CN113905355A - Safety protection system for meter, data transmission method, meter and server - Google Patents

Safety protection system for meter, data transmission method, meter and server Download PDF

Info

Publication number
CN113905355A
CN113905355A CN202010642525.0A CN202010642525A CN113905355A CN 113905355 A CN113905355 A CN 113905355A CN 202010642525 A CN202010642525 A CN 202010642525A CN 113905355 A CN113905355 A CN 113905355A
Authority
CN
China
Prior art keywords
data
encrypted
encryption
identity authentication
meter
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010642525.0A
Other languages
Chinese (zh)
Inventor
李海龙
许长亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Yawayinosi New Energy Technology Co ltd
Original Assignee
Beijing Yawayinosi New Energy Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Yawayinosi New Energy Technology Co ltd filed Critical Beijing Yawayinosi New Energy Technology Co ltd
Priority to CN202010642525.0A priority Critical patent/CN113905355A/en
Publication of CN113905355A publication Critical patent/CN113905355A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/70Services for machine-to-machine communication [M2M] or machine type communication [MTC]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W28/00Network traffic management; Network resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • H04W28/10Flow control between communication endpoints
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/02Power saving arrangements
    • H04W52/0209Power saving arrangements in terminal devices
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Selective Calling Equipment (AREA)

Abstract

The invention discloses a meter safety protection system, a data transmission method, a meter and a server, wherein the meter safety protection system comprises: a meter and a security service processor. The meter is provided with a security chip which is used for carrying out first encryption on reported data of the meter and sending the reported data after the first encryption to the master station, carrying out second decryption and second identity authentication on issued data of the master station, and if the second identity authentication is passed, acquiring the decrypted issued data, wherein the issued data is data which is sent by the master station to the security service processor and subjected to second encryption; the security service processor is further configured to obtain first encrypted reported data sent by the master station, perform first decryption and first identity authentication on the first encrypted reported data, and send the decrypted reported data to the master station if the first identity authentication passes. By implementing the invention, the bandwidth occupation is reduced, the data transmission efficiency is improved, and the energy consumption of the meter is further reduced.

Description

Safety protection system for meter, data transmission method, meter and server
Technical Field
The invention relates to the technical field of meter data transmission, in particular to a meter safety protection system, a data transmission method, a meter and a server.
Background
Narrow-Band Internet of Things (NB-IoT) is an important branch of Internet, and has attracted more and more attention in the field of meter technology based on its characteristics of wide coverage, many connections, fast speed, low cost, low power consumption, and excellent architecture. However, in order to realize safe reporting of data, the existing meter based on the narrowband internet of things communication technology needs to complete two processes of identity authentication and data transmission of the meter. The identity authentication process needs uplink data packet transmission and downlink data packet transmission, the data transmission needs 1 data packet transmission, namely, the data transmission needs 3 data packet transmission processes on the network every time the data transmission is completed, and the narrowband network bandwidth is only 180KHz, so that the number of meters which can be processed by the base station at the same time is small, the meters can only wait for the sufficient network bandwidth and can start data uploading, the waiting time of actual data transmission of the meters is prolonged, and the average power consumption of the meters is increased.
Disclosure of Invention
Therefore, the technical problem to be solved by the invention is to overcome the defect that in the prior art, a meter based on a narrowband internet of things has higher power consumption due to the fact that data transmission waiting time exists in the data transmission process, so that a meter safety protection system, a data transmission method, a meter and a server are provided.
According to a first aspect, an embodiment of the present invention provides a safety protection system for a watch, including: a meter and a security service processor; the meter is internally provided with a security chip which is used for carrying out first encryption on reported data of the meter and sending the reported data after the first encryption to the master station, carrying out second decryption and second identity authentication on issued data of the master station, and if the second identity authentication is passed, acquiring the decrypted issued data, wherein the issued data is data which is sent by the master station to the security service processor and subjected to second encryption; the security service processor is further configured to obtain the first encrypted reported data sent by the master station, perform first decryption and first identity authentication on the first encrypted reported data, and send the decrypted reported data to the master station if the first identity authentication passes.
With reference to the first aspect, in a first implementation manner of the first aspect, the secure chip receives a first encryption request of the meter, performs a first encryption process on the reported data to obtain first encrypted data corresponding to the reported data, and transmits the first encrypted data to the master station; the master station receives the first encrypted data and initiates a first signature verification decryption request to the security service processor; and the safety service processor executes a first identity authentication instruction and a first decryption instruction corresponding to the first signature verification decryption request to obtain first safety data corresponding to the first encrypted data, and sends the first safety data to the main station.
With reference to the first aspect, in a second implementation manner of the first aspect, the primary station sends a second encryption request, and sends the issued data to the security service processor; the safety service processor receives the second encryption request, performs second encryption processing on the issued data to obtain second encrypted data corresponding to the issued data, returns the second encrypted data to the master station, and sends the second encrypted data to the meter by the master station; and the meter receives the second encrypted data, and the security chip executes a second identity authentication instruction and a second decryption instruction corresponding to a second signature verification decryption request sent by the meter to obtain second security data corresponding to the second encrypted data.
With reference to the first aspect, in a third implementation manner of the first aspect, the watch further includes: the narrow-band Internet of things module is used for communicating with the Internet of things platform; the safety chip receives a first encryption request of the meter and performs first encryption processing on the reported data to obtain first encrypted data corresponding to the reported data; the meter sends the first encrypted data to an Internet of things platform through the narrow-band Internet of things module, and the Internet of things platform transmits the first encrypted data to the master station through a target protocol; the master station receives the first encrypted data and initiates a first signature verification decryption request to the security service processor; and the safety service processor executes a first identity authentication instruction and a first decryption instruction corresponding to the first signature verification decryption request to obtain first safety data corresponding to the first encrypted data, and sends the first safety data to the main station.
With reference to the third implementation manner of the first aspect, in a fourth implementation manner of the first aspect, the primary station sends a second encryption request, and sends the issued data to the security service processor; the security service processor receives the second encryption request, performs second encryption processing on the issued data to obtain second encrypted data corresponding to the issued data, and returns the second encrypted data to the master station; the master station sends the second encrypted data to the Internet of things platform, and the Internet of things platform transmits the second encrypted data to the meter through the target protocol; and the meter receives the second encrypted data, and the security chip executes a second identity authentication instruction and a second decryption instruction corresponding to a second signature verification decryption request sent by the meter to obtain second security data corresponding to the second encrypted data.
With reference to the first aspect, in a fifth embodiment of the first aspect, the method further includes: a first sending counter and a first receiving counter arranged on the meter; a second transmit counter and a second receive counter disposed at the security services processor; the first transmit counter corresponds to the second receive counter; the first receive counter corresponds to the second transmit counter.
With reference to the fifth implementation manner of the first aspect, in a sixth implementation manner of the first aspect, the secure chip includes: a first determining module, configured to determine a first encryption instruction according to the first transmission counter, where the first encryption instruction includes a first key and a second key, and the second key includes first identity authentication information; the first encryption module is used for encrypting the reported data according to the first key to obtain first encrypted subdata; the second encryption module is used for calculating to obtain second encrypted subdata according to the first encrypted subdata and the second key; and the first combination module is used for combining the first encrypted subdata and the second encrypted subdata to obtain first encrypted data.
With reference to the fifth implementation manner of the first aspect, in a seventh implementation manner of the first aspect, the security service processor includes: a second determining module, configured to determine a second encryption instruction according to the second sending counter, where the second encryption instruction includes a third key and a fourth key, and the fourth key includes second identity authentication information; the third encryption module is used for encrypting the issued data according to the third key to obtain third encrypted subdata; the fourth encryption module is used for calculating fourth encrypted subdata according to the third encrypted subdata and the fourth key; and the second combining module is used for combining the third encrypted subdata and the fourth encrypted subdata to obtain second encrypted data.
With reference to the sixth implementation manner of the first aspect, in an eighth implementation manner of the first aspect, the security service processor further includes: a first judging module, configured to judge whether a first sending count of the first sending counter is greater than a second receiving count of the second receiving counter; a first updating module, configured to update the second receiving count to the first sending count if the first sending count is greater than the second receiving count; the first decryption module is used for acquiring a first decryption instruction corresponding to the first encryption instruction according to the updated second receiving count and decrypting the encrypted reported data; the first authentication module is used for calculating first identity authentication data according to the first decryption instruction and judging whether the first identity authentication data is consistent with first identity authentication information of the meter; and the first judgment module is used for judging that the first identity authentication is passed if the first identity authentication data is consistent with the first identity authentication information of the table.
With reference to the seventh implementation manner of the first aspect, in a ninth implementation manner of the first aspect, the secure chip further includes: a second judging module, configured to judge whether a second sending count of the second sending counter is greater than a first receiving count of the first receiving counter; a second updating module, configured to update the first receiving count to the second sending count if the second sending count is greater than the first receiving count; the second decryption module is used for acquiring a second decryption instruction corresponding to the second encryption instruction according to the updated first receiving count and decrypting the encrypted issued data; the second authentication module is used for calculating the second identity authentication data according to the second decryption instruction and judging whether the second identity authentication data is consistent with the second identity authentication information of the master station or not; and the second judgment module is used for judging that the second identity authentication is passed if the second identity authentication data is consistent with the second identity authentication information.
According to a second aspect, an embodiment of the present invention provides a data transmission method, including the following steps: acquiring a first target data encryption request; encrypting the first target data to obtain first encrypted data corresponding to the first target data; receiving second encrypted data; and decrypting and authenticating the second encrypted data to obtain second target data corresponding to the second encrypted data.
According to a third aspect, an embodiment of the present invention provides a data transmission method, including the following steps: acquiring a second target data encryption request; encrypting the second target data to obtain second encrypted data corresponding to the second target data; receiving first encrypted data; and decrypting and authenticating the first encrypted data to obtain first target data corresponding to the first encrypted data.
According to a fourth aspect, an embodiment of the present invention provides a watch, including: a memory and a processor, wherein the memory and the processor are communicatively connected to each other, the memory stores computer instructions, and the processor executes the computer instructions to execute the data transmission method according to the second aspect.
According to a fifth aspect, an embodiment of the present invention provides a server, including: a memory and a processor, wherein the memory and the processor are communicatively connected to each other, the memory stores computer instructions, and the processor executes the computer instructions to perform the data transmission method according to the third aspect.
The technical scheme of the invention has the following advantages:
1. the safety protection system for the meter provided by the invention has the advantages that the reported data of the meter is subjected to first encryption through the safety chip arranged in the meter, the first encrypted reported data is sent to the master station, the safety service processor is used for carrying out first decryption and first identity authentication on the first encrypted reported data acquired by the master station, and if the first identity authentication is passed, the decrypted reported data is sent to the master station; and performing second encryption on the issued data of the master station through the security service processor, sending the issued data subjected to the second encryption to the meter, performing second decryption and second identity authentication on the issued data subjected to the second encryption through a security chip arranged in the meter, and acquiring the decrypted issued data if the second identity authentication is passed. This table utensil safety protection system uses once the data package can accomplish table utensil authentication and data transmission's encryption and decryption process when carrying out the data newspaper, uses once the data package can accomplish table utensil authentication and data transmission's encryption and decryption process when carrying out the data issue, compare in table utensil data transmission among the prior art, the data package transmission number of times has been reduced, and then the bandwidth that has reduced data transmission occupies, the wait duration of transmission data has been reduced, the data transmission efficiency of table utensil has been improved, the energy consumption of table utensil has been reduced, simultaneously because the interaction between reported data and the issue data has been reduced, the life of table utensil battery has been improved.
2. The safety protection system for the meter, provided by the invention, is characterized in that a first sending counter and a first receiving counter are arranged in the meter, and a second sending counter and a second receiving counter are arranged in a safety service processor. The first sending counter in the meter corresponds to the second receiving counter in the safety service processor, and the first receiving counter in the meter corresponds to the second sending counter in the safety service processor. The double counters which are in one-to-one correspondence are respectively arranged in the meter and the safety service processor, so that the authenticity and the integrity of data transmission between the meter and the master station are ensured.
3. According to the data transmission method and the meter, the first target data are encrypted by acquiring the first target data encryption request, so that first encrypted data corresponding to the first target data are obtained, the second encrypted data can be received, and the second encrypted data are decrypted and authenticated to obtain second target data corresponding to the second encrypted data, so that the safety and the authenticity of data transmission are ensured, and the continuity of data transmission is ensured.
4. According to the data transmission method and the server, the second target data are encrypted by acquiring the second target data encryption request, so that second encrypted data corresponding to the second target data are obtained, the first encrypted data can be received, and the first encrypted data are decrypted and authenticated to obtain the first target data corresponding to the first encrypted data, so that the safety and the authenticity of data transmission are ensured, and the continuity of data transmission is ensured.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and other drawings can be obtained by those skilled in the art without creative efforts.
FIG. 1 is a schematic block diagram of a meter safety protection system in an embodiment of the invention;
FIG. 2 is another schematic block diagram of a meter safety protection system in an embodiment of the present invention;
FIG. 3 is another schematic block diagram of a meter safety protection system in an embodiment of the present invention;
FIG. 4 is a flow chart of a data transmission method according to an embodiment of the present invention;
FIG. 5 is a schematic structural diagram of a watch according to an embodiment of the present invention;
fig. 6 is a schematic structural diagram of a server in an embodiment of the present invention.
Detailed Description
The technical solutions of the present invention will be described clearly and completely with reference to the accompanying drawings, and it should be understood that the described embodiments are some, but not all embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In the description of the present invention, it should be noted that the terms "center", "upper", "lower", "left", "right", "vertical", "horizontal", "inner", "outer", etc., indicate orientations or positional relationships based on the orientations or positional relationships shown in the drawings, and are only for convenience of description and simplicity of description, but do not indicate or imply that the device or element being referred to must have a particular orientation, be constructed and operated in a particular orientation, and thus, should not be construed as limiting the present invention. Furthermore, the terms "first," "second," and "third" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance.
In the description of the present invention, it should be noted that, unless otherwise explicitly specified or limited, the terms "mounted," "connected," and "connected" are to be construed broadly, e.g., as meaning either a fixed connection, a removable connection, or an integral connection; can be mechanically or electrically connected; the two elements may be directly connected or indirectly connected through an intermediate medium, or may be communicated with each other inside the two elements, or may be wirelessly connected or wired connected. The specific meanings of the above terms in the present invention can be understood in specific cases to those skilled in the art.
In addition, the technical features involved in the different embodiments of the present invention described below may be combined with each other as long as they do not conflict with each other.
Example 1
This embodiment provides a table utensil safety protection system, is applied to table utensils such as water gauge, ammeter, gas table, can realize table utensil and main website data transmission's security and authenticity, and this application does not do the restriction to the table utensil. As shown in fig. 1, the watch security system includes: a meter 1 and a security services processor 2.
The meter 1 is provided with a security chip 11, which is used for performing first encryption on the reported data of the meter 1, sending the first encrypted reported data to the master station 3, performing second decryption and second identity authentication on the issued data of the master station 3, acquiring the decrypted issued data if the second identity authentication is passed, and sending the issued data to the security service processor 2 by the master station 3 for second encryption.
The security service processor 2 is further configured to obtain the first encrypted reported data sent by the master station 3, perform first decryption and first identity authentication on the first encrypted reported data, and send the decrypted reported data to the master station 3 if the first identity authentication passes.
The meter 1 may be a gas meter terminal used by a user, but in this embodiment, the gas meter terminal is taken as the meter for illustration only, and is not used to limit the present invention. Correspondingly, the reported data is data sent to the master station by the gas meter terminal; and the issued data is data sent to the gas meter terminal by the master station. The identity authentication is MAC address authentication, the first encryption is encryption operation executed by a security chip on reported data, the second encryption is encryption operation executed by a security service processor on issued data, the first decryption is decryption operation executed by the security service processor on the reported data, the second decryption is decryption operation executed by the security chip on the issued data, the first identity authentication is consistency judgment between an MAC address of the security service processor and an MAC address of a gas meter terminal, and the second identity authentication is consistency judgment between the MAC address of the security chip and an MAC address of a master station.
When the gas meter terminal sends the reported data to the master station, a safety chip arranged in the gas meter terminal conducts first encryption on the reported data, and then the reported data which are subjected to the first encryption are transmitted to the master station. And after the master station receives the first encrypted reported data, the security service processing processor performs first decryption on the first encrypted reported data, performs first identity authentication on the first encrypted reported data, and judges whether the MAC address of the gas meter terminal corresponding to the reported data is consistent with the MAC address of the security service processor. If the MAC address of the gas meter terminal is consistent with the MAC address of the safety service processor, the first identity authentication is judged to be passed, and the safety service processor returns the reported data which passes the first identity authentication and the first decryption to the master station.
When the master station transmits data to the gas meter terminal, the safety service processor conducts second encryption on the transmitted data of the master station, and then transmits the transmitted data which are subjected to the second encryption to the gas meter terminal. And after the gas meter terminal receives the issued data subjected to the second encryption, the security chip arranged in the gas meter terminal carries out second decryption on the issued data subjected to the second encryption, and simultaneously carries out second identity authentication on the issued data subjected to the second encryption, so as to judge whether the MAC address of the master station corresponding to the issued data is consistent with the MAC address of the security chip. And if the MAC address of the master station is consistent with the MAC address of the security chip, judging that the second identity authentication is passed, and acquiring the issued data which is passed through the second identity authentication and the second decryption.
In the safety protection system for the meter provided by this embodiment, the security chip arranged in the meter is used to perform first encryption on the reported data of the meter, and send the first encrypted reported data to the master station, the security service processor performs first decryption and first identity authentication on the first encrypted reported data acquired by the master station, and if the first identity authentication passes, sends the decrypted reported data to the master station; and performing second encryption on the issued data of the master station through the security service processor, sending the issued data subjected to the second encryption to the meter, performing second decryption and second identity authentication on the issued data subjected to the second encryption through a security chip arranged in the meter, and acquiring the decrypted issued data if the second identity authentication is passed. This table utensil safety protection system uses once the data package can accomplish table utensil authentication and data transmission's encryption and decryption process when carrying out the data newspaper, uses once the data package can accomplish table utensil authentication and data transmission's encryption and decryption process when carrying out the data issue, compare in table utensil data transmission among the prior art, the data package transmission number of times has been reduced, and then the bandwidth that has reduced data transmission occupies, the wait duration of transmission data has been reduced, the data transmission efficiency of table utensil has been improved, the energy consumption of table utensil has been reduced, simultaneously because the interaction between reported data and the issue data has been reduced, the life of table utensil battery has been improved.
As an optional implementation manner, when the gas meter terminal sends the report data to the master station, the gas meter terminal may send a first encryption request to a security chip arranged inside the gas meter terminal, and request to encrypt the report data. And when receiving a first encryption request sent by the gas meter terminal, the security chip executes a first encryption operation of the reported data to obtain first encrypted data corresponding to the reported data, and transmits the first encrypted data to the master station.
After receiving the first encrypted data, the master station needs to decrypt and authenticate the identity of the first encrypted data in order to ensure the security and authenticity of the acquired reported data. At this time, the master station may send a first signature verification decryption request to the security service processor, execute the first identity authentication instruction and the first decryption instruction after the security service processor receives the first signature verification decryption request sent by the master station, perform decryption and identity authentication on the first encrypted data, obtain first security data corresponding to the first encrypted data, which passes the first decryption and the first identity authentication, and return the obtained first security data to the master station.
As an optional implementation manner, when the master station sends the data to be sent to the gas meter terminal, the master station may send a second encryption request to the security service processor, requesting to encrypt the data to be sent. And when receiving a second encryption request sent by the master station, the security service processor executes second encryption operation on the transmitted data to obtain second encrypted data corresponding to the transmitted data, returns the second encrypted data to the master station, and transmits the second encrypted data to the gas meter terminal by the master station.
After receiving the second encrypted data, the gas meter terminal needs to decrypt and authenticate the identity of the second encrypted data in order to ensure the security and authenticity of the acquired transmitted data. At this moment, the gas meter terminal can perform decryption and identity authentication through a security chip arranged inside the gas meter terminal, sends a second signature verification decryption request to the security chip, and executes a second identity authentication instruction and a second decryption instruction after the security chip receives the second signature verification decryption request, so as to decrypt and authenticate the second encrypted data and obtain second security data corresponding to the second encrypted data and passing through the second decryption and the second identity authentication.
As an alternative embodiment, as shown in fig. 2, the watch security system further includes: a narrowband internet of things module 12, wherein the narrowband internet of things module 12 is configured to communicate with the internet of things platform 4.
Illustratively, the narrowband internet of things module 12 may be provided in the watch 1. Taking a gas meter as an example, when a gas meter terminal sends reported data to a master station, the gas meter terminal sends a first encryption request to a security chip arranged in the gas meter terminal, and requests to encrypt the reported data. The method comprises the steps that after a security chip receives a first encryption request sent by a gas meter terminal, a first encryption operation of reported data is executed, first encryption data corresponding to the reported data are obtained, the first encryption data are transmitted to an Internet of things platform through a narrow-band Internet of things module, the Internet of things platform can add the received first encryption data to a message queue, the link request pressure of massive Internet of things equipment is reduced, meanwhile, the Internet of things platform can complete transmission protocol conversion, and the first encryption data are transmitted to a master station through an HTTPS protocol. For details of the first security data obtained by decrypting and authenticating the identity of the first encrypted data after the primary station receives the first encrypted data, refer to the related description of the above embodiment, and are not described herein again.
As an alternative embodiment, as shown in fig. 2, the narrowband internet of things module 12 is used for communicating with the internet of things platform 4. When the master station sends the data to be sent to the gas meter terminal, the master station can send a second encryption request to the security service processor to request for encrypting the data to be sent. And when receiving a second encryption request sent by the master station, the security service processor executes second encryption operation on the issued data to obtain second encrypted data corresponding to the issued data, and returns the second encrypted data to the master station. The master station transmits the second encrypted data to the Internet of things platform, the Internet of things platform adds the acquired second encrypted data to the message queue, protocol conversion is carried out simultaneously, the second encrypted data are transmitted to the narrow-band Internet of things module arranged in the gas meter terminal through the protocol supported by the gas meter terminal, and the second encrypted data are acquired. After receiving the second encrypted data, the gas meter terminal decrypts and authenticates the identity of the second encrypted data to obtain the detailed content of the second security data, which is referred to the related description of the above embodiment and is not described herein again.
As an alternative embodiment, as shown in fig. 3, the watch safety protection system further includes: a first transmission counter 13 and a first reception counter 14 provided at the watch 1 and a second transmission counter 21 and a second reception counter 22 provided at the security service processor 2. The first transmission counter 13 corresponds to the second reception counter 22, and the first reception counter 14 corresponds to the second transmission counter 21.
Illustratively, the first sending counter is used for the gas meter terminal to send the reported data count, and the first receiving counter is used for the gas meter terminal to receive the issued data count. The second sending counter is used for the master station to send the down data count, and the second receiving counter is used for the master station to receive the reported data count. The first sending counter of the gas meter terminal corresponds to the second receiving counter of the master station; and the second sending counter of the master station corresponds to the first receiving counter of the gas meter terminal.
As an optional embodiment, the secure chip 11 includes: the first determining module is used for determining a first encryption instruction according to the first sending counter, wherein the first encryption instruction comprises a first secret key and a second secret key, and the second secret key comprises first identity authentication information.
Illustratively, the first transmission counter may employ a replay-resistant counting technique to determine a count CNTct of the first transmission counter, and perform a scatter operation on the first encrypted instruction K1 using CNTct to scatter out the first key Kc1 and the second key Ki1 corresponding to the first encrypted instruction. Wherein the second key Ki1 is used to determine the first authentication information.
And the first encryption module is used for encrypting the reported data according to the first key to obtain first encrypted subdata.
Exemplarily, assuming the report Data is Data1, the report Data1 is encrypted by using a first key Kc1, and first encrypted sub-Data is obtained and is represented by Kc1(Data 1).
And the second encryption module is used for calculating to obtain second encrypted subdata according to the first encrypted subdata and the second key.
Illustratively, second encrypted sub-Data, which is encrypted Data containing first authentication information, expressed in MAC (CNTct + Kc1(Data1)), is calculated using the second key Ki1 in accordance with the first transmission counter count CNTct and the first encrypted sub-Data Kc1(Data 1).
And the first combination module is used for combining the first encrypted subdata and the second encrypted subdata to obtain first encrypted data.
Illustratively, the first transmission counter count CNTct, the first encrypted sub-Data Kc1(Data1), and the second encrypted sub-Data MAC (CNTct + Kc1(Data1)) are obtained from the above determination, and are added to obtain the reported Data subjected to the first encryption process, that is, the first encrypted Data CNTct + Kc1(Data1) + MAC (CNTct + Kc1(Data 1)).
As an optional embodiment, the security service processor 2 includes:
and the second determining module is used for determining a second encryption instruction according to the second sending counter, wherein the second encryption instruction comprises a third key and a fourth key, and the fourth key comprises second identity authentication information.
For example, the second transmission counter may employ a replay-prevention counting technique to determine the count CNTst of the second transmission counter, and perform a scatter operation on the second encryption instruction K2 using CNTst to scatter out the third key Kc2 and the fourth key Ki2 corresponding to the second encryption instruction. Wherein the fourth key Ki2 is used to determine the second authentication information.
And the third encryption module is used for encrypting the issued data according to the third key to obtain third encrypted subdata.
Exemplarily, the issuing Data is Data2, and the issuing Data2 is encrypted by using the third key Kc2 to obtain second encrypted sub-Data, which is represented by Kc2(Data 2).
And the fourth encryption module is used for calculating fourth encrypted subdata according to the third encrypted subdata and the fourth key.
Illustratively, second encrypted sub-Data, which is encrypted Data containing first authentication information, expressed in MAC (CNTst + Kc2(Data2)), is calculated using the second key Ki2 based on the first transmission counter count CNTst and the first encrypted sub-Data Kc2(Data 2).
And the second combination module is used for combining the third encrypted subdata and the fourth encrypted subdata to obtain second encrypted data.
Illustratively, the first transmission counter count CNTst, the first encrypted sub-Data Kc2(Data2), and the second encrypted sub-Data MAC (CNTst + Kc2(Data2)) are obtained according to the above determination, and are added to obtain the report Data subjected to the first encryption process, that is, the first encrypted Data CNTst + Kc2(Data2) + MAC (CNTst + Kc2(Data 2)).
As an optional implementation, the security service processor 2 further includes:
the first judging module is used for judging whether the first sending count of the first sending counter is larger than the second receiving count of the second receiving counter.
Illustratively, the magnitude relation between a first sending count CNTct of a first sending counter of the gas meter terminal and a second receiving count CNTsr of a second receiving counter of the security service processor is compared, and whether the first sending count CNTct is larger than the second receiving count CNTsr is judged.
The first updating module is used for updating the second receiving count into the first sending count if the first sending count is larger than the second receiving count.
Illustratively, if the first transmission count CNTct of the first transmission counter of the gas meter terminal is greater than the second reception count CNTsr of the second reception counter of the security service processor, the second reception count CNTsr of the second reception counter of the security service processor is updated to the first transmission count CNTct. If the first transmission count CNTct of the first transmission counter of the gas meter terminal is smaller than the second reception count CNTsr of the second reception counter, a warning message "playback abnormality exists" is returned to the master station.
And the first decryption module is used for acquiring a first decryption instruction corresponding to the first encryption instruction according to the updated second receiving count and decrypting the encrypted reported data.
Illustratively, the updated second reception count CNTsr is used to obtain a first decryption command K11 corresponding to the first encryption command K1, and the first decryption command K11 is subjected to a scatter operation to scatter Kc11 corresponding to the first key and Ki11 corresponding to the second key from the first decryption command.
And the first authentication module is used for calculating first identity authentication data according to the first decryption instruction and judging whether the first identity authentication data is consistent with the first identity authentication information of the table.
Illustratively, the first authentication data is a MAC address of the security services processor. The first identity authentication information is the MAC address of the gas meter terminal. And calculating first identity authentication Data CNTsr + Kc11(Data1) by adopting Ki11 corresponding to the second secret key to obtain the MAC address of the security service processor, and comparing whether the MAC address of the security service processor is consistent with the MAC address in the Data reported by the gas meter terminal so as to verify the authenticity and the integrity of the reported Data.
And the first judgment module is used for judging that the first identity authentication is passed if the first identity authentication data is consistent with the first identity authentication information of the table.
For example, if the MAC address of the security service processor is not consistent with the MAC address in the data reported by the gas meter terminal, it is determined that the current reported data is abnormal, and a prompt message "data is abnormal" may be returned to the master station. If the MAC address of the security service processor is consistent with the MAC address in the reported Data of the gas meter terminal, the first identity authentication is judged to be passed, and at the moment, the security service processor can decrypt the encrypted Data Kc1(Data1) according to the Kc11 corresponding to the first secret key to obtain the reported Data1 of the gas meter terminal.
As an optional implementation, the secure chip 11 further includes:
and the second judging module is used for judging whether the second sending count of the second sending counter is greater than the first receiving count of the first receiving counter.
Illustratively, the magnitude relationship between the second transmission count CNTst of the second transmission counter of the security service processor and the first reception count CNTcr of the first reception counter of the gas meter terminal is compared to determine whether the first transmission count CNTct is greater than the second reception count CNTsr.
And the second updating module is used for updating the first receiving count into a second sending count if the second sending count is greater than the first receiving count.
Illustratively, if the second transmission count CNTst of the second transmission counter of the security service processor is greater than the first reception count CNTcr of the first reception counter of the gas meter terminal, the first reception count CNTcr of the first reception counter of the updated gas meter terminal is updated to the second transmission count CNTst. It should be noted that, if the second transmission count CNTst of the second transmission counter of the secure service processor is smaller than the first reception count CNTcr of the first reception counter, the alert message "playback abnormality is present" is issued.
And the second decryption module is used for acquiring a second decryption instruction corresponding to the second encryption instruction according to the updated first receiving count and decrypting the encrypted issued data.
Illustratively, the updated first reception count CNTcr is used to obtain a second decryption command K22 corresponding to the second encryption command K2, and the second decryption command K22 is subjected to a scatter operation to scatter Kc22 corresponding to the third key and Ki22 corresponding to the fourth key from the second decryption command.
And the second authentication module is used for calculating second identity authentication data according to the second decryption instruction and judging whether the second identity authentication data is consistent with second identity authentication information of the master station.
Illustratively, the second authentication data is a MAC address of the secure chip. The second identity authentication information is the MAC address of the master station. And calculating second identity authentication Data CNTcr + Kc22(Data2) by adopting Ki22 corresponding to the fourth secret key to obtain the MAC address of the security chip, and comparing whether the MAC address of the security chip is consistent with the MAC address in the Data issued by the master station or not to verify the authenticity and the integrity of the issued Data.
And the second judgment module is used for judging that the second identity authentication is passed if the second identity authentication data is consistent with the second identity authentication information.
Illustratively, if the MAC address of the security chip is inconsistent with the MAC address in the data sent by the master station, it is determined that the currently sent data is abnormal, and an alarm message "data is abnormal" may be sent. If the MAC address of the security chip is consistent with the MAC address in the Data issued by the master station, the security chip judges that the second identity authentication is passed, and at the moment, the security chip can decrypt the encrypted Data Kc2(Data2) according to the Kc22 corresponding to the third key to obtain the Data2 issued by the master station.
In the safety protection system for a meter provided in this embodiment, a first sending counter and a first receiving counter are set in the meter, and a second sending counter and a second receiving counter are set in the security service processor. The first sending counter in the meter corresponds to the second receiving counter in the safety service processor, and the first receiving counter in the meter corresponds to the second sending counter in the safety service processor. The double counters which are in one-to-one correspondence are respectively arranged in the meter and the safety service processor, so that the authenticity and the integrity of data transmission between the meter and the master station are ensured.
Example 2
This embodiment provides a data transmission method, which can be applied to the meter security chip in the foregoing embodiment, as shown in fig. 4, the data transmission method may include the following steps:
s21, a first target data encryption request is obtained. The first target data is reported data of the terminal equipment, and the first target data encryption request is a reported data encryption request. For a detailed description of obtaining the first target data encryption request, reference is made to the related description in the foregoing embodiment, and details are not repeated here.
S22, the first target data is encrypted to obtain first encrypted data corresponding to the first target data. For a detailed description of obtaining the first encrypted data by encrypting the first target data according to the first target data encryption request, refer to the related description in the foregoing embodiments, and details are not repeated here.
S23, the second encrypted data is received. The second encrypted data is data sent by other terminal equipment to the current terminal equipment. For a detailed description of receiving the second encrypted data, reference is made to the related description in the above embodiments, and details are not repeated here.
And S24, decrypting and authenticating the second encrypted data to obtain second target data corresponding to the second encrypted data. And performing identity authentication on the second encrypted data to ensure the security of the received second encrypted data, decrypting the second encrypted data subjected to the identity authentication, and acquiring second target data subjected to the identity authentication and decryption. For the detailed description of the decryption and the identity authentication of the second encrypted data, refer to the related description of the above embodiments, and are not described herein again.
According to the data transmission method provided by the embodiment, the first target data is encrypted by obtaining the first target data encryption request, so that first encrypted data corresponding to the first target data is obtained, the second encrypted data can be received, and the second encrypted data is decrypted and authenticated so that second target data corresponding to the second encrypted data is obtained, so that the safety and the authenticity of data transmission are ensured, and the continuity of data transmission is ensured.
Example 3
This embodiment provides a data transmission method, which can be applied to the security service processor in the foregoing embodiment, as shown in fig. 4, the data transmission method may include the following steps:
s31, a second target data encryption request is obtained. The second target data is the issued data of the terminal equipment, and the second target data encryption request is the issued data encryption request. For a detailed description of obtaining the second target data encryption request, reference is made to the related description in the foregoing embodiment, and details are not repeated here.
S32, the second target data is encrypted to obtain second encrypted data corresponding to the second target data. For a detailed description of obtaining the second encrypted data by encrypting the second target data according to the second target data encryption request, refer to the related description in the foregoing embodiment, and details are not repeated here.
S33, the first encrypted data is received. The first encrypted data is data sent by other terminal equipment to the current terminal equipment. For a detailed description of receiving the first encrypted data, reference is made to the related description in the above embodiments, and details are not repeated here.
S34, the first encrypted data is decrypted and identity authentication is carried out, and first target data corresponding to the first encrypted data is obtained. And performing identity authentication on the first encrypted data to ensure the security of the received first encrypted data, decrypting the first encrypted data after the identity authentication, and acquiring the first target data after the identity authentication and decryption. For the detailed description of the decryption and the identity authentication of the first encrypted data, refer to the related description of the above embodiments, and are not described herein again.
According to the data transmission method provided by the embodiment, the second target data is encrypted by obtaining the second target data encryption request, so that second encrypted data corresponding to the second target data is obtained, the first encrypted data can be received, and the first encrypted data is decrypted and authenticated to obtain the first target data corresponding to the first encrypted data, so that the safety and the authenticity of data transmission are ensured, and the continuity of data transmission is ensured.
Example 4
The watch provided by the embodiment of the present invention further includes, as shown in fig. 5, a processor 41 and a memory 42, where the processor 41 and the memory 42 may be connected by a bus or in another manner, and fig. 5 takes the bus connection as an example.
The processor 41 may be a Central Processing Unit (CPU). The Processor 41 may also be other general-purpose processors, Digital Signal Processors (DSPs), Graphics Processing Units (GPUs), embedded Neural Network Processors (NPUs), or other dedicated deep learning coprocessors, Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs), or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components, or any combination thereof.
The memory 42 is a non-transitory computer readable storage medium, and can be used to store non-transitory software programs, non-transitory computer executable programs, and modules, such as program instructions/modules corresponding to the data transmission method in the embodiment of the present invention, and the processor 41 executes various functional applications and data processing of the processor by executing the non-transitory software programs, instructions, and modules stored in the memory 42, so as to implement the data transmission method in the above-described method embodiment.
The memory 42 may include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function; the storage data area may store data created by the processor 41, and the like. Further, the memory 42 may include high speed random access memory, and may also include non-transitory memory, such as at least one magnetic disk storage device, flash memory device, or other non-transitory solid state storage device. In some embodiments, memory 42 may optionally include memory located remotely from processor 41, which may be connected to processor 41 via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
One or more modules of the meter are stored in the memory 42 and, when executed by the processor 41, perform the data transfer method of the embodiment shown in fig. 4.
The first target data are encrypted by acquiring the first target data encryption request, so that first encrypted data corresponding to the first target data are acquired, second encrypted data can be received, and the second encrypted data are decrypted and authenticated to acquire second target data corresponding to the second encrypted data.
The details of the above table may be understood by referring to the corresponding descriptions and effects in the embodiments shown in fig. 1 to fig. 4, which are not described herein again.
Example 5
An embodiment of the present invention further provides a server, as shown in fig. 6, the device includes a processor 51 and a memory 52, where the processor 51 and the memory 52 may be connected by a bus or in another manner, and fig. 6 takes the connection by the bus as an example.
The processor 51 may be a Central Processing Unit (CPU). The Processor 51 may also be other general-purpose processors, Digital Signal Processors (DSPs), Graphics Processing Units (GPUs), embedded Neural Network Processors (NPUs), or other dedicated deep learning coprocessors, Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs), or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components, or any combination thereof.
The memory 52 is a non-transitory computer readable storage medium, and can be used to store non-transitory software programs, non-transitory computer executable programs, and modules, such as program instructions/modules corresponding to the data transmission method in the embodiment of the present invention, and the processor 51 executes various functional applications and data processing of the processor by executing the non-transitory software programs, instructions, and modules stored in the memory 52, so as to implement the data transmission method in the above-described method embodiment.
The memory 52 may include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function; the storage data area may store data created by the processor 51, and the like. Further, the memory 52 may include high speed random access memory, and may also include non-transitory memory, such as at least one magnetic disk storage device, flash memory device, or other non-transitory solid state storage device. In some embodiments, the memory 52 may optionally include memory located remotely from the processor 51, and these remote memories may be connected to the processor 51 via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
One or more modules of the server are stored in the memory 52 and, when executed by the processor 51, perform the data transfer method in the embodiment shown in fig. 4.
The second target data are encrypted by acquiring the second target data encryption request, so that second encrypted data corresponding to the second target data are obtained, the first encrypted data can be received, and the first encrypted data are decrypted and authenticated to obtain first target data corresponding to the first encrypted data, so that the safety and authenticity of data transmission are ensured, and the continuity of data transmission is ensured.
The details of the server may be understood by referring to the corresponding descriptions and effects in the embodiments shown in fig. 1 to fig. 4, and are not described herein again.
It should be understood that the above examples are only for clarity of illustration and are not intended to limit the embodiments. Other variations and modifications will be apparent to persons skilled in the art in light of the above description. And are neither required nor exhaustive of all embodiments. And obvious variations or modifications therefrom are within the scope of the invention.

Claims (14)

1. A watch safety protection system, comprising: a meter and a security service processor,
the meter is provided with a security chip which is used for carrying out first encryption on the reported data of the meter and sending the reported data after the first encryption to a master station,
second decryption and second identity authentication are carried out on the issued data of the master station, if the second identity authentication is passed, the decrypted issued data are obtained, and the issued data are the data which are sent by the master station to the security service processor and are subjected to second encryption;
the security service processor is further configured to obtain the first encrypted reported data sent by the master station, perform first decryption and first identity authentication on the first encrypted reported data, and send the decrypted reported data to the master station if the first identity authentication passes.
2. Watch safety protection system according to claim 1,
the safety chip receives a first encryption request of the meter, performs first encryption processing on the reported data to obtain first encrypted data corresponding to the reported data, and transmits the first encrypted data to the master station;
the master station receives the first encrypted data and initiates a first signature verification decryption request to the security service processor;
and the safety service processor executes a first identity authentication instruction and a first decryption instruction corresponding to the first signature verification decryption request to obtain first safety data corresponding to the first encrypted data, and sends the first safety data to the main station.
3. Watch safety protection system according to claim 1,
the master station sends a second encryption request and sends the issued data to the security service processor;
the safety service processor receives the second encryption request, performs second encryption processing on the issued data to obtain second encrypted data corresponding to the issued data, returns the second encrypted data to the master station, and sends the second encrypted data to the meter by the master station;
and the meter receives the second encrypted data, and the security chip executes a second identity authentication instruction and a second decryption instruction corresponding to a second signature verification decryption request sent by the meter to obtain second security data corresponding to the second encrypted data.
4. A watch safety protection system according to claim 1, characterized in that said watch further comprises: the narrow-band Internet of things module is used for communicating with the Internet of things platform;
the safety chip receives a first encryption request of the meter and performs first encryption processing on the reported data to obtain first encrypted data corresponding to the reported data;
the meter sends the first encrypted data to an Internet of things platform through the narrow-band Internet of things module, and the Internet of things platform transmits the first encrypted data to the master station through a target protocol;
the master station receives the first encrypted data and initiates a first signature verification decryption request to the security service processor;
and the safety service processor executes a first identity authentication instruction and a first decryption instruction corresponding to the first signature verification decryption request to obtain first safety data corresponding to the first encrypted data, and sends the first safety data to the main station.
5. Watch safety protection system according to claim 4,
the master station sends a second encryption request and sends the issued data to the security service processor;
the security service processor receives the second encryption request, performs second encryption processing on the issued data to obtain second encrypted data corresponding to the issued data, and returns the second encrypted data to the master station;
the master station sends the second encrypted data to the Internet of things platform, and the Internet of things platform transmits the second encrypted data to the meter through the target protocol;
and the meter receives the second encrypted data, and the security chip executes a second identity authentication instruction and a second decryption instruction corresponding to a second signature verification decryption request sent by the meter to obtain second security data corresponding to the second encrypted data.
6. The watch security system of claim 1, further comprising:
a first sending counter and a first receiving counter arranged on the meter;
a second transmit counter and a second receive counter disposed at the security services processor;
the first transmit counter corresponds to the second receive counter;
the first receive counter corresponds to the second transmit counter.
7. A watch safety protection system according to claim 6, characterized in that said safety chip comprises:
a first determining module, configured to determine a first encryption instruction according to the first transmission counter, where the first encryption instruction includes a first key and a second key, and the second key includes first identity authentication information;
the first encryption module is used for encrypting the reported data according to the first key to obtain first encrypted subdata;
the second encryption module is used for calculating to obtain second encrypted subdata according to the first encrypted subdata and the second key;
and the first combination module is used for combining the first encrypted subdata and the second encrypted subdata to obtain first encrypted data.
8. A gauge safety protection system, as claimed in claim 6, wherein the safety services processor comprises:
a second determining module, configured to determine a second encryption instruction according to the second sending counter, where the second encryption instruction includes a third key and a fourth key, and the fourth key includes second identity authentication information;
the third encryption module is used for encrypting the issued data according to the third key to obtain third encrypted subdata;
the fourth encryption module is used for calculating fourth encrypted subdata according to the third encrypted subdata and the fourth key;
and the second combining module is used for combining the third encrypted subdata and the fourth encrypted subdata to obtain second encrypted data.
9. A watch security guard system as claimed in claim 7, wherein the security services processor further comprises:
a first judging module, configured to judge whether a first sending count of the first sending counter is greater than a second receiving count of the second receiving counter;
a first updating module, configured to update the second receiving count to the first sending count if the first sending count is greater than the second receiving count;
the first decryption module is used for acquiring a first decryption instruction corresponding to the first encryption instruction according to the updated second receiving count and decrypting the encrypted reported data;
the first authentication module is used for calculating first identity authentication data according to the first decryption instruction and judging whether the first identity authentication data is consistent with first identity authentication information of the meter;
and the first judgment module is used for judging that the first identity authentication is passed if the first identity authentication data is consistent with the first identity authentication information of the table.
10. A watch safety protection system according to claim 8, characterized in that said safety chip further comprises:
a second judging module, configured to judge whether a second sending count of the second sending counter is greater than a first receiving count of the first receiving counter;
a second updating module, configured to update the first receiving count to the second sending count if the second sending count is greater than the first receiving count;
the second decryption module is used for acquiring a second decryption instruction corresponding to the second encryption instruction according to the updated first receiving count and decrypting the encrypted issued data;
the second authentication module is used for calculating the second identity authentication data according to the second decryption instruction and judging whether the second identity authentication data is consistent with the second identity authentication information of the master station or not;
and the second judgment module is used for judging that the second identity authentication is passed if the second identity authentication data is consistent with the second identity authentication information.
11. A data transmission method, comprising the steps of:
acquiring a first target data encryption request;
encrypting the first target data to obtain first encrypted data corresponding to the first target data;
receiving second encrypted data;
and decrypting and authenticating the second encrypted data to obtain second target data corresponding to the second encrypted data.
12. A data transmission method, comprising the steps of:
acquiring a second target data encryption request;
encrypting the second target data to obtain second encrypted data corresponding to the second target data;
receiving first encrypted data;
and decrypting and authenticating the first encrypted data to obtain first target data corresponding to the first encrypted data.
13. A watch, characterized in that it comprises: a memory and a processor, the memory and the processor being communicatively coupled to each other, the memory having stored therein computer instructions, the processor executing the computer instructions to perform the data transmission method of claim 11.
14. A server, comprising: a memory and a processor, the memory and the processor being communicatively coupled to each other, the memory having stored therein computer instructions, the processor executing the computer instructions to perform the data transmission method of claim 12.
CN202010642525.0A 2020-07-06 2020-07-06 Safety protection system for meter, data transmission method, meter and server Pending CN113905355A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010642525.0A CN113905355A (en) 2020-07-06 2020-07-06 Safety protection system for meter, data transmission method, meter and server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010642525.0A CN113905355A (en) 2020-07-06 2020-07-06 Safety protection system for meter, data transmission method, meter and server

Publications (1)

Publication Number Publication Date
CN113905355A true CN113905355A (en) 2022-01-07

Family

ID=79186897

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010642525.0A Pending CN113905355A (en) 2020-07-06 2020-07-06 Safety protection system for meter, data transmission method, meter and server

Country Status (1)

Country Link
CN (1) CN113905355A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114500064A (en) * 2022-01-30 2022-05-13 北京亚华物联科技发展有限公司 Communication security verification method and device, storage medium and electronic equipment

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2011127107A2 (en) * 2010-04-09 2011-10-13 Alcatel-Lucent Usa Inc. A method of machine-to-machine communication
US20120084559A1 (en) * 2010-09-30 2012-04-05 Hunt Technologies, Llc Communications Source Authentication
WO2014090061A1 (en) * 2012-12-12 2014-06-19 腾讯科技(深圳)有限公司 Method, system, server and terminal for achieving secure transmission of data
WO2018072455A1 (en) * 2016-10-17 2018-04-26 中国电力科学研究院有限公司 Electric energy meter, checking method therefor, and storage medium
CN108200094A (en) * 2018-02-09 2018-06-22 大庆英辰创新科技有限公司 A kind of secure communication device, method and system of gas meter, flow meter
US20180212785A1 (en) * 2017-01-25 2018-07-26 Salesforce.Com, Inc. Secure remote user authentication leveraging public key cryptography and key splitting
CN108769986A (en) * 2018-06-08 2018-11-06 廊坊新奥燃气设备有限公司 A kind of GPRS remote transmitting gas meters encryption communication method
WO2019109852A1 (en) * 2017-12-08 2019-06-13 阿里巴巴集团控股有限公司 Data transmission method and system
CN110300108A (en) * 2019-06-26 2019-10-01 国网山东省电力公司临朐县供电公司 A kind of power distribution automation message encryption transmission method, system, terminal and storage medium
CN110446177A (en) * 2019-08-20 2019-11-12 杭州安恒信息技术股份有限公司 Communication means, the apparatus and system of Internet of Things gauge table
CN210719302U (en) * 2019-07-25 2020-06-09 金卡智能集团股份有限公司 Safety communication system of gas meter

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2011127107A2 (en) * 2010-04-09 2011-10-13 Alcatel-Lucent Usa Inc. A method of machine-to-machine communication
US20120084559A1 (en) * 2010-09-30 2012-04-05 Hunt Technologies, Llc Communications Source Authentication
WO2014090061A1 (en) * 2012-12-12 2014-06-19 腾讯科技(深圳)有限公司 Method, system, server and terminal for achieving secure transmission of data
WO2018072455A1 (en) * 2016-10-17 2018-04-26 中国电力科学研究院有限公司 Electric energy meter, checking method therefor, and storage medium
US20180212785A1 (en) * 2017-01-25 2018-07-26 Salesforce.Com, Inc. Secure remote user authentication leveraging public key cryptography and key splitting
WO2019109852A1 (en) * 2017-12-08 2019-06-13 阿里巴巴集团控股有限公司 Data transmission method and system
CN108200094A (en) * 2018-02-09 2018-06-22 大庆英辰创新科技有限公司 A kind of secure communication device, method and system of gas meter, flow meter
CN108769986A (en) * 2018-06-08 2018-11-06 廊坊新奥燃气设备有限公司 A kind of GPRS remote transmitting gas meters encryption communication method
CN110300108A (en) * 2019-06-26 2019-10-01 国网山东省电力公司临朐县供电公司 A kind of power distribution automation message encryption transmission method, system, terminal and storage medium
CN210719302U (en) * 2019-07-25 2020-06-09 金卡智能集团股份有限公司 Safety communication system of gas meter
CN110446177A (en) * 2019-08-20 2019-11-12 杭州安恒信息技术股份有限公司 Communication means, the apparatus and system of Internet of Things gauge table

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114500064A (en) * 2022-01-30 2022-05-13 北京亚华物联科技发展有限公司 Communication security verification method and device, storage medium and electronic equipment
CN114500064B (en) * 2022-01-30 2024-01-26 北京亚华物联科技发展有限公司 Communication security verification method and device, storage medium and electronic equipment

Similar Documents

Publication Publication Date Title
US9762590B2 (en) System and method for an integrity focused authentication service
US10958664B2 (en) Method of performing integrity verification between client and server and encryption security protocol-based communication method of supporting integrity verification between client and server
CN105162772A (en) IoT equipment authentication and key agreement method and device
US9900296B2 (en) Securing communication within a network endpoint
US20210144130A1 (en) Method for securing communication without management of states
CN110035058B (en) Resource request method, device and storage medium
CN103427992A (en) Method for establishing secure communication between nodes in a network, network node, key manager, installation device and computer program product
CN104319874A (en) On-line monitoring system and method for status of power transmission line of intelligent power grid
CN113439425B (en) Message transmission method and device
CN110446177B (en) Communication method, device and system of Internet of things meter
CN104902469A (en) Secure communication method facing wireless communication network of power transmission lines
CN107896216B (en) A kind of key management, data encryption and the identity identifying method of electric power measuring instrument
CN102970676A (en) Method for processing original data, internet of thing system and terminal
CN112602290B (en) Identity authentication method and device and readable storage medium
CN113905355A (en) Safety protection system for meter, data transmission method, meter and server
KR102449123B1 (en) Certificateless aggregated arbitrated signature verification system and method for internet of thing environment
CN103731828B (en) A kind of terminal unit and method for electronic certificate authentication
CN112087301A (en) Gas meter safety certification system based on state cryptographic algorithm
CN110278077B (en) Method, device, equipment and storage medium for acquiring data information of electric energy meter
WO2021110288A1 (en) Authentication of an entity
CN103731827B (en) A kind of hand-held audio communication device and method for electronic certificate authentication
CN106372557B (en) Certificate card information acquisition method, device and system
CN114553542A (en) Data packet encryption method and device and electronic equipment
CN203289647U (en) Handheld audio communication equipment for electronic certificate authentication
CN114826742B (en) Communication security system and authentication method for engineering machinery internet of things perception layer network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination