Electrical computers and digital processing systems: support – Data processing protection using cryptography
Reexamination Certificate
2006-10-26
2010-12-14
Smithers, Matthew B (Department: 2437)
Electrical computers and digital processing systems: support
Data processing protection using cryptography
C713S168000, C713S170000, C713S180000, C380S256000, C370S235000, C370S389000
Reexamination Certificate
active
07853801
ABSTRACT:
A system and a method for providing a secured transmission through an authenticated encryption for each ONU in downlink transmission of an OLT in GPON are provided. The GPON system includes an OLT for generating a GTC downlink frame by receiving data from an external service provider and ONUs for receiving the GTC downlink frame from the OLT and processing the received GTC downlink frame. The OLT performs the authenticated encryption for the generated GTC downlink frame according to the ONU by including an authentication generator and the ONU determines whether the GTC downlink frame is allowed to be processed or not by checking the authentication of the received GTC downlink frame through an authentication checker.
REFERENCES:
patent: 7450515 (2008-11-01), Song et al.
patent: 2004/0073788 (2004-04-01), Kim et al.
patent: 2004/0202470 (2004-10-01), Lim et al.
patent: 2005/0232277 (2005-10-01), See
patent: 2006/0129814 (2006-06-01), Eun et al.
patent: 0833241 (1998-04-01), None
patent: 2003-198532 (2003-07-01), None
patent: 1020020039559 (2002-05-01), None
patent: 1020040089423 (2004-10-01), None
patent: WO 2010038938 (2010-04-01), None
Hassan Naser, Hussein T. Mouftah, “A joint-ONU interval-based dynamic scheduling algorithm for ethernet passive optical networks”, Aug. 2006, IEEE/ACM Transactions on Networking (TON) , vol. 14 Issue 4, pp. 889-899.
“Hash Functions and Data Integrity” by A. Menezes et al.;Handbook of Applied Cryptography, Chapter 9; CRC Press, 1996; pp. 321-383.
Murakami, et al., “Comparison of G-POD TC Protocols and Proposal for Multi-service”, Technical Report of the IEICE, vol. 102, No. 19, Apr. 2002, pp. 57-60.
McGrew, et al., “The Galois/Counter Mode of Operation (GCM)”, May 31, 2005.
ITU International Telecommunication Union, ITU-T G.984.3 (Feb. 2004)-Prepublished Version, Telecommunication Standardization Sector of ITU Series G: Transmission Systems and Media, Digital Systems and Networks, “Gigabit-Capable Passive Optical Networks (G-PON): Transmission Convergence Layer Specification G.984.3” pp. 1-108.
Kim Bong Tae
Kim Kwang ok
Kwon Yool
Electronics & Telecommunications Research Institute
Fields Courtney D
LRK Patent Law Firm
Smithers Matthew B
LandOfFree
System and method for providing authenticated encryption in... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with System and method for providing authenticated encryption in..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for providing authenticated encryption in... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4188069