-
公开(公告)号:US20090148159A1
公开(公告)日:2009-06-11
申请号:US12350333
申请日:2009-01-08
IPC分类号: H04B10/12
CPC分类号: H04B10/85 , H04B10/071
摘要: A method and apparatus for securing an optical communication link includes the step of identifying a profile of the link by measuring, at the transmitter, optical back-reflections from optical pulses forwarded to a receiver. The profile is stored at the transmitter. Periodically during operation, such as during key exchange, more optical pulses are forwarded to the receiver, and the back reflections are collected as periodic profiles. The periodic profiles are compared against the stored profiles. Eavesdroppers, such as those who cut the fiber, tap the fiber, or implement a man in the middle attack, may be easily identified because the losses caused by their interference with the fiber will be evident in the periodic profiles.
摘要翻译: 一种用于确保光通信链路的方法和装置包括通过在发射机处测量从被转发到接收机的光脉冲进行的光背反射来识别链路的简档的步骤。 配置文件存储在发射机上。 在操作期间,例如在密钥交换期间,更多的光脉冲被转发到接收机,并且后反射被收集为周期轮廓。 将周期轮廓与存储的轮廓进行比较。 窃听者,例如那些切割纤维,轻拍光纤,或实施中间人的人,可能很容易被识别,因为它们与纤维的干扰造成的损失在周期性轮廓中将是明显的。
-
公开(公告)号:US08000601B2
公开(公告)日:2011-08-16
申请号:US12350333
申请日:2009-01-08
IPC分类号: H04B10/12
CPC分类号: H04B10/85 , H04B10/071
摘要: A method and apparatus for securing an optical communication link includes the step of identifying a profile of the link by measuring, at the transmitter, optical back-reflections from optical pulses forwarded to a receiver. The profile is stored at the transmitter. Periodically during operation, such as during key exchange, more optical pulses are forwarded to the receiver, and the back reflections are collected as periodic profiles. The periodic profiles are compared against the stored profiles. Eavesdroppers, such as those who cut the fiber, tap the fiber, or implement a man in the middle attack, may be easily identified because the losses caused by their interference with the fiber will be evident in the periodic profiles.
摘要翻译: 一种用于确保光通信链路的方法和装置包括通过在发射机处测量从被转发到接收机的光脉冲进行的光背反射来识别链路的简档的步骤。 配置文件存储在发射机上。 在操作期间,例如在密钥交换期间,更多的光脉冲被转发到接收机,并且后反射被收集为周期轮廓。 将周期轮廓与存储的轮廓进行比较。 窃听者,例如那些切割纤维,轻拍光纤,或实施中间人的人,可能很容易被识别,因为它们与纤维的干扰造成的损失在周期性轮廓中将是明显的。
-