The subject matter of this application relates to authentication techniques.
Cable Television (CATV) services provide content to large groups of customers (e.g., subscribers) from a central delivery unit, generally referred to as a “head end,” which distributes channels of content to its customers from this central delivery unit through an access network comprising a hybrid fiber coax (HFC) cable plant, including associated components (nodes, amplifiers and taps). Modern Cable Television (CATV) service networks, however, not only provide media content such as television channels and music channels to a customer, but also provide a host of digital communication services such as Internet Service, Video-on-Demand, telephone service such as VoIP, home automation/security, and so forth. These digital communication services, in turn, require not only communication in a downstream direction from the head end, through the HFC, typically forming a branch network and to a customer, but also require communication in an upstream direction from a customer to the head end typically through the HFC network.
To this end, CATV head ends have historically included a separate Cable Modem Termination System (CMTS), used to provide high speed data services, such as cable Internet, Voice over Internet Protocol, etc. to cable customers and a video headend system, used to provide video services, such as broadcast video and video on demand (VOD). Typically, a CMTS will include both Ethernet interfaces (or other more traditional high-speed data interfaces) as well as radio frequency (RF) interfaces so that traffic coming from the Internet can be routed (or bridged) through the Ethernet interface, through the CMTS, and then onto the RF interfaces that are connected to the cable company's hybrid fiber coax (HFC) system. Downstream traffic is delivered from the CMTS to a cable modem and/or set top box in a customer's home, while upstream traffic is delivered from a cable modem and/or set top box in a customer's home to the CMTS. The Video Headend System similarly provides video to either a set-top, TV with a video decryption card, or other device capable of demodulating and decrypting the incoming encrypted video services. Many modern CATV systems have combined the functionality of the CMTS with the video delivery system (e.g., EdgeQAM—quadrature amplitude modulation) in a single platform generally referred to an Integrated CMTS (e.g., Integrated Converged Cable Access Platform (CCAP))—video services are prepared and provided to the I-CCAP which then QAM modulates the video onto the appropriate frequencies. Still other modern CATV systems generally referred to as distributed CMTS (e.g., distributed Converged Cable Access Platform) may include a Remote PHY (or R-PHY) which relocates the physical layer (PHY) of a traditional Integrated CCAP by pushing it to the network's fiber nodes (R-MAC PHY relocates both the MAC and the PHY to the network's nodes). Thus, while the core in the CCAP performs the higher layer processing, the R-PHY device in the remote node converts the downstream data sent from the core from digital-to-analog to be transmitted on radio frequency to the cable modems and/or set top boxes, and converts the upstream radio frequency data sent from the cable modems and/or set top boxes from analog-to-digital format to be transmitted optically to the core.
For a better understanding of the invention, and to show how the same may be carried into effect, reference will now be made, by way of example, to the accompanying drawings, in which:
Referring to
Referring to
By way of example, the remote PHY device 290 may covert downstream DOCSIS (i.e., Data Over Cable Service Interface Specification) data (e.g., DOCSIS 1.0; 1.1; 2.0; 3.0; 3.1; and 4.0 each of which are incorporated herein by reference in their entirety), video data, out of band signals received from the D-CMTS 230 to analog for transmission over RF or analog optics. By way of example, the remote PHY device 290 may convert upstream DOCSIS, and out of band signals received from an analog medium, such as RF or linear optics, to digital for transmission to the D-CMTS 230. As it may be observed, depending on the particular configuration, the R-PHY may move all or a portion of the DOCSIS MAC and/or PHY layers down to the fiber node.
Referring to
Referring to
The 802.1X is a network authentication protocol that opens ports for network access when an organization authenticates a user's identity and authorizes them for access to the network. The user's identity is determined based on their credentials or certificate, which is confirmed by the RADIUS server, which may communicate with an organization's directory, if desired. The standard authentication protocol used on encrypted networks is Extensible Authentication Protocol (EAP), which provides a secure method to send identifying information for network authentication. 802.1X is the standard that is used for passing EAP over wired and wireless local area networks.
The 802.1X authentication process is comprised of four principal steps, initialization, initiation, negotiation, and authentication. The initialization starts when the authenticator detects a new device and attempts to establish a connection. The authenticator port is set to an “unauthorized” state, meaning that only 802.1X traffic will be accepted and every other connection will be dropped. The initiation includes the authenticator starts transmitting EAP-Requests to the new device, which then sends EAP response back to the authenticator. The response usually contains a way to identify the new device. The authenticator receives the EAP response and relays it to the authentication server in a RADIUS access request packet. The negotiation includes the authentication server receiving the request packet, then it will respond with a RADIUS access challenge packet containing the approved EAP authentication method for the device. The authenticator will then pass on the challenge packet to the device to be authenticated. The authentication includes once the EAP method is configured on the device, the authentication server begins sending configuration profiles so the device will be authenticated. Once the process is complete, the port will be set to “authorized” and the device is configured to the 802.1X network.
The DOCSIS protocol does not include support for 801.1X authentication. Accordingly, a device that is configured to be authenticated based upon 802.1X, such as a voice based handheld phone that is interconnected to the customer premise equipment, is not suitable for being authenticated to the DOCSIS based cable network. It is desirable to facilitate the use of devices on a DOCSIS based network that are authenticated using other techniques, such as IEEE 802.1X, which is a port-based Network Access Control technique. In order to accommodate devices that include data transmitted using a DOCSIS based cable network which are authenticated based upon non-DOCSIS techniques, such as IEEE 802.1X, it is desirable to identify the network traffic that is not authenticated using DOCSIS.
Referring to
Referring to
Referring to
The customer premise equipment 600 will forward all upstream traffic 700 from the supplicant client 660, including EAPoL (extensible authentication protocol over LAN) from the customer premise equipment 600, to the service flow 710 configured for 802.1X authentication. The MSO network 620 and/or DAA device 610 will discard 720 all non-EAPol traffic received from the service flow 710.
The MSO network 620 and/or DAA device 610 will process 730 all EAPoL traffic received from the service flow 710. In one approach, the DAA device 610 will tunnel 740 the EAPoL packets to the remote controller 630 for processing. The remote controller 630 performs the 802.1X authenticator role. The remote controller 630 may use a protocol, such as RADIUS, to consult the authentication server 640 to approve the media access control (MAC) address of the supplicant client 660. By way of example, the authentication process may involve, (1) an EAPoL-request identity 750, (2) an EAPoL-response identity 752, (3) a request 754, (4) a challenge 756, (5) an EAPoL-request challenge 758, (6) an EAPoL-response challenge 760, (7) a request 762, (8) an accept 764, and (9) an EAPoL-success 766. As a result, the authentication server 640 may successfully authenticate 768 a supplicant device 660 MAC address.
An 802.1X authenticator (e.g., the remote controller 630 and/or DAA device 610) updates a forwarding table 770 to bind 772 the supplicant client 660 MAC address to the customer premise equipment 600 MAC address, and permit forwarding to and from the supplicant client 660. In this manner, the MAC address of the supplicant device is added to the forwarding table. The supplicant client 660 DHCP traffic 774 (discover/offer/request/acknowledge) is permitted on the network and the supplicant client 660 may obtain an IP address lease from the DHCP server 650. Periodically, the 802.1X authenticator (e.g., the remote controller 630 and/or DAA device 610) may re-authenticate the MAC of the supplicant device 660. The IP address 776 of the suppliant device is added to the forwarding table. The suppliant device 660 is permitted to access the network 780 to send and receive data 782, with its MAC address and IP address of the supplicant client 660 added to the forwarding table.
When the MAC address of the supplicant device 660 is not successfully re-authenticated, the 802.1X authenticator updates the DAA device 610 forwarding table to remove the MAC address binding to the supplicant device 660 and/or to reject forwarding to/from the MAC address of the supplicant device 660.
Referring to
Moreover, each functional block or various features in each of the aforementioned embodiments may be implemented or executed by a circuitry, which is typically an integrated circuit or a plurality of integrated circuits. The circuitry designed to execute the functions described in the present specification may comprise a general-purpose processor, a digital signal processor (DSP), an application specific or general application integrated circuit (ASIC), a field programmable gate array (FPGA), or other programmable logic devices, discrete gates or transistor logic, or a discrete hardware component, or a combination thereof. The general-purpose processor may be a microprocessor, or alternatively, the processor may be a conventional processor, a controller, a microcontroller or a state machine. The general-purpose processor or each circuit described above may be configured by a digital circuit or may be configured by an analogue circuit. Further, when a technology of making into an integrated circuit superseding integrated circuits at the present time appears due to advancement of a semiconductor technology, the integrated circuit by this technology is also able to be used.
It will be appreciated that the invention is not restricted to the particular embodiment that has been described, and that variations may be made therein without departing from the scope of the invention as defined in the appended claims, as interpreted in accordance with principles of prevailing law, including the doctrine of equivalents or any other principle that enlarges the enforceable scope of a claim beyond its literal scope. Unless the context indicates otherwise, a reference in a claim to the number of instances of an element, be it a reference to one instance or more than one instance, requires at least the stated number of instances of the element but is not intended to exclude from the scope of the claim a structure or method having more instances of that element than stated. The word “comprise” or a derivative thereof, when used in a claim, is used in a nonexclusive sense that is not intended to exclude the presence of other elements or steps in a claimed structure or method.
This application claims the benefit of U.S. Provisional patent Application Ser. No. 63/315,798 filed Mar. 2, 2022.
Number | Date | Country | |
---|---|---|---|
63315798 | Mar 2022 | US |