CN2010/074678 CN2010074678W WO2010145599A1 WO 2010145599 A1 WO2010145599 A1 WO 2010145599A1 CN 2010074678 W CN2010074678 W CN 2010074678W WO 2010145599 A1 WO2010145599 A1 WO 2010145599A1
Authority
WO
WIPO (PCT)
Prior art keywords
sequence information
information
message
sequence
stored
Prior art date
Application number
PCT/CN2010/074678
Other languages
French (fr)
Chinese (zh)
Inventor
张伟良
耿丹
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2010145599A1 publication Critical patent/WO2010145599A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q11/00Selecting arrangements for multiplex systems
    • H04Q11/0001Selecting arrangements for multiplex systems using optical switching
    • H04Q11/0062Network aspects
    • H04Q11/0067Provisions for optical access or distribution networks, e.g. Gigabit Ethernet Passive Optical Network (GE-PON), ATM-based Passive Optical Network (A-PON), PON-Ring
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3242Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q11/00Selecting arrangements for multiplex systems
    • H04Q11/0001Selecting arrangements for multiplex systems using optical switching
    • H04Q11/0062Network aspects
    • H04Q2011/0079Operation or maintenance aspects
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2213/00Indexing scheme relating to selecting arrangements in general and for multiplex systems
    • H04Q2213/1301Optical transmission, optical switches

Definitions

  • This relates to the field of communication wood, especially to the method and system for interactive security of information (O T, Op ca eTem a ) sheep 5 (O , Op ca ewo ) in (PO, a ve Op ca ewo ).
  • GPO wood is an important wood branch in the (PO) family. Like other PO woods, GPO is also a god-like material.
  • the GPO consists of O T , the user 's O , and the light distribution ( O , Op ca b o ewo ), usually at most.
  • O consists of optical devices such as sheep chops, optical branches, and connectors. The physical connections between O T and O are provided.
  • O T Before O is connected to O T, O T needs the legality of O. Dong said that O T supports the legality of O's 5 (S, Se a be ) O, rejecting
  • Step 101 O O T's downlink GPO (GTC GPO Ta o Co vege c ) is synchronized.
  • Step 103 The sequence message ( _Req e ) of the inactive OT receives the S _Req e , O to OT sequence message ( e a — be ), and the sequence of the message has O.
  • Step 104 O T receives the sequence of the Sena_ be phase 5 of O, and assigns O, ( g _ ) to O.
  • O allocates O , O .
  • Step 105 O T to O , ( a g g_Req e ), O .
  • Step 106 O receives Ra g g_Req e , still to O T Se a one be one O
  • Step 107 O T receives the Sena_ be of O, and the result is a balanced extension (q, q a za o ea ), and the result Eq
  • Step 108 If the sequence of OT is not 0, then message 5 ( a wod_Req ) to O (Reg , Reg ao ), O will be Reg, ( a wod e ag ) OT, and the Reg of OTO is legal, then O carry out.
  • the sequence information of the OOT and the OTO assignment O are all managed by physical operations (P, 0 hy ca aye Ope ao , Ad aoadaea ce), while in the existing GPO system, the P OA message is in clear text. In the form of.
  • each O will receive all P OA , and O
  • the malicious O reaches the sequence of a certain legal O, it can be in the legal O, using the sequence of the legal O to complete the body, and the illegal O can be connected to the PO system.
  • the main purpose of this is to provide a method and system for information interaction security in the PO, and the information of the interaction between O and O, especially in
  • the information that is interacted with is illegal, and the security of information interaction is improved.
  • the method for information interaction security includes the sequence information of the optical domain 0 (O T ) sheep ( O ) and the interaction O , and the sequence information of the O O O and O ( S )
  • the method step includes: in the O T ES , the rest information includes the sequence information of the legal information O of the O identity stored in the O T , and the sequence information of the ES O stored in the O T ,
  • O T stores the legal information of the O identity, the non-sequence information of the O, the O O to the non-sequence information of the O O O, the non-sequence information of the O, and/or the same
  • the legal information of the O identity stored by the OT includes the sequence information of the O and the non-sequence information of the O. If the ES received by the OTO is in the sequence information of the stored ES O, the solution of the sequence information of the legal information O is received. The ES does not store the sequence information of the ES O, and the solution of the non-sequence information of the legal information O.
  • the method step includes a message of whether the message containing the ES in the O O T is in front of the body, and the rest includes
  • the first O will compare the ES stored in the received ES before the ES, and if the same, the message containing the ES is its own, accept the message, otherwise, the message.
  • O T need to update the sequence information before O and the message containing S, O
  • the step needs to update the sequence information, the way of the O T convention, and the O-sequence information contained in the O sequence information again, the updated ES
  • the message containing the ES in O is the message of the front, and the rest includes
  • the ES of the previous O update is compared with the ES of the received ES update. If the ES is the same, the message containing the ES of O T is its own, accepting the message, otherwise, the message.
  • the system of information interaction security includes the sequence information of the servant Yang, interacting with O in O, and the ES in O T O and O
  • the sheep including O T, the information in O T O , the way O O O is agreed upon , and the O sequence information are included in each ES
  • the sheep including o, the sequence information in O O, the O O T convention, and the O sequence information contain the ES
  • the system includes the information of the O T, the sequence information of the O information stored in the O T , the sequence information of the O O stored by the O T , and the sequence information of the O phase of the ES phase .
  • OT stores the O-identity of the legal information O's non-sequence information
  • OT stores the non-sequence information of the OOO O's non-sequence information ES's algorithm and/or the same ES's
  • the legal information of the O identity stored by the OT includes the sequence information of the O and the non-sequence information of the O. If the ES receives the sequence information of the ES O stored in the body, the solution of the sequence information of the legal information O OTO receives the ES The solution of the non-sequence information of the legal information O, which is not the sequence information of the stored ES O.
  • the comparison sheep including O is compared with the ES stored in the front O of the former O. If the ES is the same, the message containing the ES of O T is its own, accepting the message, otherwise, the message.
  • the update includes the update sheep of O T , and before the O O contains the ES message, the step needs to update the sequence information, the O-contracted way, the O-sequence information is included again, and the updated ES is included.
  • the update includes the update sheep of O.
  • the step needs to update the sequence information, the way of the O T convention, and the O-sequence information included in the O sequence information again, the updated ES
  • sequence information of the O O O with the interaction O the sequence information of the O O O with O ( S )
  • a method for information interaction security in a PO comprising the sequence information of O T O and the interaction O, in O T O with S, especially in the sequence information of O in O.
  • the O sequence information contains the respective ES
  • the O sequence information contains the ES
  • the method steps are included in the OT ES.
  • the process includes the following aspects based on different situations.
  • the O-stored O-series information of the O-phase obtains the sequence information of the ES phase.
  • the S sequence information is obtained in such a way that the sequence information of the ES phase is related to the ES.
  • O T Stores the legal information of the O identity.
  • O T to O O O non-sequence information is stored in O's non-sequence information ES algorithm and / or the same
  • the legal information of the O identity stored by O T includes the sequence information of O and the non-sequence information of O.
  • the method step includes a message in the O O T that contains the message of the ES.
  • the rest includes the ES comparison of the ES stored in the front O. If the ES is the same, the message containing the ES of O T is its own, accepting the message containing the ES.
  • the message containing the ES is not given. It should be noted that the ES is updatable, and the following OT and O ES updates are respectively.
  • the step needs to update the sequence information, O pre-agreed, and the O-sequence information contained in the O, the updated ES
  • the step needs to update the sequence information, O T pre-agreed, and the O-sequence information is included in each, and the updated S is obtained.
  • the message containing the ES in the O is the message of the front
  • the ES of the update is the ES of the previous update
  • the ES of the received ES is compared, and the result is the same
  • the OT The message containing the ES is self-contained, accepting the message containing the ES, otherwise, the message containing the ES, not.
  • this book mainly includes the following contents
  • the OT stores the information of the legal information O of the O identity.
  • the OT stores the legal O of the O stored in the O OT according to the algorithm previously agreed by O.
  • the ES OT stores the same ES sequence information of each O, so that the root and the The ES finds legal information.
  • O T can update the value of the ES, and update the same list of ES sequence information of each O.
  • OT stores the non-sequence information of the legal information O of the O identity
  • OT stores the algorithm of the non-sequence information O of the O, and/or the same, so that the OT obtains the ES of the ES. Get legal sequence information.
  • O Get ES according to the agreed algorithm sequence information, store ES, step, O can update the value of ES.
  • the information of the T and O interactions contains the sequence information of the S that is replaced by the ES.
  • O T receives the S of O, which can be solved in the following way.
  • the received ES is a list of ES sequence information stored in the body, and O T can be a list of ES sequence information, and the sequence information of O is obtained.
  • the received ES is not in the list of ES sequence information stored in the body, the OT may be in the non-sequence information provided by O, and the O-sequence information of the O is stored in the O-sequence information algorithm and/or the same If you get the ES, then use the ES line to solve the sequence information of O.
  • sequence information in the book prevents the misuse of the sequence information of the legal O.
  • sequence information of O is dense, the identity of OTO, the identity of O is the sequence information of O, It solves the solution of the O sequence information in the upstream and downstream of the PO system, reduces the risk of serial information theft, and improves the information security in the PO system.
  • Step 201 in the O T sequence information, get ES
  • Step 202 in the O sequence information, get the ES
  • Step 204 The ES line solution in the message containing the S received by the O T .
  • the message containing the ES received at O is a message of whether or not O T O is present.
  • O T stores the sequence information of all Os.
  • OT stores the sequence information of all legal Os.
  • OT and O store the same algorithm (OT).
  • OT and O store the shared object, and the shared child also generates the first child of ey.
  • the OT stores the same sequence information for each sub- and each O.
  • O includes the following
  • each of the O T uses the generated algorithm ey and C C2 respectively. ..C8, respectively, get ey ey2 ey8, then OT uses the sequence information of the ey phase O, using the second information of the sequence information of the ey2 phase O, using the sequence information of the ey8 phase O, segmented by God
  • the sequence information contained in the dense mode O is 8 respectively, and the S of each O is obtained, and the OT stores the sequence information of S and O and the first sub-
  • C C2. ..C8 8 regular teaching, C C2.
  • the value of ..C8 can be pre-existing in O T and O or C C2.
  • the value of ..C8 can also be generated by O T or O
  • C C2. The value of ..C8 can also be generated by O T and O merchants. This article refers to C C2. ..C8's, do not do the following.
  • O T receives the upper Se a be O message of O
  • the ES in the Se a_ be message is stored in the ES list of O T
  • the sequence information of O T ES O can obtain the sequence of O.
  • O T will force the second child in the lower arm of the A g _ message, and O T will generate ey ey2 according to the above 3) content.
  • .. ey8's method generates O's new ey ey2. .. ey8, using the new ey ey2. .. ey8 O sequence information for each ⁇ , get O ES 2, store the sequence information of ES 2, O and
  • O receives the A g _ message containing ES 2 and puts the second in the downstream of the A g _ message
  • O is generated according to the above 4) content ey ey2. .. ey8's method generates a new ey ey2. .. ey8, using the new ey ey2. .. ey8
  • the difference between the body sequence information ⁇ , get ES 2, S 2 on the A g _ message ES 2 is the same, then O stores A g _ message OT assigns a matching O, otherwise O receives the A g _ message .
  • OT will work on the second sub-branch of Ra g g_Req e, according to the method of the above 3), again, the ES of ES, store the sequence information of ES 3 O, and, OT To Ra g g_Req e
  • O T receives the Se a_ be of O, the ES 3 information in Se a_ be is stored in the ES 3 list stored locally in O T , the O T result Eq , and the Eq Ra g g_T e message O is completed.
  • OT and O In the contents of 1) 9), OT and O contain the O sequence, the message, the OT and OO sequence information, and in the contents of 3) and 4), OT and O get the value of the sequence of O ES In the contents of 5) 6) 7) and 8), the same algorithm updates the value of the dense O sequence, and in the contents of 5) and 6), OT and O get the sequence of O Value ES 2, the upcoming ES update power ES 2 In the contents of 7) and 8), OT and O get the value of the sequence of O ES 3, the upcoming ES 2 update force S 3
  • OT and O can also not update the value of the dense O sequence in the contents of 5) 6) 7) and 8), still always ES, if not updated, then in 5) 6) 7) and 8)
  • the sequence information contained in the OT and O messages, OT and O can always be ES, that is, the value of the upper ES replaces the values of ES 2 and ES 3.
  • O T does not store any sequence information of O, O T stores the letter of Reg of O, .
  • OT and O store the same algorithm for ey OT and O store the shared object, and the shared child also stores the first OT and part O of ey to store the Reg of the O identity. Stored the first child of Reg and . O includes the following
  • OT receives O's Se a be O message, OT ES to A g _ , , A g _ message on S on ES , OTA g _ , to O 6 ) O to receive ES A g _ message , A g _ message in ES 4) Content in O storage
  • the ES is the same straight, then O stores A g _ , the O of the OT body is straight, otherwise, OA g _ , .
  • O is connected to a wod_Req e , O's Reg to Pa wod , in
  • OT receives the Reg list of Pa wod , , O in OT, then OT can get the first child of O, OT 3) The second child of the work stored in the content, using the first and second generation algorithms Son, get ey, use the method to get the phase ey ey2. .. ey8. Then OT on e ey2 ey8 respectively O's ES to the sequence of O, O stores the sequence information force legal O sequence, stores the O and O sequences in the same block, O is completed. Because, OT has stored the sequence of O, because, O , OT and O methods complete O's. If the Reg of O is not in the Reg list of OT, then OTO
  • T stores the sequence information of part O and the information of Reg of part O.
  • OT and O store the same algorithm for ey OT and O store the shared object, and the shared child also stores the same OT and the sequence of each first and each O in the first OT of the generated ey.
  • Part O stores Reg in O identity
  • OT stores the first in Reg and
  • . O includes the following
  • OT uses the first and second children of each O in the generation algorithm to obtain the algorithm ey sum generated by the ey OT of each O, and obtains the algorithms ey and 2 generated by ey OT, and obtains the algorithm generated by ey2, OT utilization.
  • Ey and 8 get ey8, then OT uses the sequence information of the ey phase, and uses the sequence information of the ey8 phase O on the second using the sequence information of the ey2 phase O.
  • O T stores the 5th sequence of S and O and the first sub of .
  • O T receives the upper Sena_ be message of O, and the ES received by O T and O is in the ES list stored locally by O T , and takes the rest in 5.1) or 5.2).
  • OT can obtain the sequence information of O by the sequence information of ES O .
  • OT will work on the second sub-input of the A g _ message, and OT will generate the new ey ey2 ey8 of O according to the method of generating ey ey2 ey8 in the above 3), using 5 new ey ey2 ey8 O sequences.
  • ES 2 storing sequence information on ES 2 O, OT to OA g _ message, A g _ message in the first cross on ES 2, OTA g _ message assigning O to O
  • O receives the A g _ message containing ES 2 and puts the second in the downstream of the A g _ message
  • O is generated according to the above 4) content ey ey2. .. ey8's method generates a new ey ey2. .. ey8, using the new ey ey2. .. ey8
  • the respective sequences of ⁇ 8 get ES 2, and S 2 in the A g _ message on ES 2 is the same, then O stores O in the A g _ message, and O receives the A g _ message.
  • O receives the J Rag g_Req e , and the second sub-branch in the descending middle of the Ra g g_Req e, and then ES 3 according to the method of 4), the ES 3 to Se a be O
  • OT receives the Se a_ be of O, the ES 3 information in Se a_ be is stored in the ES 3 list stored locally, the OT results Eq, and the Eq Ra g g_T e message O completes O.
  • ES information in Sena_ be is not in the S list stored locally by OT. 5.2.1) OT stores ES, S in the OA g _ , , A g _ , the content of the OT receives the stored S, OTA g _ message to OO
  • O receives the A g _ message containing S, if the ES in the 5 A g _ message is 4) the content of the stored O is the same, then O stores A g _ , the O of the OT body Straight, otherwise, OA g _ , .
  • OT receives Se a_ be_, and S in Se a_ be_ is equal to 5.2.1) The content OT receives the stored ES, then OT results Eq, Eq Ra g g_T e , O 5.2. ) OT to Pa wod_Req e
  • OT and O can also not update the value of the dense O sequence in the contents of 5.1.1), 5.1.2), 5.1.3) and 5.1.4), in 5.1.
  • the OT and O messages contain sequence information, OT and O.
  • the value of the upper ES replaces the values of ES 2 and ES 3.
  • the information exchange security system in the PO system includes the sequence information of the servant Yang, O O O and the interaction O, in O T O with ES
  • the approach includes the sheep of O, in the sequence of O O , , O O T agreed in advance, O
  • the approach includes the OT's solution to the sheep, the following different situations, the sheep's Different breaks.
  • the rest of the O T , the legal information of the O identity stored in the O T , the sequence information of the O O , and the sequence information of the ES O stored in the O T obtain the sequence information of the ES phase .
  • the third Hugh O T solution the legal information of the O identity stored in O T includes the sequence information of O and the non-sequence information of O, in different cases on the first or second rest.
  • the first rest that is, the solution of the sequence information of the legal information O. If the ES received by O T O is not stored in the ES sequence information, then the second rest, that is, the solution of the non-sequence information of the conjunction information O.
  • the comparison sheep including O in the previous O will receive the ES before the storage of the ES before the ES comparison, the same, then the OT message containing S is its own, accept the message containing S, otherwise, including the ES Message.
  • the update includes the OT update sheep, before the OT every time O with the ES-containing message, the step needs to update the sequence information, O pre-agreed, again, the O-sequence information contains the respective, the updated S
  • the update includes the update of the sheep. Before each OT with the message containing S, the step needs to update the sequence information, the OT agrees in advance, and the O-sequence information is included again.
  • S The sequence of O mentioned above is represented by S, and the English full Se a device is represented by S pe a eCo .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Power Engineering (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Small-Scale Networks (AREA)
  • Storage Device Security (AREA)

Abstract

A method for implementing information interaction security in a Passive Optical Network (PON) is provided by the present invention. The method includes: when the interaction of the serial number information of an Optical Network Unit (ONU) between an Optical Line Terminal (OLT) and the ONU is needed, the Encrypted Serial Number information (ESN) of the ONU is transmitted between the OLT and the ONU. A system for implementing information interaction security in a PON is also provided by the present invention. In the system, a transmitting unit is used for transmitting the ESN between the OLT and the ONU when the interaction of the serial number information of the ONU between the OLT and the ONU is needed. By applying the method and system of the present invention, it is avoided that the information exchanged between the OLT and the ONU, especially the information exchanged in the registration-activation scenes, is intercepted illegally, thereby improving the transmission security of information interaction.

Description

中 信息交互安全的方法及 統 木領域  Method of information interaction security and the field of wood
本 涉及通信 木領域, 尤其涉及 (PO , a ve Op ca ewo ) 中 終端 (O T, Op ca eTem a ) 羊 5 (O , Op ca ewo ) 同 信息交互安全的方法及 統。 背景 木  This relates to the field of communication wood, especially to the method and system for interactive security of information (O T, Op ca eTem a ) sheep 5 (O , Op ca ewo ) in (PO, a ve Op ca ewo ). Background
GPO 木是 (PO ) 家族中 介重要的 木分支, 和其 它PO 木 似, GPO 也是 神采 到多 的元 接 木。 GPO 由 的O T、 用戶 的O 以及光分配 (O , Op ca b o ewo )組成, 通常 到多 的 。 O 由羊 仟、 光分路 、 連接器等 光器件組成, O T和O 同的物理 連接提供 。  GPO wood is an important wood branch in the (PO) family. Like other PO woods, GPO is also a god-like material. The GPO consists of O T , the user 's O , and the light distribution ( O , Op ca b o ewo ), usually at most. O consists of optical devices such as sheep chops, optical branches, and connectors. The physical connections between O T and O are provided.
于 O T O 同信息交互安全的考慮, O 接 O T前, O T需要 O 的合法性 。 東說, O T支持 于O 的5 (S , Se a be ) O 的合法性 的方法, 拒絕  In the case of O T O and information interaction security, before O is connected to O T, O T needs the legality of O. Dong said that O T supports the legality of O's 5 (S, Se a be ) O, rejecting
O 的接 。 下面 相夫 木中 O 的 流程, 主要包括以下 步驟  O's connection. The flow of O's in the woods below mainly includes the following steps.
步驟101 O O T 的下行GPO (GTC GPO Ta o Co vege c ) 同步。 Step 101 O O T's downlink GPO (GTC GPO Ta o Co vege c ) is synchronized.
0 步驟 102 O O T 周期性 的上行 0 Step 102 O O T Periodic Upward
( p ea _ovehead p amee ) 消息中的 配置 或者, O ( p ea _ovehead p amee ) configuration in the message or, O
O T周期性 的 p ea _oveheadp a ee 消息和 長度 ( xe ded_B _ e g ) 消息中的 配置。 步驟 103、 未 活的 O T 的序列 消息 ( _Req e ) 收到 S _Req e , O 向 O T 序列 消息 ( e a_ be ), 消息中 帶有O 的序列 。 The configuration in the OT periodic p ea _oveheadp a ee message and length ( xe ded_B _ eg ) message. Step 103: The sequence message ( _Req e ) of the inactive OT receives the S _Req e , O to OT sequence message ( e a — be ), and the sequence of the message has O.
步驟104 O T收到 O 的Sena_ be 得相 5 的序列 , 向 O 分配O , ( g _ ),  Step 104 O T receives the sequence of the Sena_ be phase 5 of O, and assigns O, ( g _ ) to O.
O 分配O , O 。  O allocates O , O .
步驟 105 O T向 O , ( a g g_Req e ), O 。  Step 105 O T to O , ( a g g_Req e ), O .
步驟 106、 O 收到 Ra g g_Req e , 仍然向 O T Se a一 be一O  Step 106, O receives Ra g g_Req e , still to O T Se a one be one O
步驟107 O T收到 O 的Sena_ be , 結果即均衡延退 ( q , q a za o ea ), 將 結果Eq  Step 107 O T receives the Sena_ be of O, and the result is a balanced extension (q, q a za o ea ), and the result Eq
同消息 ( a g g T ) O , 完成O 的 。 步驟 108、 果 O T 不 O 的序列 , 則 消息5 ( a wod_Req )向O (Reg , Reg a o ), O 將 身的Reg , ( a wod e ag ) O T, 果O T O 的Reg 是合法的, 則 O 完成 。  Same message ( a g g T ) O , complete O's. Step 108: If the sequence of OT is not 0, then message 5 ( a wod_Req ) to O (Reg , Reg ao ), O will be Reg, ( a wod e ag ) OT, and the Reg of OTO is legal, then O carry out.
在上 O 的 中, O O T 身的序列 信息 和O T O 分配O ,都是通 物理 操作管理 (P ,0 hy ca aye Ope a o , Ad a o a d a e a ce) 的, 而 現有GPO 統中, P OA 消息是以明文的形式 的。  In the upper O, the sequence information of the OOT and the OTO assignment O are all managed by physical operations (P, 0 hy ca aye Ope ao , Ad aoadaea ce), while in the existing GPO system, the P OA message is in clear text. In the form of.
下行方向而言, 由于下行方向, 即由 O T到 O 的方向 天然 播方式,因此,各 O 都將收到所有的P OA , , 且 O  In the downlink direction, since the downlink direction, that is, the natural broadcast mode from the direction of O T to O, each O will receive all P OA , and O
得 于 己的P OA 消息, 其他O 的P OA , 。5 果 中存在 重新編 的惡意O , 惡意O 就舍監 O T 他O 的P 消息。 上行方向而言, 上行方向 的P 消 息存在 非法 的 。 第 果GPO 中的光分路 使用的 是2 的分光器, 1所示, 不法用戶可以 1所示的B Get your own P OA message, other O's P OA, . 5 There is a re-edited malicious O in the fruit, malicious O is the OT His O's P message. In the uplink direction, the P message in the upstream direction is illegal. The optical split in the first GPO uses a splitter of 2, as shown by 1, and the unlawful user can use B as shown in 1.
所有O 的上行P OA , 第二 不法用戶也可以 比  All O's upstream P OA, the second unlawful user can also compare
5 仟的方式探測上行 青光, 而 上行P OA 消息。 果惡意O 到某 介合法O 的序列 , 則它可以在合法O , 利用合 法 O 的序列 完成 身的 , 非法 O 可以接 到 PO 統中。 5 仟 way to detect the upward glaucoma, and the uplink P OA message. If the malicious O reaches the sequence of a certain legal O, it can be in the legal O, using the sequence of the legal O to complete the body, and the illegal O can be connected to the PO system.
上 , 是由于上 原因的存在, 現有 GPO 統中上、 下行的 OA 消息都是以明文 ,因此上、下行方向都存在 非法 的可能, GPO 統中信息交互的 安全造成了 。 目前特別是 O 活的 , 現有 木中尚未提供 兔非法 提高信息交互 安全的解決方案。  Above, due to the above reasons, the OA messages in the upper and lower directions of the existing GPO system are in plaintext, so there is an illegal possibility in the uplink and downlink directions, and the security of information interaction in the GPO system is caused. At present, especially O live, there is no solution for rabbits to illegally improve information interaction security.
內容 content
5 有 于此, 本 的主要目的在于提供 PO 中 信息交互安全 的方法及 統, 兔了 O T O 同交互的信息, 特別是在 5 In this case, the main purpose of this is to provide a method and system for information interaction security in the PO, and the information of the interaction between O and O, especially in
下交互的信息 非法 到, 而提高了信息交互的 安全。 到上 目的, 本 的 木 的  The information that is interacted with is illegal, and the security of information interaction is improved. To the purpose of the wood
中 信息交互安全的方法, 方法包括 光域0 (O T) 羊 (O ) 同 交互 O 的序列 信息 , 在 O T O 同 O 的 的序列 信息 ( S )  The method for information interaction security includes the sequence information of the optical domain 0 (O T ) sheep ( O ) and the interaction O , and the sequence information of the O O O and O ( S )
其中,在O T O 的序列 信息 ,O T 步 O 約定的方式, O 序列 信息中 包含的各 分別 得 ES Among them, the sequence information in O T O , the way in which O T step O is agreed , and the O sequence information are included in each ES
5 其中, 在 O O 的序列 信息 , O 步 O T約定的方式, O 序列 信息中 包含的各 分別 得ES 5 where, the sequence information in OO, O step The way the OT is agreed, the O sequence information contains the respective ES
其中, 方法 步包括 在O T ES , 其 休 包括 占 O T 存儲的 O 身份的合法信息 O 的序列 信息 ,O T 存儲的 O 的ES O 的序列 信息的 , 得 The method step includes: in the O T ES , the rest information includes the sequence information of the legal information O of the O identity stored in the O T , and the sequence information of the ES O stored in the O T ,
ES 相 的O 的序列 信息  Sequence information of the O phase of the ES phase
或者, O T 存儲的 O 身份的合法信息 O 的非序列 信息 , O T向 O O O 的非序列 信息 存 儲的 O 的非序列 信息 ES 的算法和/或 同的  Or, O T stores the legal information of the O identity, the non-sequence information of the O, the O O to the non-sequence information of the O O O, the non-sequence information of the O, and/or the same
得到 ES 的 , O T ES 的 ES  Get ES, O T ES ES
得 ES 相 的O 的序列 信息 The sequence information of the O phase of the ES phase
或者, O T 存儲的 O 身份的合法信息包括O 的序列 信息和O 的非序列 信息 , 果O T O 接收的ES 于 身 存儲的ES O 的序列 信息的 ,則 合法信息 O 的序列 信息 的解 果O T O 接收的ES 不 于 身存儲的 ES O 的序列 信息的 , 則 合法信息 O 的非序列 信息 的解 。  Or, the legal information of the O identity stored by the OT includes the sequence information of the O and the non-sequence information of the O. If the ES received by the OTO is in the sequence information of the stored ES O, the solution of the sequence information of the legal information O is received. The ES does not store the sequence information of the ES O, and the solution of the non-sequence information of the legal information O.
其中, 方法 步包括 在O O T 的包含ES 的消 息是否 前O 身的消息, 其 休 包括  Wherein, the method step includes a message of whether the message containing the ES in the O O T is in front of the body, and the rest includes
前O 將接收到的ES 前O 身存儲的ES 比較, 果 相同, 則 的包含ES 的消息是 己的, 接受 消 息, 否則, 消息。  The first O will compare the ES stored in the received ES before the ES, and if the same, the message containing the ES is its own, accept the message, otherwise, the message.
其中,在O T , O T每次 O 同 包含 S 的消息 前, 步 需要 序列 信息的 更新, O  In the case that O T , O T need to update the sequence information before O and the message containing S, O
的方式, 再次 O 序列 信息中 包含的各 分別 , 得更新 的ES Way, again the O sequence information contains the respective differences, Updated ES
其中, 在 , 每次 T 同 包含ES 的消息 前, 步 需要 序列 信息的 更新, O T 約定的方式, 再次 O 序列 信息中 包含的各 分別 , 得更新 的ES  Among them, each time T is the same as the message containing the ES, the step needs to update the sequence information, the way of the O T convention, and the O-sequence information contained in the O sequence information again, the updated ES
其中,在ES 更新的情況下,在O 的包含ES 的 消息是否 前O 身的消息, 其 休 包括  Among them, in the case of ES update, the message containing the ES in O is the message of the front, and the rest includes
占前O 更新 身的ES , 將接收到的ES 更新的ES 比較, 果相同, 則 O T 的包含ES 的消息是 己的, 接受 消息, 否則, 消息。  The ES of the previous O update is compared with the ES of the received ES update. If the ES is the same, the message containing the ES of O T is its own, accepting the message, otherwise, the message.
中 信息交互安全的 統, 統包括 侍瑜羊 , 于 O 同 交互O 的序列 信息 ,在O T O 同 O 的ES  The system of information interaction security includes the sequence information of the servant Yang, interacting with O in O, and the ES in O T O and O
其中, 統近包括O T 的 羊 , 于在O T O 的 信息 , O T O 約定的方式, O 序列 信息 中 包含的各 分別 得ES  Among them, the sheep including O T, the information in O T O , the way O O O is agreed upon , and the O sequence information are included in each ES
其中, 統近包括 o 的 羊 , 于在O O 的 序列 信息 , O O T約定的方式, O 序列 信 息中 包含的各 分別 得ES  Among them, the sheep including o, the sequence information in O O, the O O T convention, and the O sequence information contain the ES
其中, 統近包括 O T 的解 羊 , 于 O T 存儲的 O 身份的合法信息 O 的序列 信息 , O T 存儲的 O 的ES O 的序列 信息的 , 得 ES 相 的O 的序列 信息 Among them, the system includes the information of the O T, the sequence information of the O information stored in the O T , the sequence information of the O O stored by the O T , and the sequence information of the O phase of the ES phase .
O T 存儲的 O 身份的合法信息 O 的非序列 信息 , O T向 O O O 的非序列 信息 存儲的 O 的非序列 信息 ES 的算法和/或 同的 得 到 ES 的 , O T ES 的 ES 得 ES 相 的O 的序列 信息OT stores the O-identity of the legal information O's non-sequence information, OT stores the non-sequence information of the OOO O's non-sequence information ES's algorithm and/or the same ES's, OT ES's ES's ES's O's sequence information
O T 存儲的 O 身份的合法信息包括O 的序列 信息和O 的非序列 信息 , 果O T O 接收的 ES 于 身存儲的 ES O 的序列 信息的 , 則 合法信息 O 的序 列 信息 的解 果O T O 接收的ES 不 于 身存 儲的ES O 的序列 信息的 , 則 合法信息 O 的非序列 信息 的解 。  The legal information of the O identity stored by the OT includes the sequence information of the O and the non-sequence information of the O. If the ES receives the sequence information of the ES O stored in the body, the solution of the sequence information of the legal information O OTO receives the ES The solution of the non-sequence information of the legal information O, which is not the sequence information of the stored ES O.
其中, 統近包括 O 的比較羊 , 于 前 O 將接收到 的ES 前O 身存儲的ES 比較, 果相同,則 O T 的 包含ES 的消息是 己的, 接受 消息, 否則, 消息。  Among them, the comparison sheep including O is compared with the ES stored in the front O of the former O. If the ES is the same, the message containing the ES of O T is its own, accepting the message, otherwise, the message.
其中, 統近包括 O T 的更新羊 , 于在 O T每次 O 同 包含ES 的消息 前, 步 需要 序列 信息的 更新, O 約定的方式, 再次 O 序列 信息中 包含的各 分別 , 得更新 的ES  Among them, the update includes the update sheep of O T , and before the O O contains the ES message, the step needs to update the sequence information, the O-contracted way, the O-sequence information is included again, and the updated ES is included.
其中, 統近包括 O 的更新羊 , 于在O 每次 O T 同 包含ES 的消息 前, 步 需要 序列 信息的 更新, O T約定的方式, 再次 O 序列 信息中 包含的各 分別 , 得更新 的ES  Among them, the update includes the update sheep of O. Before each O O with the message containing the ES, the step needs to update the sequence information, the way of the O T convention, and the O-sequence information included in the O sequence information again, the updated ES
本 的 O T O 同 交互O 的序列 信息 , 在O T O 同 O 的 的序列 信息 ( S )  The sequence information of the O O O with the interaction O , the sequence information of the O O O with O ( S )
由于本 在O T O 同 O 的 的序列 信息, 于現有 木 O 的不 密的序列 信息, 因此, 用本 , 兔 了 O T O 同交互的信息, 特別是在 下交互的信息 非法 到, 而提高了信息交互的 安全。 說明Because of the sequence information of OTO and O, the incomplete sequence information of the existing wood O, therefore, with this, the OTO interacts with the information, especially the information under the interaction. Illegal to, and improve the security of information interaction. Description
1 現有GPO 統的 1 Existing GPO system
2力本 方法 的 流程示意 。 休 方式  2 The flow chart of the method. Hugh way
本 的基本思想是 T 同 交互 的序列 信息 , 在O T O 同 O 的ES  The basic idea of this is the sequence information of the T interaction, the ES in O T O and O
下面結合 木方案的 步的 。 The following is a combination of the steps of the wood scheme.
PO 中 信息交互安全的方法, 方法包括 O T O 同 交互O 的序列 信息 ,在O T O 同 S ,尤其 于O 中 O 的序列 信息的 。  A method for information interaction security in a PO, the method comprising the sequence information of O T O and the interaction O, in O T O with S, especially in the sequence information of O in O.
, 在O T 序列 信息 , O T 步 O 約定 的方式, O 序列 信息中 包含的各 分別 得 ES  In the O T sequence information , the O T step O convention , the O sequence information contains the respective ES
, 在O 序列 信息 , O 步 O T約定 的方式, O 序列 信息中 包含的各 分別 得 ES  In the O sequence information, the O step O T convention, the O sequence information contains the ES
需要指出的是 以上涉及到的約定的方式是 O T O 同事先約 定好相同的 / 方式, 也就是說, O T O 相同的 / 方式, 上行 或下行 中 包含序列 信息的消息 / , 在 消息 , ES 代替序列 信息, 也就是說 的是包含 ES 的消息。  It should be pointed out that the above-mentioned conventions are the same / way that OTO agrees with the prior, that is, OTO is the same / way, the message containing sequence information in the uplink or downlink /, in the message, ES instead of the sequence information , that is, the message containing the ES.
, 方法 步包括 在O T ES 的 。 程基于不 同的情況包括以下 方面內容。 O T 存儲的 身份的合法信息 O 的序列 信息 的情況。 The method steps are included in the OT ES. The process includes the following aspects based on different situations. The case where the OT stores the identity information of the legal information of the O.
此 , O T 存儲的 O 的ES 序列 信息的 , 得 ES 相 的序列 信息。 , S 序列 信息 的方式, 得 ES 相 的序列 信息就相 于 ES 了。 In this case, the O-stored O-series information of the O-phase obtains the sequence information of the ES phase. The S sequence information is obtained in such a way that the sequence information of the ES phase is related to the ES.
O T 存儲的 O 身份的合法信息 O 的非序列 信 息的情況。  O T Stores the legal information of the O identity. The non-sequence information of O.
此 , O T向 O O O 的非序列 信息 存儲的 O 的非序列 信息 ES 的算法和/或 同的  Thus, O T to O O O non-sequence information is stored in O's non-sequence information ES algorithm and / or the same
得到 ES 的 , ES 得 ES 相 的 序列 信息。 Obtain ES sequence information from ES and ES.
O T 存儲的 O 身份的合法信息包括 O 的序列 信息和O 的非序列 信息的情況。  The legal information of the O identity stored by O T includes the sequence information of O and the non-sequence information of O.
此 , 需要 接收的ES 的不同情況, 分別 捧上 第 方面或 方面內容涉及的 。  In this case, the different situations of the ES that need to be received are respectively involved in the first aspect or aspect.
休東說, 果O T O 接收的ES 于 身存儲的ES 信息的 ,則 上 第 方面的合法信息 O 的序列 信息 的解 果O T O 接收的ES 不 于 身存儲的ES 序列 信息的 ,則 上 第二方面的合法信息 O 的非 信息 的解 。  Hugh East said that if the OTO receives the ES information stored in the body, then the resolution information of the first aspect of the legal information O is the result of the OTO received ES is not stored in the ES sequence information, then the second aspect The non-information of the legal information O.
, 方法 步包括 在O O T 的包含ES 的消 息是否 前O 身的消息。 其 休 包括 占前O 將接 收到的ES 前O 身存儲的ES 比較, 果相同,則 O T 的包含ES 的消息是 己的, 接受 包含ES 的消息  The method step includes a message in the O O T that contains the message of the ES. The rest includes the ES comparison of the ES stored in the front O. If the ES is the same, the message containing the ES of O T is its own, accepting the message containing the ES.
, 否則, 包含ES 的消息, 不予 。 需要指出的是 ES 是可以更新的,以下 O T和O 的ES 更新分別 。 Otherwise, the message containing the ES is not given. It should be noted that the ES is updatable, and the following OT and O ES updates are respectively.
在O T , 每次 O 同 包含ES 的消息 前, 步 需要 序列 信息的 更新, O 事先約定的 , 再次 O 序列 信息中 包含的各 分別 , 得更新 的ES  At O T , each time O is accompanied by a message containing ES, the step needs to update the sequence information, O pre-agreed, and the O-sequence information contained in the O, the updated ES
在O , O 每次 同 包含ES 的消息 前, 步 需要 序列 信息的 更新, O T事先約定的方 式, 再次 O 序列 信息中 包含的各 分別 , 得更新 的 S  Each time O, O is the same as the message containing the ES, the step needs to update the sequence information, O T pre-agreed, and the O-sequence information is included in each, and the updated S is obtained.
其中,在ES 更新的情況下,在O 的包含ES 的 消息是否 前O 身的消息, 其 休 包括 占前O 更 新 身的 ES , 將接收到的 ES 更新的 ES 比較, 果相同, 則 O T 的包含ES 的消息是 己的, 接受 包含ES 的 , 否則, 包含ES 的消息, 不予 。  In the case of the ES update, the message containing the ES in the O is the message of the front, and the ES of the update is the ES of the previous update, and the ES of the received ES is compared, and the result is the same, then the OT The message containing the ES is self-contained, accepting the message containing the ES, otherwise, the message containing the ES, not.
上 , 本 明主要包括以下內容  Above, this book mainly includes the following contents
1) O T 存儲的 于 O 身份的合法信息 O 的 信息 ,O T按照 O 事先約定的算法 本地存儲的合法O 的S , 得到ES O T近 存儲各 O 的ES 序列 信息 同的 列表, 以便于根 , 通 ES 找到合法的 信息。 , O T可以 需要 上 ES 的值 更新, 更新 各 O 的ES 序列 信息 同的 列表。 1) The OT stores the information of the legal information O of the O identity. The OT stores the legal O of the O stored in the O OT according to the algorithm previously agreed by O. The ES OT stores the same ES sequence information of each O, so that the root and the The ES finds legal information. , O T can update the value of the ES, and update the same list of ES sequence information of each O.
O T 存儲的 于 O 身份的合法信息 O 的非序列 信息 , O T近 存儲各 O 的非序列 信息 O 序列 信息 的算法和/或 同的 ,以便于O T得到 ES 的 ES 得合法的序列 信息。 OT stores the non-sequence information of the legal information O of the O identity, OT stores the algorithm of the non-sequence information O of the O, and/or the same, so that the OT obtains the ES of the ES. Get legal sequence information.
2) O 按照約定的算法 序列 信息 得到 ES , 存儲 ES , 步 , O 可以 需要 上 ES 的值 更新。  2) O Get ES according to the agreed algorithm sequence information, store ES, step, O can update the value of ES.
3) T和O 交互的信息中含有O 的S 需要通 ES 代替 的序列 信息的 。  3) The information of the T and O interactions contains the sequence information of the S that is replaced by the ES.
4)在O T , O T接收到 O 的 S , 可以 下 方式 行解  4) At O T , O T receives the S of O, which can be solved in the following way.
4. ) 接收到的 ES 于 身存儲的 ES 序列 信息的 列表, O T可以 ES 序列 信息的 列表, 得 O 的序列 信息。  4. The received ES is a list of ES sequence information stored in the body, and O T can be a list of ES sequence information, and the sequence information of O is obtained.
4.2) k 接收到的 ES 不 于 身存儲的 ES 序列 信息的 列表, O T可以在 得O 提供的非序列 信息 ,再 身存儲 的O 的非序列 信息 O 序列 信息的算法和/或 同的 得到 ES 的 ,再利用 ES 行解 , 得 O 的序列 信息。  4.2) k The received ES is not in the list of ES sequence information stored in the body, the OT may be in the non-sequence information provided by O, and the O-sequence information of the O is stored in the O-sequence information algorithm and/or the same If you get the ES, then use the ES line to solve the sequence information of O.
5)在O , O 接收到上 3) 內容中 O T 的ES , O 下面 方式、 或 方式 O T 的包含ES 的消 息是否是 己的  5) At O, O, receive the above 3) The content of O T in the content of O, O. The following way, or the way O T contains ES message is self
5.1) O 將接收到的ES 身存儲的ES 比較, 果相 同, 則 O T 的包含ES 的消息是 己的。  5.1) O Compare the ES stored in the received ES body. If the same is true, the message containing the ES of O T is its own.
5.2) O 更新 身的ES , 將接收到的ES 更新的ES 比 較, 果相同, 則 O T 的包含 S 的消息是 己的。  5.2) O Updates the ES of the body and compares the ESs of the received ES updates. If the ES is the same, the message containing S of O T is its own.
上 , 本 中 的序列 信息 , 防 止合法O 的序列 信息 盜用。 在O 的序列 信息 密的情況下,O T O 的身份, O 的身份 得O 的序列 信息, 解決了 PO 統中上行 和下行 中的 O 序列 信息的 和解 , 而降低了序列 信息 盜用的危 , 而 到了提高PO 統中信 息 安全性的效果。 The sequence information in the book prevents the misuse of the sequence information of the legal O. In the case where the sequence information of O is dense, the identity of OTO, the identity of O is the sequence information of O, It solves the solution of the O sequence information in the upstream and downstream of the PO system, reduces the risk of serial information theft, and improves the information security in the PO system.
以下 本 。 The following.
2所示力本 方法 的 流程, 包括以下步驟 步驟201、 在O T 序列 信息 , 得ES  2 shows the flow of the method, including the following steps: Step 201, in the O T sequence information, get ES
步驟202、 在O 序列 信息 , 得ES  Step 202, in the O sequence information, get the ES
步驟203、 在O T O 同 ES  Step 203, in O T O with ES
步驟204、 在O T 收到的包含 S 的消息中的ES 行解 。 步驟205、在O 收到的包含ES 的消息 , 以 是否 O T O 身的消息。  Step 204: The ES line solution in the message containing the S received by the O T . In step 205, the message containing the ES received at O is a message of whether or not O T O is present.
需要指出的是, 在其它 中, 以上步驟在次序上可 、 可 或省略其中步驟。 休的 方案 下面的 。 , O T 存儲的信息不同, 的 休 也有所不同, 以下分別 。 另, 指出的是 在不 的情況下, 以下本 明中的 及 中的特 可 以相互組合。 It should be noted that in others, the above steps may or may omit the steps in the order. Hugh's plan below. The information stored in O T is different, and the rest is different, as follows. In addition, it is pointed out that in the case of no, the following and the special features in the present invention can be combined with each other.
O T 存儲了所有O 的序列 信息。  O T stores the sequence information of all Os.
在本 的PO 統中,O T 存儲了所有合法O 的序列 信息 O T和 O 存儲了相同的 于 算 密密 ( ey) 的算法 O T和O 存儲了 介 共享 子, 共享 子也 于生成 ey 的第 子 O T 存儲各 第 子和各 O 的序列 信息 同的 。 O 的 包括以下內容  In this PO system, OT stores the sequence information of all legal Os. OT and O store the same algorithm (OT). OT and O store the shared object, and the shared child also generates the first child of ey. The OT stores the same sequence information for each sub- and each O. O includes the following
1) O O T 的下行GTC 同步。  1) Downstream GTC synchronization of O O T .
2) O O T 周期性 的 p ea _ vehead、 或者 p ea _ vehead和Exe ded_B _ e gh消息, 取消息中的 3)O T S _Req e , 同 O T將 帶上 S _Req e 的下行 中 器中的 作力第二 子, O T利用生成 算法 上 各 O 的第 子和上 第二 子 ,得 到 各 O 的 ey 2) OOT periodic p ea _ vehead, or p ea _ vehead and Exe ded_B _ e gh messages, in the message 3) OTS _Req e, with OT will bring the second sub-branch in S _Req e, and OT uses the first and second sub-sections of each O in the generation algorithm to get the ey of each O.
由于 O 序列 信息是8 , 因此在 序列 信息中的各 分別 , O T利用生成 的算法分別 ey和C C2.‥C8 , 分別得到 ey ey2 ey8, 然 O T利用上 ey 相 O 的序列 信息的第 介 ,利用上 ey2 相 O 的 序列 信息的第二 , , 利用上 ey8 相 O 的序 列 信息的 ,以 神分段 密的方式 O 的序 列 信息所包含的 8 分別 , 得到各 O 的 S , O T存 儲了 S 、 的 O 的序列 信息和 的第 子的  Since the O sequence information is 8, each of the O T uses the generated algorithm ey and C C2 respectively. ..C8, respectively, get ey ey2 ey8, then OT uses the sequence information of the ey phase O, using the second information of the sequence information of the ey2 phase O, using the sequence information of the ey8 phase O, segmented by God The sequence information contained in the dense mode O is 8 respectively, and the S of each O is obtained, and the OT stores the sequence information of S and O and the first sub-
 .
其中, C C2.‥C8 8 常教, C C2.‥C8 的值可以預存在 O T 和O 中 或者, C C2.‥C8的值也可以由 O T或O 戶生  Among them, C C2. ..C8 8 regular teaching, C C2. The value of ..C8 can be pre-existing in O T and O or C C2. The value of ..C8 can also be generated by O T or O
或者, C C2.‥C8的值也可以由 O T和O 商戶生。 本文涉及 到的有 C C2.‥C8的 的 , 以下不做 。  Or, C C2. The value of ..C8 can also be generated by O T and O merchants. This article refers to C C2. ..C8's, do not do the following.
4) O O T 的 S _Req e , 收到 S _Req e , 將S _Req e 的下行 中 器中的 作力第二 子, O 利用生成 的算法 第 子和上 第二 子 得 到 ey,然 O 利用生成 的算法 ey和 ,得到 ey 。 O 利用生成 的算法 ey和C2 , 得到 ey2 利用 生成 的算法 ey和C8 , 得到 ey8。 然 O 利用上 ey 身的序列 信息的第 介 , 利用上 ey2 身 序列 信息的第二 行 □ 利用上 ey8 身的序列 信息 的 □ , 得到 S O S 到 Sena_ be 消息中的第三到第十字 T 4) S _Req e of OOT, S _Req e is received, the second sub-child of S _Req e is used, O is obtained by using the generated algorithm first and second sub-, and then O is generated. The algorithm ey and get ey. O Using the generated algorithms ey and C2, we get ey2 using the generated algorithms ey and C8 to get ey8. However, O uses the sequence information of the ey body to use the upper ey2 body. The second line of the sequence information □ uses the sequence information of the upper ey8 body to get the third to the cross T in the SOS to Sena_ be message.
5) O T 收到 O 的上 Se a be O 消息 ,Se a_ be 消息中的ES 于O T存儲的ES 列表, O T ES O 的序列 信息的 , 可以得到 O 的序列 言, 。  5) O T receives the upper Se a be O message of O, the ES in the Se a_ be message is stored in the ES list of O T , and the sequence information of O T ES O can obtain the sequence of O.
O T將 A g _ 消息的下 中 器中的 作 力第二 子, O T按照上 3) 內容中生成 ey ey2.‥ ey8 的方法生成 O 的新的 ey ey2.‥ ey8, 利用 新的 ey ey2.‥ ey8 O 序列 信息的各 分別 □ ,得到 O 的 ES 2, 存儲上 ES 2、 O 的序列 信息和 的第  O T will force the second child in the lower arm of the A g _ message, and O T will generate ey ey2 according to the above 3) content. .. ey8's method generates O's new ey ey2. .. ey8, using the new ey ey2. .. ey8 O sequence information for each □ , get O ES 2, store the sequence information of ES 2, O and
子的 , O T 向 O A g _ 消息, A g _ 消息中的第 到第十 字 上 ES 2, O TA g _ 消息向 O O 。  Sub, O T to O A g _ message, A g _ message in the tenth word on the ES 2, O TA g _ message to O O .
6 ) O 接收到包含 ES 2 的 A g _ 消息 , 將 A g _ 消息的下行 中 器中的 作力第二  6) O receives the A g _ message containing ES 2 and puts the second in the downstream of the A g _ message
子, O 按照上 4) 內容中生成 ey ey2.‥ ey8的方法生成新 的 ey ey2.‥ ey8, 利用 新的 ey ey2.‥ ey8 身序列 信息的各 分別 □ , 得到ES 2, S 2 上 A g _ 消息中的ES 2 相同, 則 O 存儲A g _ 消息中 O T分配合 身的O , 否則 O 接收到的A g _ 消息。 Sub, O is generated according to the above 4) content ey ey2. .. ey8's method generates a new ey ey2. .. ey8, using the new ey ey2. .. ey8 The difference between the body sequence information □ , get ES 2, S 2 on the A g _ message ES 2 is the same, then O stores A g _ message OT assigns a matching O, otherwise O receives the A g _ message .
7) O T將 Ra g g_Req e 的下行 中 器中的 作 力第二 子, 按照上 3) 內容的方法再次 O 的 介ES 3, 存儲上 ES 3 O 的序列 信息的 , 同 , O T 向 Ra g g_Req e 7) OT will work on the second sub-branch of Ra g g_Req e, according to the method of the above 3), again, the ES of ES, store the sequence information of ES 3 O, and, OT To Ra g g_Req e
8) O 接收到J迷Ra g g_Req e , 將 Ra g g_Req e 的 下行 中 器中的 作力第二 子,按照上 4) 內 容的方法再次 介ES 3, 將ES 3 到 Se a_ be 消息 中 T  8) O receives the J fan Ra g g_Req e , and the second child in the descending device of Ra g g_Req e, according to the content of the above 4), the ES 3 is again introduced, and the ES 3 is sent to the Se a_ be message. T
9 ) O T 接收到 O 的 Se a_ be , 果 Se a_ be 中的ES 3信息 于O T本地存儲的ES 3列表,O T 結果Eq , 將Eq Ra g g_T e消息 O , 完 成O 。  9) O T receives the Se a_ be of O, the ES 3 information in Se a_ be is stored in the ES 3 list stored locally in O T , the O T result Eq , and the Eq Ra g g_T e message O is completed.
上 1) 9) 的內容中, O T和O 在 包含O 序列 , 的 消息 , O T和O O 序列 信息 了 , 在 3)和第 4) 的內容中,O T和O 得到了 的O 的序列 的值ES ,在 5) 6) 7)和 8) 的內容中, 了相同的算法更新 密的 O 序列 的值,比 ,在 5)和第 6)的內容中, O T和O 得到了 的O 的序列 的值ES 2, 即 將 前的ES 更新力ES 2 在 7)和第 8) 的內容中, O T和O 得到了 的 O 的序列 的值ES 3, 即 將 前的ES 2 更新力 S 3  In the contents of 1) 9), OT and O contain the O sequence, the message, the OT and OO sequence information, and in the contents of 3) and 4), OT and O get the value of the sequence of O ES In the contents of 5) 6) 7) and 8), the same algorithm updates the value of the dense O sequence, and in the contents of 5) and 6), OT and O get the sequence of O Value ES 2, the upcoming ES update power ES 2 In the contents of 7) and 8), OT and O get the value of the sequence of O ES 3, the upcoming ES 2 update force S 3
需要指出的是 O T和O 也可以在 5) 6) 7)和8) 的內容中 不更新 密的 O 序列 的值, 仍然始終 ES , 果不更新, 則在 5) 6) 7)和8) 的內容中, O T和O 的消息中包含 的序列 信息 , O T和O 可以始終 ES , 即 上 ES 的值代替ES 2和ES 3的值。 It should be pointed out that OT and O can also not update the value of the dense O sequence in the contents of 5) 6) 7) and 8), still always ES, if not updated, then in 5) 6) 7) and 8) In the content, the sequence information contained in the OT and O messages, OT and O can always be ES, that is, the value of the upper ES replaces the values of ES 2 and ES 3.
O T 未存儲任何O 的序列 信息, O T 存儲了 O 的Reg 的信, 。  O T does not store any sequence information of O, O T stores the letter of Reg of O, .
本 提出了 PO 統中 O 的 活方法。在O 的 中, O T和O 同交互的序列 信息是 密的, 且O T支 持 O 的 ( a wo ) 。 的 , 休 Reg 。 This paper proposes a live method of O in the PO system. In O In the middle, the sequence information of the OT and O interactions is dense, and the OT supports O (a wo ). , Hugh Reg.
在本 的 PO 統中, O T和O 存儲了相同的 于 ey 的算法 O T和O 存儲了 介 共享 子, 共享 子也 于生成 ey的第 子 O T和部分O 存儲了 介 于 O 身份的Reg ,O T存儲了 Reg 和 的第 子的 。 O 的 包括以下內容  In this PO system, OT and O store the same algorithm for ey OT and O store the shared object, and the shared child also stores the first OT and part O of ey to store the Reg of the O identity. Stored the first child of Reg and . O includes the following
1) O O T 的下行GTC 同步。 1) Downstream GTC synchronization of O O T .
2) O O T 周期性 的 p ea _ vehead、 或者 p ea _ vehead和Exe ded_B _ e gh消息, 取消息中的 配 置。  2) O O T Periodic p ea _ vehead, or p ea _ vehead and Exe ded_B _ e gh messages, take the configuration in the message.
3)O T S _Req e , 同 O T存儲 S _Req e 的下行 中 器中的 。 3) O T S _Req e , which is stored in the downstream device of S _Req e with O T .
4) O O T 的 S _Req e , 收到 S _Req e , 將 S _Req e 的下行 中 器中的 作力第二 子, O 利用生成 ey的算法 第一 子和上 第二 子 得 到 ey,然 O 利用生成 的算法 ey和 ,得到 e O 利用生成 的算法 ey和 2 , 得到 ey2 利用 生成 的算法 ey和 8 , 得到 ey8, 然 O 利用上 ey 身的序列 信息的第 介 , 利用上 ey2 身 序列 信息的第二 利用上 ey8 身的序列 信息 的 , 得到 S , O 存儲了 ES O S 到 Se a be O 消息中的第三到第十字 4) S _Req e of OOT, S _Req e is received, and the second sub-child of S _Req e is used, and O is obtained by using the first sub- and second sub-genes of ey algorithm to generate ey. The generated algorithm ey and get e O using the generated algorithms ey and 2 to obtain ey2 using the generated algorithms ey and 8 to obtain ey8, and then use the sequence information of the ey body to use the sequence information of the upper ey2 body. The second uses the sequence information of the ey8 body to obtain S, O stores the third to the cross in the ES OS to Se a be O message.
5) O T收到 O 的上 Se a be O 消息 , O T ES 向 A g _ , , A g _ 消息 中的 S 上 ES , O T A g _ , 向 O 6 ) O 接 到包含 ES 的 A g _ 消息 ,A g _ 消息中的ES 上 4) 內容中 O 存儲的ES 直相同, 則 O 存儲A g _ , 中 O T 身的 O 直, 否則, O A g _ , 。 5) OT receives O's Se a be O message, OT ES to A g _ , , A g _ message on S on ES , OTA g _ , to O 6 ) O to receive ES A g _ message , A g _ message in ES 4) Content in O storage The ES is the same straight, then O stores A g _ , the O of the OT body is straight, otherwise, OA g _ , .
7) O T向 Ra g g_Req e  7) O T to Ra g g_Req e
8) O 接收到 Ra g g_Req e , 上 4) 內容中 O 的 ES 到 Se a一 be O 中 O T, O T接 到 Se a_ be_ , Se a be O 中的ES 等于 5) 內容中 O T接收 存儲的 ES , 則 O T 結果Eq , Eq Ra g g_T e , O  8) O receives Ra g g_Req e , and 4) the ES of the content O to the OT of Se a-be O, the OT receives the Se a_ be_ , the ES of Se a be O is equal to 5) The content of the OT receives the storage ES, then OT result Eq, Eq Ra g g_T e , O
9) O T向 Pa Swod_Req eS 9) O T to Pa Swod_Req eS
) O 接 a wod_Req e , O 身的 Reg 到 Pa wod , 中  O is connected to a wod_Req e , O's Reg to Pa wod , in
11) O T接 到上 Pa wod , , O 的Reg 于O T 的Reg 列表, 則 O T可以得到 O 的第 子, O T 3) 內容中存儲的 作力第二 子, 利用生成 算法 上 第 子和第二 子 , 得到 ey, 利用 的 方法得 相 的 ey ey2.‥ ey8。 然 O T 上 e ey2 ey8分別 O 的ES 的各 到 O 的序列 , , O 存儲 序列 信息力合法O 的序列 , , 存儲 O 的第 子和 O 的序列 同的 座 , O 完成 。 由于 , O T已 存儲了 O 的序列 , , 因 , O , O T和O 的方法完成O 的 。 果O 的Reg 不 于O T的Reg 列表, 則 O T O11) OT receives the Reg list of Pa wod , , O in OT, then OT can get the first child of O, OT 3) The second child of the work stored in the content, using the first and second generation algorithms Son, get ey, use the method to get the phase ey ey2. .. ey8. Then OT on e ey2 ey8 respectively O's ES to the sequence of O, O stores the sequence information force legal O sequence, stores the O and O sequences in the same block, O is completed. Because, OT has stored the sequence of O, because, O , OT and O methods complete O's. If the Reg of O is not in the Reg list of OT, then OTO
O 的消息( eac vaeO ), O 的O 失效, O 失敗。 O's message (eac vaeO), O's O expires, O fails.
T 存儲了部分O 的序列 信息,和部分O 的Reg 的信息。  T stores the sequence information of part O and the information of Reg of part O.
本 提出了 PO 統中 O 的 活方法。在O 的  This paper proposes a live method of O in the PO system. In O
中, O T和O 同交互的序列 信息是 密的, 且O T支 持 O 的Pa wod 。  In the middle, the sequence information of the interaction between O T and O is dense, and O T supports the Pa wod of O.
在本 的 PO 統中, O T和O 存儲了相同的 于 ey 的算法 O T和O 存儲了 介 共享 子, 共享 子也 于生成 ey的第 子 O T 存儲各 第 子和各 O 的序列 同的 O T和部分 O 存儲了 于 O 身份的Reg , O T存儲了 Reg 和 的第 子的  In this PO system, OT and O store the same algorithm for ey OT and O store the shared object, and the shared child also stores the same OT and the sequence of each first and each O in the first OT of the generated ey. Part O stores Reg in O identity, OT stores the first in Reg and
。 O 的 包括以下內容  . O includes the following
1) O O T 的下行GTC 同步。  1) Downstream GTC synchronization of O O T .
2) O O T 周期性 的 p ea _ vehead、 或者 p eam_ vehead和Exe ded_B _ e gh消息, 取消息中的 配 置。 2) O O T Periodic p ea _ vehead, or p eam_ vehead and Exe ded_B _ e gh messages, take the configuration in the message.
3 oT S _Req e , 同 O T將 上 S _Req e 的下行 中 器中的 作力第二 子, O T存儲上 第二  3 oT S _Req e , with O T will be the second child in the downstream of S _Req e , O T stored on the second
子,O T利用生成 算法 上 各 O 的第 子和上 第二 子 , 得到 各 O 的 ey O T利用生成 的算法 ey和 , 得到 ey O T利用生成 的算法 ey和 2 , 得到 ey2, O T利用生成 的算法 ey和 8 , 得到 ey8, 然 O T利用上 ey 相 的序列 信 息的第 介 , 利用上 ey2 相 O 的序列 信息的第 二 利用上 ey8 相 O 的序列 信息的 Sub, OT uses the first and second children of each O in the generation algorithm to obtain the algorithm ey sum generated by the ey OT of each O, and obtains the algorithms ey and 2 generated by ey OT, and obtains the algorithm generated by ey2, OT utilization. Ey and 8 , get ey8, then OT uses the sequence information of the ey phase, and uses the sequence information of the ey8 phase O on the second using the sequence information of the ey2 phase O.
, 得到各 O 的ES , O T存儲了 S 、 的O 的 5 序列 和 的第 子的 。  Obtaining the ES of each O, O T stores the 5th sequence of S and O and the first sub of .
4) O O T 的 S _Req e , 收到 S _Req e , 將 S _Req e 的下行 中 器中的 作力第二 子, O 利用生成 ey的算法 第一 子和上 第二 子 得 到 ey,然 O 利用生成 的算法 ey和 ,得到 ey O 利用生成 的算法 ey和C2 , 得到 ey2, O 利 用生成 的算法 ey和C8 , 得到 ey8, 然 O 利用上 ey 身的序列 信息的第 介 , 利用上 ey2 身序列 信息的第二 利用上 ey8 身的序列 信 息的 , 得到 S O 存儲了 ES O S5 到 Se a_ be 消息中的第三到第十字  4) S _Req e of OOT, S _Req e is received, and the second sub-child of S _Req e is used, and O is obtained by using the first sub- and second sub-genes of ey algorithm to generate ey. The generated algorithm ey and get ey O using the generated algorithms ey and C2 to get ey2, O using the generated algorithms ey and C8 to get ey8, and then use the sequence information of the ey body to use the upper ey2 body sequence. The second use of the information on the sequence information of the ey8 body, the SO stores the third to the cross in the ES O S5 to Se a_ be message
5) O T收到 O 的上 Sena_ be 消息 , O T和 O 收到的ES 是否 于O T本地存儲的ES 列表, 而 取 下 5.1)或5.2) 中的 休 。  5) O T receives the upper Sena_ be message of O, and the ES received by O T and O is in the ES list stored locally by O T , and takes the rest in 5.1) or 5.2).
5.1) Se a be O 中的ES 信息 于O T本地存儲的ES0 列表 , 休 以下內容  5.1) ES information in Se a be O ES0 list stored locally in O T , Hour
5.1. )O T可以 ES O 的序列 信息的 得到 O 的序列 信息。O T將 A g _ 消息的下行 中 器中的 作力第二 子,O T按照上 3) 內容中生成 ey ey2 ey8的方法生成 O 的新的 ey ey2 ey8, 利用5 新的 ey ey2 ey8 O 序列 的各 分別 , 得到 的ES 2, 存儲上 ES 2 O 的序列 信息的 , O T向 O A g _ 消息, A g _ 消息中的第 到第十 字 上 ES 2,O T A g _ 消息向 O 分配 O5.1. OT can obtain the sequence information of O by the sequence information of ES O . OT will work on the second sub-input of the A g _ message, and OT will generate the new ey ey2 ey8 of O according to the method of generating ey ey2 ey8 in the above 3), using 5 new ey ey2 ey8 O sequences. Separately, get ES 2, storing sequence information on ES 2 O, OT to OA g _ message, A g _ message in the first cross on ES 2, OTA g _ message assigning O to O
5.1.2) O 接收到包含 ES 2 的 A g _ 消息 , 將 A g _ 消息的下行 中 器中的 作力第二  5.1.2) O receives the A g _ message containing ES 2 and puts the second in the downstream of the A g _ message
子, O 按照上 4) 內容中生成 ey ey2.‥ ey8的方法生成新 的 ey ey2.‥ ey8, 利用 新的 ey ey2.‥ ey8 身序列 的各 分別 □ ,得到ES 2, ES 2 上 A g _ 消息 中的 S 2 相同, 則 O 存儲A g _ 消息中 O T分配 身 的O , 否則 O 接收到的A g _ 消息。 Sub, O is generated according to the above 4) content ey ey2. .. ey8's method generates a new ey ey2. .. ey8, using the new ey ey2. .. ey8 The respective sequences of □8 get ES 2, and S 2 in the A g _ message on ES 2 is the same, then O stores O in the A g _ message, and O receives the A g _ message.
5.1.3)O T將 Ra g g_Req e 的下行 中 器中的 作力第二 子, 按照 3) 內容的方法再次 O 的 介 ES 3, 存儲上 S 3 O 的序列 信息的 , 同 , O T向O Ra g g_Req e  5.1.3) OT will force the second sub-branch in Ra g g_Req e, according to the method of 3) content again, the ES 3, store the sequence information of S 3 O, the same, OT To O Ra g g_Req e
5.1.4) O 接收到J迷Ra g g_Req e , 將 Ra g g_Req e 的下行 中 器中的 作力第二 子,按照 4) 內容 的方法再次 介ES 3, 將ES 3 到 Se a be O 消息中 5.1.5 ) O T 接收 O 的 Se a_ be , Se a_ be 中的ES 3信息 于O T本地存儲的ES 3列表,O T 結果Eq , 將Eq Ra g g_T e消息 O , 完 成O 。  5.1.4) O receives the J Rag g_Req e , and the second sub-branch in the descending middle of the Ra g g_Req e, and then ES 3 according to the method of 4), the ES 3 to Se a be O In the message 5.1.5) OT receives the Se a_ be of O, the ES 3 information in Se a_ be is stored in the ES 3 list stored locally, the OT results Eq, and the Eq Ra g g_T e message O completes O.
5.2) Sena_ be 中的 ES 信息不 于 O T本地存儲的 S 列表 , 休 以下內容 5.2.1) O T存儲 ES , 向 O A g _ , , A g _ , 中的 S 力本 內容中 O T接收到 存儲的 S , O T A g _ 消息向 O O 5.2) The ES information in Sena_ be is not in the S list stored locally by OT. 5.2.1) OT stores ES, S in the OA g _ , , A g _ , the content of the OT receives the stored S, OTA g _ message to OO
5.2.2) O 接收到包含 S 的 A g _ 消息 , 果 5 A g _ 消息中的ES 上 4) 內容中 O 存儲的ES 直相同, 則 O 存儲A g _ , 中 O T 身的 O 直, 否則, O A g _ , 。  5.2.2) O receives the A g _ message containing S, if the ES in the 5 A g _ message is 4) the content of the stored O is the same, then O stores A g _ , the O of the OT body Straight, otherwise, OA g _ , .
5.2.3) O T向 Ra g g_Req e  5.2.3) O T to Ra g g_Req e
5.2.4) O 將上 4) 內容中 身存儲的 ES 5.2.4) O will be stored in the upper 4) contents of the ES
Sena_ be_ 中  Sena_ be_
5.2.5) O T接收到 Se a_ be_ , 果Se a_ be_ 中的 S 等于5.2.1) 內容中 O T接收 存儲的ES , 則 O T 結果Eq , 將Eq Ra g g_T e , O 5.2. ) O T向 Pa wod_Req e 5.2.5) OT receives Se a_ be_, and S in Se a_ be_ is equal to 5.2.1) The content OT receives the stored ES, then OT results Eq, Eq Ra g g_T e , O 5.2. ) OT to Pa wod_Req e
5 5.2.7) O 接收 a wod_Req e , O 將 身的 Reg 5 5.2.7) O Receive a wod_Req e , O will be Reg
到Pa wod , 中  To Pa wod, in
5.2.8) T接收到上 Pa wod , , 果O 的Reg 于O T 的Reg 列表, 則 O T可以得到 O 的第 子, O T利用生 成 算法 上 第 子和第 3) 內容中存儲的第二 子0 ,得 ey, 利用 3) 內容的方法得 相 的 e ey2 ey8。 然 O T 上 ey ey2.‥ ey8分別 O 的ES 的 各 , 得到 O 的序列 , , O 存儲 序列 信息力合 法O 的序列 , , 存儲 O 的第 子和 O 的序 列 同的 座 , O 完成 。 5.2.8) When T receives the upper Pa wod , and the Reg of the O is in the Reg list of OT, OT can get the first child of O, and the second is stored in the first and third contents of the OT. Sub 0, get ey, use the 3) content method to get the phase e ey2 ey8. O O on ey ey2. .. ey8 respectively O of the ES, get the sequence of O, , O store the sequence information, force the sequence of O, store the first part of O and the sequence of O with the same block, O complete.
5 果O , O T和O 的方法完成O 的 。 5 fruit O, OT and O methods to complete O .
果O 的Reg 不 于O T的Reg 列表, 則 O T O eac vae O 消息, O 的 O 失效, O  If the Reg of O is not the Reg list of O T , then O T O eac vae O message, O of O is invalid, O
失敗。 failure.
J 1) 5) 的內容中, O T和O 在 包含O 序列 , 的 消息 , O T和O O 序列 了 , 在 3)和第 4) 的內 容中,O T和O 得到了 的O 的序列 的值 S ,在 5.1.1) 5.1.2)、 5.1.3)和5.1.4) 的內容中, O T和O 都 了相同的方法 更新 的 O 序列 的值, 在 5.1.1)和第 5.1.2) 的內容中, O T 和O 得到了 的O 的序列 的值 S 2 在 5.1.3)和第 5.1.4) 的內容中, O T和O 得到了 的O 的序列 的值ES 3  In the content of J 1) 5), OT and O in the sequence containing the O sequence, OT and OO sequences, in the contents of 3) and 4), OT and O get the value S of the sequence of O, In the contents of 5.1.1) 5.1.2), 5.1.3) and 5.1.4), both OT and O have the same method to update the value of the O sequence, in 5.1 In the contents of .1) and 5.1.2), the values of S of the sequence of O obtained by OT and O are in the contents of 5.1.3) and 5.1.4), OT and O. The obtained value of the sequence of O is ES 3
O T和O 也可以在 5.1.1)、 5.1.2)、 5.1.3)和5.1.4) 的內容中不 更新 密的 O 序列 的值, 在 5.1.1)、 5.1.2)、 5.1.3)和5.1.4) 的內 容中, O T和O 的消息中包含 序列 信息 , O T和O  OT and O can also not update the value of the dense O sequence in the contents of 5.1.1), 5.1.2), 5.1.3) and 5.1.4), in 5.1. In the contents of 1), 5.1.2), 5.1.3) and 5.1.4), the OT and O messages contain sequence information, OT and O.
上 ES 的值代替ES 2和ES 3的值。 The value of the upper ES replaces the values of ES 2 and ES 3.
PO 中 信息交互安全的 統, 統包括 侍瑜羊 , 于 O T O 同 交互O 的序列 信息 , 在O T O 同 ES  The information exchange security system in the PO system includes the sequence information of the servant Yang, O O O and the interaction O, in O T O with ES
, 統近包括O T 的 羊 , 于在O T O 的 , , O T O 事先約定的方式, O 序列 信息中 包含的各 分別 得ES  , the sheep including the O T in the O T O , , O T O pre-agreed way , the O sequence information contains the respective ES
, 統近包括 O 的 羊 , 于在O O 的 序列 , , O O T事先約定的方式, O  , the approach includes the sheep of O, in the sequence of O O , , O O T agreed in advance, O
信息中 包含的各 分別 得 S  Each of the information contained in the message is S
統近包括 O T 的解 羊 , 以下 不同情況下, 羊 的 不同 休 。 The approach includes the OT's solution to the sheep, the following different situations, the sheep's Different breaks.
第 休 O T 的解 羊 , 于 O T 存儲的 O 身份的合法信息 O 的序列 信息 ,O T 存儲的 O 的ES O 的序列 信息的 , 得 ES 相 的序列 信息。 第二 休 O T 的解 羊 , 于 O T 存儲的 O 身份的合法信息 O 的非序列 信息 , O T向 O O O 的非序列 信息 存儲的 O 的非序列 信息 ES 的算法和/或 同的 得 密密 , O T ES  The rest of the O T , the legal information of the O identity stored in the O T , the sequence information of the O O , and the sequence information of the ES O stored in the O T , obtain the sequence information of the ES phase . The second rest of the OT solution, the non-sequence information of the legal information O of the O identity stored in the OT, the non-sequence information of the O stored by the non-sequence information of the OT to the O, and/or the same secret, OT ES
得 ES 相 的O 的的序列 信息。  The sequence information of the O phase of the ES phase.
第三 休 O T 的解 羊 , 于 O T 存儲的 O 身份的合法信息包括O 的序列 信息和O 的非序列 信息 , 不同情況 上 第 或第二 休 。  The third Hugh O T solution, the legal information of the O identity stored in O T includes the sequence information of O and the non-sequence information of O, in different cases on the first or second rest.
果O T O 接收的ES 于 身存儲的ES 序列 信息的 , 則 上 第 休 , 即 合法信息 O 的序列 信息 的解 。 果O T O 接收的ES 不 于 身存儲的 ES 序列 信息的 , 則 上 第二 休 , 即 合 法信息 O 的非序列 信息 的解 。  If the ES received by the O T O is stored in the ES sequence information, then the first rest, that is, the solution of the sequence information of the legal information O. If the ES received by O T O is not stored in the ES sequence information, then the second rest, that is, the solution of the non-sequence information of the conjunction information O.
, 統近包括 O 的比較羊 , 于 前 O 將接收到 的ES 前O 身存儲的ES 比較, 果相同,則 O T 的 包含 S 的消息是 己的, 接受 包含 S 的消息, 否則, 包含ES 的消息。  , the comparison sheep including O, in the previous O will receive the ES before the storage of the ES before the ES comparison, the same, then the OT message containing S is its own, accept the message containing S, otherwise, including the ES Message.
, 統近包括O T 的更新羊 , 于在O T每次 O 同 包含ES 的消息 前, 步 需要 序列 信息的 更新, O 事先約定的方式, 再次 O 序列 信息中 包含的各 分別 , 得更新 的 S , 統近包括 的更新羊 , 于在O 每次 O T 同 包含 S 的消息 前, 步 需要 序列 信息的 更新, O T事先約定的方式, 再次 O 序列 信息中 包含的各 分別 , 得更新 的ES , the update includes the OT update sheep, before the OT every time O with the ES-containing message, the step needs to update the sequence information, O pre-agreed, again, the O-sequence information contains the respective, the updated S The update includes the update of the sheep. Before each OT with the message containing S, the step needs to update the sequence information, the OT agrees in advance, and the O-sequence information is included again.
以上涉及到的O 的序列 ,以 S 表示,英文全 Se a be 器用 S pe a eCo 他 表示。  The sequence of O mentioned above is represented by S, and the English full Se a device is represented by S pe a eCo .
以上 , 力本 的較佳 而已, 非 于限定本 的保  Above, the best of the power, not the limit

Claims

要求 Claim
1、 中 信息交互安全的方法, 其特 在于, 方法 包括 光域 終端 (O T) 羊 (O ) 同 交互O 的 信息 , 在O T O 同 O 的 的序列 信息 ( S ) 2、 要求 1所述的方法, 其特 在于, 在O T O 的序 列 信息 , 方法近包括 O T O 約定的方式,  1. A method for information security in a medium, the method comprising the information that the optical domain terminal (OT) sheep (O) interacts with O, the sequence information of the OTO with O (S) 2, the method described in claim 1. , in particular, in the sequence information of OTO, the method includes the way of OTO convention,
O 序列 信息中 包含的各 分別 得ES Each of the O sequence information is included in the ES
3、 要求2所述的方法, 其特 在于, 在O O 的序 列 信息 , 方法近包括 O O T約定的方式,  3. The method of claim 2, wherein the sequence information in O O includes a method of O O T convention,
4、 要求3所述的方法, 其特 在于, 方法近包括 在 T ES 在 ES 的 休 包括 4. The method of claim 3, wherein the method is substantially included in the T ES at the ES
占 O T 存儲的 O 身份的合法信息 O 的序列 信息 , O T 存儲的 O 的ES O 的序列 信息的 , 得 The sequence information of the O information of the O identity stored in the O T , the sequence information of the O O stored by the O T ,
ES 相 的O 的序列 信息 Sequence information of the O phase of the ES phase
O T 存儲的 O 身份的合法信息 O 的非序列 信息 , O T向 O O O 的非序列 信息 存儲的 O 的非序列 信息 ES 的算法和/或 同的 得 到 ES 的 , O T ES 的 ES 得 S 相 的O 的序列 信息 OT stores the O-identity of the legal information O's non-sequence information, OT-to-OO non-sequence information stores the O's non-sequence information ES's algorithm and/or the same ES, OT ES's ES S-phase O's Sequence information
O T 存儲的 O 身份的合法信息包括O 的序列 信息和 O 的非序列 信息 , 果O T O 接收的 ES 于 身存儲的 ES O 的序列 信息的 , 則 合法信息 O 的序 列 信息 的解 果O T O 接收的ES 不 于 身存 儲的ES O 的序列 信息的 , 則 合法信息 O 的非序列 信息時的解 。 The legal information of the O identity stored by the OT includes the sequence information of the O and the non-sequence information of the O. If the ES receives the sequence information of the ES O stored in the body, the solution of the sequence information of the legal information O OTO receives the ES Legal information O if the sequence information of ES O is not stored The solution to non-sequence information.
5、 要求3 的方法, 其特 在于, 方法近包括 在  5. The method of claim 3, characterized in that the method is
的包含ES 的消息是否 前O 身的消息 的 休 包括  The message containing the ES is the message of the former O body.
占前O 將接收到的ES 前O 身存儲的ES 比較, 果 相同, 則 的包含ES 消息是 己的, 接受 消 息 否則, 消息。  The ES compares the received ES before the ES, and if it is the same, the ES message is included, accepts the message, otherwise, the message.
6、 要求 1至5任 項 的方法, 其特 在于, 在O T , O T每次 O 同 包含 S 的消息 前, 方法近  6. A method of claim 1 to 5, characterized in that, before O T , O T each time O contains a message of S, the method is near
需要 序列 信息的 更新, O 約定的方式, 再 次 O 序列 信息中 包含的各 分別 , 得更新 的 ES  The update of the sequence information is required, the way of the O contract, the each part contained in the O-series information, and the updated ES
7、 要求 1至5任 項 的方法, 其特 在于, 在O , O 每次 O T 同 包含ES 的消息 前, 方法近包括 根 需要 序列 信息的 更新, O T約定的方式, 再 次 O 序列 信息中 包含的各 分別 , 得更新 的 ES  7. The method of claim 1 to 5, characterized in that, before O, O, each time the OT and the message containing the ES, the method includes the update of the root sequence information, the OT convention, and the O sequence information. Each of the separate, updated ES
8、 要求7 的方法, 其特 在于, 在ES 更新的情況下, 方法近包括 在O O T 的包含ES 的消息是否  8. The method of claim 7, which is characterized in that, in the case of an ES update, the method includes whether the message containing the ES in O O T is
前O 身的消息 休 包括  The message of the former O
占前O 更新 身的ES , 將接收到的ES 更新的ES 比較, 果相同 則 O T 的包含ES 的消息是 己的 接受 消息 否則, 消息。  The ES of the previous O update is compared with the ES of the received ES update. If the ES is the same, the message containing the ES of the O T is the accepted message. Otherwise, the message.
9、 中 信息交互安全的 統, 其特 在于, 統 包括 侍瑜羊 , 于O T O 同 交互O 的序列 信息 , 在 O T O 同 O 的ES 9. The system of information interaction security, which is characterized by the fact that the system includes the sequence information of the OTO and the interactive O. OTO with O's ES
10、 要求9 的 統, 其特 在于, 統近包括O T 的 羊 , 于在O T O 的序列 信息 ,O T O 約定的方式, O 序列 信息中 包含的各 分別 得 5 S  10. The system of claim 9, which is characterized by the fact that the sheep including O T are in the sequence information of O T O , the way O O O is agreed upon , and the O sequence information contains 5 S respectively .
11、 要求 10 的 統, 其特 在于, 統近包括 O 的 羊 , 于在O O 的序列 信息 , O  11. The system of claim 10, which is characterized by the fact that the sheep including O, the sequence information in O O, O
O T約定的方式, O 序列 信息中 包含的各 分別  O T agreed by the way, the O sequence information contains the respective differences
得ES ES
2、 要求 11 的 統, 其特 在于, 統近包括 O T 的解 羊 , 于 O T 存儲的 O 身份的合法信息 O 的 序列 信息 ,O T 存儲的 O 的ES O 的序列 信息的 , 得 ES 相 的O 的序列 信息 2, the requirements of the 11 system, its special features, including the OT solution, the OT stored in the O identity of the legal information O sequence information, OT stored O O ES O sequence information, the ES phase O Sequence information
O T 存儲的 O 身份的合法信息 O 的非序列 信息 15 , O T向 O O O 的非序列 信息 存儲的 O T stored legal information of O identity Non-sequence information of O 15 , O T to O O O Non-sequence information Storage
O 的非序列 信息 ES 的算法和/或 同的 得 到 ES 的 , O T ES 的 ES 得 ES 相 的O 的序列 信息 O's non-sequence information ES's algorithm and / or the same ES, O T ES ES ES phase O's sequence information
O T 存儲的 O 身份的合法信息包括O 的序列 信息和 20 O 的非序列 信息 , 果O T O 接收的 ES 于 身存儲的 ES O 的序列 信息的 , 則 合法信息 O 的序 列 信息 的解 果O T O 接收的ES 不 于 身存 儲的ES O 的序列 信息的 , 則 合法信息 O 的非序列 信息 的解 。  The legal information of the O identity stored by the OT includes the sequence information of the O and the non-sequence information of the 20 O. If the ES receives the sequence information of the ES O stored in the body, the solution of the sequence information of the legal information O is received by the OTO. If the ES does not store the sequence information of the ES O, the solution of the non-sequence information of the legal information O.
25 3、 要求 11 的 統, 其特 在于, 統近包括 O 的比較羊 , 于 前 將接收到的 ES 前 O 身存儲的 S 比較, 果相同,則 的包含 S 的消息是 己的, 接受 消息 否則, 消息。 25 3. The system of claim 11 is characterized by the fact that the system includes O The comparison sheep, before the ES is stored in the front of the body, the comparison of the S, if the same, then the message containing S is its own, accept the message otherwise, the message.
14、 要求9至13任 項 的 統, 其特 在于, 統近 包括 的更新羊 , 于在 每次 O 同 包含ES 的 消息 前, 步 需要 序列 信息的 更新,  14. Requires the system of any of items 9 to 13, which is characterized by the fact that the updated sheep included in the system needs to update the sequence information before each time the message containing the ES is included.
O 約定的方式, 再次 O 序列 信息中 包含的各 分別 , 得更新 的ES O The agreed way, again the O-sequence information is included in each, the updated ES
15、 要求9至13任 項 的 統, 其特 在于, 統近 包括 O 的更新羊 , 于在O 每次 同 包含ES 的 消息 前, 步 需要 序列 信息的 更新,  15. Requires the system of any of 9 to 13, which is characterized by the fact that the update sheep including O is required to update the sequence information every time before O contains the message of ES.
O T約定的方式,再次 O 序列 信息中 包含的各 分別 , 得更新 的ES The way of the O T convention, again the O-sequence information, the updated ES
PCT/CN2010/074678 2009-09-29 2010-06-29 Method and system for implementing information interaction security in passive optical network WO2010145599A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN200910176386.0 2009-09-29
CN2009101763860A CN102036128A (en) 2009-09-29 2009-09-29 Method and system for realizing information interaction security in Gigabit-capable passive optical network

Publications (1)

Publication Number Publication Date
WO2010145599A1 true WO2010145599A1 (en) 2010-12-23

Family

ID=43355885

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2010/074678 WO2010145599A1 (en) 2009-09-29 2010-06-29 Method and system for implementing information interaction security in passive optical network

Country Status (2)

Country Link
CN (1) CN102036128A (en)
WO (1) WO2010145599A1 (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101083589A (en) * 2007-07-13 2007-12-05 华为技术有限公司 Terminal detection authentication process, device and operation administrative system in passive optical network
CN101150391A (en) * 2006-09-20 2008-03-26 华为技术有限公司 A method, system and device for preventing optical network unit in passive optical network from being counterfeiting
CN101267340A (en) * 2008-03-25 2008-09-17 中兴通讯股份有限公司 A SN theft authentication method for passive optical network terminal
US20080304834A1 (en) * 2007-06-06 2008-12-11 At&T Knowledge Ventures, L.P. System and method for registration of network units
CN101499898A (en) * 2008-02-03 2009-08-05 中兴通讯股份有限公司 Method and apparatus for cipher key interaction

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101150391A (en) * 2006-09-20 2008-03-26 华为技术有限公司 A method, system and device for preventing optical network unit in passive optical network from being counterfeiting
US20080304834A1 (en) * 2007-06-06 2008-12-11 At&T Knowledge Ventures, L.P. System and method for registration of network units
CN101083589A (en) * 2007-07-13 2007-12-05 华为技术有限公司 Terminal detection authentication process, device and operation administrative system in passive optical network
CN101499898A (en) * 2008-02-03 2009-08-05 中兴通讯股份有限公司 Method and apparatus for cipher key interaction
CN101267340A (en) * 2008-03-25 2008-09-17 中兴通讯股份有限公司 A SN theft authentication method for passive optical network terminal

Also Published As

Publication number Publication date
CN102036128A (en) 2011-04-27

Similar Documents

Publication Publication Date Title
JP5366108B2 (en) Passive optical network security enhancement based on optical network terminator management control interface
CN108566653B (en) Operation management method of base station equipment and base station equipment
CN104584478B (en) Terminal authentication method, apparatus and system in passive optical network
WO2010135936A1 (en) Method and apparatus for authentication in passive optical network and passive optical network thereof
CN106921437B (en) A kind of method and apparatus for establishing virtual access node in optical access network
WO2011127731A1 (en) Registration activation method and system for optical network unit
CN102017514A (en) Authentication information management method in home network and an apparatus therefor
CN112533211B (en) Certificate updating method and system of eSIM card and storage medium
WO2016191942A1 (en) Optical network unit authentication method, optical line terminal and optical network unit
CN111182497A (en) V2X anonymous authentication method, device and storage medium
CN103856330A (en) Cluster group calling key distribution method based on asymmetric encryption system
CN106535089A (en) Machine to machine virtual private network
CN115276974A (en) Method and system for quantum security device to access base station
CN102170421A (en) Method and system for realizing mixed authentication
US20150288683A1 (en) Method, device, and system for authentication
CN108259486A (en) End-to-end key exchange method based on certificate
CN109039600B (en) Method and system for negotiating encryption algorithm in passive optical network system
CN108600266A (en) A kind of statement filtering authentication method and Verification System
WO2010145599A1 (en) Method and system for implementing information interaction security in passive optical network
CN101998180B (en) Method and system for supporting version compatibility between optical line terminal and optical network unit
JP2011130251A (en) Geopon system and communication setting method of novel subscriber-side terminal
CN113742701B (en) System and method for opening AR/VR service, gateway device, AR/VR device and storage medium
JP2013175835A (en) Optical communication network system, slave station communication device, master station communication device, and control method
JP2010130341A (en) Ge-pon system
CN113449312A (en) User communication platform based on alliance block chain

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 10788995

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 10788995

Country of ref document: EP

Kind code of ref document: A1

点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载