Today, users receive access to services on Passive Optical Networks (PONs) with limited security. In particular, a user establishes a connection to a PON via an Optical Network Terminal (ONT), and the ONT provides services accessible via an Optical Line Termination (OLT). With an established connection, the ONT becomes vulnerable to unauthorized users.
A method or corresponding apparatus in one embodiment of present invention restricts user access to services via an Optical Network Terminal (ONT). In one example embodiment, the ONT causes a ranging fault to disable itself from communicating upstream with an Optical Line Terminal (OLT) in a Passive Optical Network (PON) in an event the user fails to provide a valid, ONT level, user authorization entry. By causing the ranging fault, the ONT restricts a user's access to services. Further, the ONT, in an event it is in a ranged state but the user fails to provide a valid service level authorization entry, causes a service level fault to restrict the ONT from granting user access to the user to services.
A method or corresponding apparatus in another embodiment of the present invention of restricts user access to services via an Optical Network Terminal (ONT) in a network by applying a changing encryption key to communications. In an example embodiment, the system submits an encryption key in a state known to be recognized as a fault by a node receiving the encryption key. In this example embodiment, the system or node informs a user of restricted access to the node based on recognition of an encryption key fault by the node.
The foregoing will be apparent from the following more particular description of example embodiments of the invention, as illustrated in the accompanying drawings in which like reference characters refer to the same parts throughout the different views. The drawings are not necessarily to scale, emphasis instead being placed upon illustrating embodiments of the present invention.
A description of example embodiments of the invention follows.
In an example embodiment, the PON 120 includes one or more Optical Line Terminal(s) (OLT) 110, typically located at a central office 179 maintained by a service provider, and one or more Optical Network Terminals (ONTs) 135a-n located at or near a premises of a user or customer. The ONTs 135a-n connect to one or more User Interface Devices (UID) 160, such as an IP phone 145a, IP television 145b, Personal Computer (PC) 145c, or Plain Old Telephone Service (POTS) 150. The UID 160 provides a user with an interface to one or more services via the corresponding ONT 135a-n, which sends requests from the UID 160 for services through an Optical Splitter/Combiner (OSC) 125 and ONT 135a-n to an OLTa-n 110.
In an example embodiment, a user of a UID 160, such as the IP phone 145a, attempts to authorize the IP phone 145a on the PON 120. In particular, the IP phone 145a sends a user authorization entry 105a to the ONT 135a. The ONT 135a, in turn, transmits the user authorization entry 105a upstream to the OLT 110. It is useful to note that communications between the OLT 110 and the ONT 135a use a downstream wavelength, such as 1490 nanometers (nm), and an upstream wavelength, such as 1310 nm. The user authorization entry 105a in the upstream communications, for example, can be transmitted from the ONT 135a to the OLT 110 at 1.244 Gbps. Other communications data rates known in the art may also be employed.
To ensure upstream communications between or among the ONTs 135a-n do not “collide,” a process known as ranging is performed prior to an ONT's communicating data, such as the user authorization entries 105a-n, in the upstream direction. Results of ranging the ONTs 135a-n by the OLT 110 include a determination of upstream timing offsets, which are provided to the ONTs 135a-n for use in determining how long to wait after receipt of a downstream grant 104a-n before transmitting an upstream communication (e.g., packet or series of packets, which may include the user authorization entries 105a-n). For example, following receipt of a grant 104a-n, the ONT 135a-n waits the prescribed upstream timing offset before transmitting respective user authorizations 105a-n or other upstream communications 106a-n upstream to the OLT 110.
Once a user is authorized and the ONT 135a ranges, an ONT identifier for the ONT 135a becomes active on the PON 120. Ranging may occur following a power outage, reset, software upgrade, and so forth. In some embodiments, a ranged state may be affected or effected during a user authorization procedure during which a UID 145a-n attempts to become an authorized device on the network to receive services via an ONT 135a-n. That is, the ONT 135a ranges to establish upstream communications capability on behalf of an authorized user of the UID 160 in some embodiments, and the ONT's ranged state may be affected depending on whether the UID 160 is found to be authorized to be on the network. In another embodiment, the ONT 135a may not allow itself to range unless it detects a UID 160 authorized to access services on the network, thus effecting the ONTs state of being ranged.
To establish user authorization, the ONT 135a can receive a password or passcode from the user of the UID 160 or from the UID itself through a handheld wireless or wireline device. A user, for example, may begin use of the IP phone 145a by lifting a receiver of the IP phone 145a (i.e., going “off-hook”). After lifting the receiver, the IP phone 145a may prompt the user to enter a password, and the IP phone 145a forwards the password, optionally along with a static serial number associated with the IP phone 145a, to the ONT 135a. It is useful to note that the password may be assigned or selected by the user or be a Physical Layer Operations, Administration, and Maintenance (PLOAM) password. If, in one embodiment, the serial number and password do not correspond to each other, as previously stored in a table (not shown) in the ONT, the user of the IP phone 145a is denied access to the PON 120 possibly by the ONT's changing its state of ranged to unranged, which disables its ability to communicate upstream to the OLT 110. Alternatively, the ONT 135a may transmit the password and, optionally, the serial number of the IP phone 145a to the OLT 110, in which case the OLT 110 may compare the password and serial number to information in its table (not shown) to determine whether the UID 160 is authorized to have access to the network. If the comparison fails, or succeeds in identifying a device not allowed to have access to the OLT or ONT, the OLT 110 may cause the ONT 135a to enter an unranged state, such as through not providing the ONT 135a with an equalization delay or other ranging parameter or reporting a failure status flag 235 (as shown in
A user authorization password may be obtained in a variety of ways. In one embodiment, the ONT 135a uses Public Key Cryptography Standards (PKCS). For example, when a phone is off-hook, the ONT 135a may employ hardware security modules based solely on the phone's static serial number to authorize the phone and send the user authorization entry 105a upstream. In an alternative embodiment, the user takes the phone off-hook and a enters a personal security code (e.g., a password). The ONT 110 can then determine if the user entered the correct passcode and complete the ranging process.
Other examples of obtaining passwords include receiving passwords from a built-on keypad on the ONT 135a or UID 160 or from a security module providing a security token (e.g., a random number) which can be combined with a password for increased security (i.e., two passwords). The security token can be provided by a hardware device installed in the ONT 135a and used for initial authorization (e.g., before entering a user password). In one example embodiment, cryptographic options, such as a finger print scan, biometric, signature pads or unique user authorization, may be used as authorization input(s). These inputs may be provided by way of a machine-to-machine input or other suitable interface. It should be understood that other input techniques may be used, such as converting a Dual Tone Mult-Frequency (DTMF) signal to an ASCII code for processing or the like. It should also be understood that the user authorization process may apply to any number of UIDs 160, and authorization of the IP phone 145a is for illustrative purposes only.
Referring again to an example embodiment of the user authorization, once the user becomes authorized, the ONT 135a sends a signal to the OLT 110 at the head-end of the PON 120 to enable connectivity on the PON 120. Next, the ONT 135a ranges with the OLT 110, allowing the user to communicate using the IP phone 145a via the ONT 135a. It should be understood that the state of ranging can be used to provide connection level security, where a ranged state (as opposed to an unranged state) may result in the user having unrestricted access to the PON 120 via the ONT 135a. On the other hand, if the ONT 135a authorization fails, ranging between the ONT 135a and OLT 110 may terminate.
In one example embodiment, if a user fails to provide a valid ONT 135a level user authorization, the ONT 135a may cause a ranging fault to disable the ONT 135a from communicating upstream with the OLT 110. As a result, the ONT 135a restricts user access to services via the ONT 135a. The ONT 135a may also cause one of the following: disabling optical transmissions from the ONT 135a to the OLT 110, disabling the ONT 135a from responding to ranging requests, failing to provide the OLT 110 with a serial number of the ONT 135a during the ranging response, or providing an incorrect ONT 135a serial number to the OLT 110 in a ranging response. Moreover, the ONT 135a can cause a service level fault to restrict the ONT 135a from granting user access to services in an event the ONT 135a is in a ranged state and the user-entered password fails to provide a valid service level authorization entry 185a-n. One problem with using user-entered passwords is security risks relating to obtaining the passwords. One such way to increase security is to enable security for each service by using one or multiple respective encryption key(s), such as a churn key(s).
In one example embodiment, the ONT 135a generates a service level fault by causing a churn key fault between the ONT 135a and OLT 110. A churn key fault may be caused by at least one of the following: disabling churning a churn key, enabling the churning and not transmitting a churn key from the ONT 135a to the OLT 110, transmitting an erroneous churn key from the ONT 135a to the OLT 110, or generating churn keys out of phase from a correct phase of generating the churn keys. It should be understood that churn keys are presented above for illustrative purposes and any encryption or security key techniques known in the art can be employed.
As used herein, the term “ONT level” is used in connection with a ranged state of the ONT, where the ONT can be caused or self-cause itself to disable access to services by entering an unranged state. It should be noted that an ONT that is in an unranged state cannot communicate upstream on a shared fiber path but may continue to receive downstream services, which means, for example, that the ONT restricts the user's ability to join (e.g., change) and Internet Protocol television (IPTV) channel or access websites. Also, the term “service level” is used in connection with a UID's access to the ONT or encryption of downstream communications from the OLT to the ONT to enable/disable the UID's access to one or more services, which means, for example, all access to IPTV or websites may be restricted.
If the UID 220 provides an invalid password 225, the ONT 215 may cause a ranging fault with the OLT 205 or a service level fault in the ONT 215, or both, to restrict user access to services.
The ONT 215 can cause a ranging fault by performing at least one of the following actions: disabling optical transmissions from the ONT 215 to the OLT 205, disabling the ONT 215 from responding to ranging requests from the OLT 205, failing to provide an ONT 215 serial number 230 in a ranging response, or providing an incorrect ONT 215 serial number in the ranging response. Since an authorized user has access to services on the PON 250 and the ONT 215, the ONT 215 can prevent an unauthorized UID 220 from accessing the PON 250, which increases security.
In one embodiment, the ONT 215 may also restrict an authorized UID 220 by causing a service level fault. A churn key is an encryption key that changes over time, such as once per minute, and may be randomly generated by the ONT 215 and used by the OLT 205 to encrypt downstream communications to the ONT 215 to increase security for downstream communications to the ONT 215. In some embodiments, the ONT 215 may intentionally fail to update the churn key sent to the OLT 205 to force an invalid key, thereby causing a mismatch between the encryption key used by the OLT 205 to encrypt downstream communications and the decryption key used by the ONT 215 to decrypt the downstream communications. Thus, in a state of service level fault of the ONT 215, the UID 220 will not be able to receive communications via the ONT 215 because the ONT cannot decrypt the downstream communications to learn of which device is the destination, for example, or which port the ONT is to direct the communicating as another example. In other embodiments, the ONT 215 may generate a faulty encryption key to forward to the OLT 205. The ONT 215 also may submit the encryption key at a rate other than the OLT 205 expects. In one embodiment, the ONT disables service for multiple inputs of invalid service level authorization inputs and reports an indicator of the disabled service. In this embodiment, the ONT 215 may obtain a valid service level authorization entry by reading a human-to-machine input or machine-to-machine input and comparing the input to known, valid, ONT level, user authorizations. In this way, the ONT 215 restricts services and/or access to the PON 250.
In operation, the ONT 215 may grant or restrict user access to services by not causing or causing a churn key fault, respectively. Further, the ONT 215, during a service level fault, may also restrict access by providing less than a full set of services or providing a lower rate of services, allowing for some use. In this way, the ONT 215 restricts unauthorized devices, such as UID 220, from accessing the PON 250.
Other techniques for restricting access of the UID 220 to the PON 250 can also be employed. For example, in an event of an incorrect authorization attempt by the UID 220, the ONT 215 may submit an encryption key in a faulty state to the OLT 205 and inform the UID 220 of the restricted access. In one embodiment, the ONT 215 may submit the encryption key in a non-value or malformed state, resulting in the OLT 205 restricting access. Thus, embodiments of the present invention may restrict the UID 220 from accessing the PON 250 in a number of ways.
It should be understood that embodiments of the present invention may be useful for many security applications, such as government agencies or other organizations that employ a high level of security protection. Moreover, an operator of the PON 250 can apply the security in different levels, such as on a service level or ONT access level.
In one embodiment, operation of the ONT 315 with the modules 335, 340 may work in the following manner. If the user authorization validation module 335 determines the UID 320 is authorized, the ONT 315 responds to a ranging request 310 with a valid ranging response. The ONT 315 sends a ranging response 336, in some embodiments, with the encryption key 325 and UID serial number 330. Once ranging successfully completes, the UID 320 is granted access to the PON and respective services via the ONT 315. In this embodiment, after ranging is complete, access is granted either for a particular service or all services at the ONT 315 level. It should be understood that, if the user authorization validation module 335 determines the UID 320 is unauthorized, the ONT 315 sends a ranging fault causal signal or lack of a ranging response signal 337 to cause a ranging fault, thereby disabling the ONT 315 from transmitting upstream communications, which restricts user access to certain services.
Continuing to describe the operation of the ONT 315, at the service level, the ONT 315 ranges, but certain services may be restricted. Service can be granted in some embodiments on a service-by-service basis, such as if the user of the UID 320 passes authorization criteria for each service. At the ONT 315 level, the ONT 315 ranges and synchronizes with the OLT 305 after the user is authorized. Without authorization, services, such as data, voice, or video, may be denied. It should be understood that the user authorization validation module 335 and service level authorization validation module 340 may be located within the ONT 315, outside the ONT 315, or some combination thereof. Further, the modules 335, 340 may communicate with each other or be integrated in a single processor, for example, and have access to each other's parameters, outputs, or other data or operational information.
The input module 360 may include a human-to-machine interface such as a keyboard or touch screen (not shown) or a machine-to-machine interface configured to obtain a valid, ONT level user authorization entry from a UID 320. The obtained, ONT level user authorization entry may be provided to the comparison module 365 where it may be compared to known, valid, ONT level user authorization codes. The known, valid, ONT level user authorization codes may be stored in a database 375 located in the ONT 315, the OLT 305, or other external location.
The restriction module 370 may restrict access to the ONT in the event a ranging fault 337 or service level fault 342 occurs. For example, upstream communications may be restricted, or less than a full set of services may be provided, if the fault is a ranging fault. If the fault is a service level fault, a subset of services may be provided. Note that although the modules 350, 355, 360, 365, and 370 are shown as separate modules they may be combined into one or more modules. For example, the comparison module 365 may be combined with the service level authorization validation module 340. Furthermore, the modules 350, 355, 360, 365, and 370 may be located, individually or in combination, on the ONT 315, OLT 305, or UID 320.
It should be understood that the encryption key may be or include any security key, as mentioned above or otherwise known. It should be further understood that the feature of the faulty encryption key can be generated by an encryption key generator module 730. Moreover, a variety of encryption keys, such as a churn key and user inputs of keys, are applicable. Additionally the submission module 710 and restriction module 720 are illustrated with respect to the service level authorization procedure. These or other modules may be applied to ONT level authorization procedure, too.
While this invention has been particularly shown and described with references to example embodiments thereof, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the scope of the invention encompassed by the appended claims.
For example, any of the flow diagrams described herein may be modified or arranged in any manner to support operation in various network configurations. The flow diagrams may include more or fewer blocks, combined or separated blocks, or employ alternative flow arrangements or the like. The flow diagrams may also be implemented in the form of hardware, firmware, or software. If implemented in software, the software may be written in any suitable code in accordance with the example embodiments herein, equivalents thereof, or other suitable embodiments. The software may be stored in any form of computer readable medium and be capable of being loaded and executed by a general purpose or application specific processor suitable to perform the example embodiments described herein, equivalents thereof, or other suitable embodiments.
Although examples are shown in the form of software solutions, increased security may also be achieved using a hardware security “add-on” module to an ONT or may also be incorporated into the ONT itself as shown in