AU2002224657B2 - Method and apparatus for enabling a supplier to verify the vaildity of consumption information - Google Patents

Method and apparatus for enabling a supplier to verify the vaildity of consumption information Download PDF

Info

Publication number
AU2002224657B2
AU2002224657B2 AU2002224657A AU2002224657A AU2002224657B2 AU 2002224657 B2 AU2002224657 B2 AU 2002224657B2 AU 2002224657 A AU2002224657 A AU 2002224657A AU 2002224657 A AU2002224657 A AU 2002224657A AU 2002224657 B2 AU2002224657 B2 AU 2002224657B2
Authority
AU
Australia
Prior art keywords
consumer
information
customer
specific information
verification code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
AU2002224657A
Other versions
AU2002224657A1 (en
Inventor
Georg Snr. Breu
Konrad Breu
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Breu Snr
Original Assignee
Breu Snr
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from AUPR2723A external-priority patent/AUPR272301A0/en
Application filed by Breu Snr filed Critical Breu Snr
Priority to AU2002224657A priority Critical patent/AU2002224657B2/en
Publication of AU2002224657A1 publication Critical patent/AU2002224657A1/en
Application granted granted Critical
Publication of AU2002224657B2 publication Critical patent/AU2002224657B2/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Landscapes

  • Arrangements For Transmission Of Measured Signals (AREA)

Description

WO 02/060120 PCT/AU02/00050 Technical Field The present invention relates to a method and apparatus for enabling a supplier to verify the validity of consumption information collected at a consumer's premises and transmitted to the supplier.
Background of the Invention Providers of services which are consumed to varying degrees by different consumers, such as utility providers and Pay TV providers, often rely on metering equipment located at their customer's premises to determine the quantity of service that has been consumed by each customer. Meter readings are used to bill customers in accordance with the amount of service which has been consumed. This process requires meter readings to be made periodically.
Typically, a service provider will send a representative to a customer's premises after each billing period to read the customer's meter so that the amount of service consumed by the customer can be determined.
In order to alleviate the requirement for a personal visit to a customer's premises to obtain a meter reading, various techniques exist for communicating consumption information from a customer's premises to a service provider without the need for a manual reading. Remote monitoring units such as those manufactured by Call Direct of Sydney, Australia have been developed to allow electricity providers to remotely read electricity meters. The units utilize integrated mobile phone circuitry which allows an electricity provider to establish a connection with the meter via a mobile phone network and download usage WO 02/060120 PCT/AU02/00050 2 information. Other systems rely on a fixed line connection between the service provider and the meter, such as a telephone line, to relay billing information.
Each of these techniques depend on directly interfacing a customer's consumption metering equipment with a permanent or transient electromagnetic communication path allowing consumption information to be relayed to a supplier. The need for a special interface between the supplier and the metering equipment located at the customer's premises means that none of these methods has attained widespread use and the manual reading of meters by representatives of suppliers still predominates.
Continued reliance on the manual reading of meters by service providers has also prevented non-remote meter units from being located within locked or restricted access areas of customer's premises. Service providers may also need to access a meter to read it at times when the customer is absent from the premises which often precludes placing the meter in a secure location.
A need therefore exists for a method of communicating usage information which reduces the need for manual readings by service providers, allows a service metering device to be located anywhere within a customer's premises and does not require a direct interface between the service metering device and the service provider.
WO 02/060120 PCT/AU02/00050 3 Summary of the Invention According to one aspect the invention resides in a method for verifying the validity of consumption information transmitted from a consumer to a supplier, the method including:at the consumer site, employing a cryptographic transformation process to generate a first verification code based on at least the consumption information and secret-consumer-specific information; transmitting at least the consumption information and first verification code together with public-consumer-specific information from the consumer to the supplier; at the supplier site, determining the secret-consumer-specific information from the transmitted public-consumer-specific information, and then employing the cryptographic transformation process to generate a second verification code based on at least the transmitted consumption information and determined secret-consumer-specific information; and comparing the first verification code and second verification code to determine the validity of the transmitted consumption information.
According to another aspect the invention resides in a consumption meter including:secure storage means for storing secret-consumer-specific information; WO 02/060120 PCT/AU02/00050 4 cryptographic transformation means for generating a verification code based on at least consumption information and the secret-consumer-specific information; and means for outputting at least the consumption information and verification code.
Brief Description of the Drawings Fig. 1 is a block diagram illustrating an embodiment of the present invention.
Fig. 2 is a flow diagram illustrating the calculation performed by the processing unit in order to generate a verification code.
Fig. 3 shows the format of a billing period message string.
Fig. 4 depicts a sample display of usage information on a service metering device.
Fig. 5 is a flow diagram showing the verification process performed by a service provider once a customer has communicated usage information.
Fig. 6 illustrates an example of a reminder slip which may be sent to each WO 02/060120 PCT/AU02/00050 Fig. 7 illustrates how usage information may be communicated to a service provider using a touch tone telephone.
Fig. 8 illustrates an example of a reminder slip which may be sent to each customer at the end of each billing period allowing the return of usage information by mail.
Fig. 9 shows a method of communicating usage information for customers who have access to a phone which can be positioned close to a service metering device.
Fig. 10 shows a rendered HTML page allowing usage information to be sent to a service provider.
Fig. 11 illustrates a method of encoding verifiable usage information in an SMS message.
Detailed Description of a Preferred Embodiment of the Invention Fig. 1 is a block diagram illustrating an embodiment of the present invention allowing verifiable consumption information to be communicated to a service provider by a customer. A customer premises service metering device consists of digital metering circuitry which measures the amount of service consumed by the customer 101, a processing unit capable of performing digital calculations on the digital meter readings 102, storage memories for accumulated meter readings 103 and customer specific information 104, a clock module capable of WO 02/060120 PCT/AU02/00050 6 providing the processing unit with the current time/date 105 and a user interface 106 consisting of a display and buttons for interacting with the customer.
Each customer using the system is allocated a unique public numeric identification code (NIC) and unique 512-bit secret key by the service provider.
Both the customer's NIC and secret key are stored in the customer information memory 104 of the service metering device. The secret key is not disclosed to the customer, but an electronic record of it is maintained by the service provider.
The customer information memory is also programmed with sufficient information to enable the processing unit to detect when each billing period for the customer has passed. For instance, if a customer is billed at quarterly intervals the date of commencement of billing for that customer is stored together with the duration of the billing period (2191.5 hours).
As a customer uses the particular service metered the amount of consumption is measured by the metering circuit 101 and provided in digital form to the processing unit 102. The processing unit sums the instantaneous consumption information over a billing period chosen by the service provider using the time and date information provided by the clock module 105. Once a billing period has passed, the total consumption for that period is stored, together with the start and end dates of the billing period, in the usage history memory 103. The processing unit then calculates a verification code (VC) based on the customer's secret key and NIC, the start and end dates of the billing period and the total consumption during the period. The resulting verification code is then stored in the usage history memory.
WO 02/060120 PCT/AU02/00050 7 Fig. 2 shows in detail the calculation performed by the processing unit in order to generate a verification code. In step 201, billing information associated with a particular billing period is concatenated into a billing period message string
(BPMS).
Fig. 3 illustrates the format of the ASCII encoded BPMS. Each field of the BPMS is separated from the next with a single comma The BPMS is composed of four fields: the customer's NIC; the start date of the billing period to which the BPMS relates; the end date of the billing period to which the BPMS relates and the amount of service consumed by the customer during the billing period. A sample BPMS is shown in the example in step 201. In step 202, a Message Authentication Code (MAC) algorithm is then applied to the BPMS.
In this embodiment of the invention, the widely known hash based MAC algorithm HMAC-RIPEMD160 is utilized. The inputs to the MAC algorithm are the customer's secret key and the BPMS. The example in step 202 shows hexadecimal representations of a sample 512-bit secret key and the sample ASCII encoded BPMS suitable for input into the HMAC-RIPEMD160 algorithm. A person skilled in the art would appreciate that there is no requirement for a limited or fixed length BPMS. The last line of the example in step 202 shows the 160-bit MAC output of the MAC algorithm for the particular test case in hexadecimal. Step 203 consists of selecting an arbitrary but fixed 3-byte (based on 1 byte 8 bits) subset of the MAC consisting of the bits (the zeroth bit being the most significant and the 15 9 th least significant) 16 to 23, 84 to 91 and 114 to 151. The three bytes selected are then concatenated and converted into an WO 02/060120 PCT/AU02/00050 8 integer verification code (VC) in step 204. The order of the bytes in the MAC is maintained in the VC. The 3-byte size of the VC permits decimal integers in the range 0 16777215 giving 16777216 total possible VC values. A 3-byte sized VC has been chosen in this embodiment in order to result in a VC which is 8 or less decimal digits in size a similar length to a telephone number. The size of the VC may be easily varied by selection of a larger subset of the MAC.
A person skilled in the art would appreciate that the characteristics of the MAC algorithm ensure that it is computationally infeasible to: generate a valid VC for a forged BPMS without knowledge of a customer's secret key or ascertain a customer's secret key from known valid BPMS and VC pairs. It will therefore not be feasible for a customer to generate a valid VC for an arbitrary BPMS.
After the end of each billing period, the customer is sent a reminder by post or email) that they should forward consumption information to the service provider for the billing period immediately past. The customer can then go to the service metering device installed on their premises, and press a single button annotated "Read Meter". In response to this the service metering device retrieves and displays the customer's NIC, the start and end dates of the billing period, the amount of service consumed during the billing period and the VC, as in the example display given in Fig. 4. Since generation of a valid VC requires knowledge of the customer's secret key, which is not disclosed to the customer, a customer cannot generate a valid VC which matches another combination of customer NIC, start and end dates and measurement of the amount of service consumed.
WO 02/060120 PCT/AU02/00050 9 Once a customer has retrieved and recorded on paper) usage details and a VC for a billing period this information can be conveyed to the service provider for verification. Sufficient information concerning a billing period must be conveyed to the service provider in order allow construction of an identical BPMS as that used to generate the relevant VC, The start and end dates of each billing period are pre-determined and known by the service provider so will in most circumstances not have to be communicated by the customer. The customer's NIC, in order to identify the customer, the amount of service consumed during the relevant period and a VC will usually have to be communicated by the customer. As the service provider will typically be aware of the units of measurement applying to the amount of service consumed, a customer will generally only have to communicate the numeric value without units.
Fig. 5 shows the verification process performed by a service provider once a customer has communicated these usage details. The process mirrors that performed in the service metering device in order to generate a VC. In step 501 the customer's NIC, billing period start and end dates and amount of service consumed are concatenated to form a BPMS. If units have not been provided by the customer these are also added. The start and end billing period dates have been determined from the service provider's billing records. The resulting BPMS is illustrated in the example next to step 501. The HMAC-RIPEMD160 algorithm is then applied to the BPMS using the service provider's record of the 512-bit secret key assigned to the customer, in step 502. In step 503 a 3-byte subset consisting of bits 16 to 23, 84 to 91 and 114 to 151 is selected. This subset is WO 02/060120 PCT/AU02/00050 concatenated and converted to an integer service provider generated Verification Code (SVC) in step 504. Finally, in step 505 the SVC is compared to the VC communicated by the customer. If both are identical the usage information provided by the customer can be trusted as having originated from the service metering device. If there is no match between the SVC and VC the customer has supplied erroneous or fraudulent usage information.
The system is resistant to a customer attempting to replay usage details and a VC from a previous billing period since the start and end dates of each billing period are included in the BPMS used to generate the VC for that period. Use of another customer's meter reading is also not possible since each VC is generated from a BPMS which includes the customer's NIC. In both cases there will be a discrepancy between the SVC generated by the service provider and the VC communicated by the customer.
In this embodiment of the invention the VC has been provided to the customer as a decimal number which allows communication through common touch-tone telephones. Fig. 6 illustrates an example of a reminder slip which may be sent to each customer at the end of each billing period. The slip contains instructions on how to obtain a meter reading and how to communicate the reading back to the service provider. Fig. 7 shows how billing information may then be relayed back to the service provider through manual operation of a touch tone telephone by a customer. In step 701 the customer is asked to enter their NIC. If the customer is providing usage details for the most recent billing period (step 702) they can proceed to keying in the usage amount (step 703) and VC (step 704). Following WO 02/060120 PCT/AU02/00050 11 successful verification the customer may be prompted for a credit card, cheque, bank account or other number from which funds can be obtained to satisfy the debt associated with the amount of service used (step 705).
If the VC provided by the customer does not match the SVC generated in the verification process, the customer may be given an opportunity to re-enter the VC or correct any mistakenly entered usage details a preset number of times five). If all opportunities to enter a correct VC fail, the customer would be prevented from further attempts and manual reading of the service metering device by the service provider would take place. This prevents brute force searching for the correct VC out of the total possible range of 16777216 values.
Fig. 8 depicts an alternative post based method of both reminding the customer that usage details are required and giving the customer an opportunity to provide such details. The customer is sent a slip by post which explains that a meter reading is due for a specific period, and areas on the slip are set aside to allow the customer to indicate the amount of service consumed and provide a matching VC. The slip is returned to the service provider by post for subsequent verification.
Fig. 9 shows a method of communicating usage details for customers who have access to a mobile phone. In this case the customer must again call a telephone number to provide usage details (step 901) but does not have to manually key in the information to be communicated, which is instead sent via a loudspeaker in the service metering device. When prompted by the service provider's billing WO 02/060120 PCT/AU02/00050 12 system (step 902), the customer holds the microphone of the mobile phone in front of the speaker on the service metering device and by pressing a button on the device (step 903) initiates transmission of the billing information as a sequence of touch tones (step 904). Once transmission is complete and the billing system has performed the verification calculation (step 905), the customer can return the mobile phone speaker to their ear to receive a message indicating that the usage details have been successfully received and verified (step 906).
This method will also work in conjunction with cordless telephones and fixed telephones provided that the microphone of the telephone can be positioned in close proximity to the loudspeaker of the service metering device.
Various Internet protocols may also be utilized to communicate usage information. Fig. 10 shows a HyperText Markup Language form supporting entry of a usage amount and corresponding verification code. Upon clicking on the "Send" button the service provider is sent usage information for a billing period and may verify those details in real time. A form may also be implemented in Wireless Markup Language allowing a customer with a mobile phone supporting the Wireless Application Protocol to receive the form and enter usage information using the keypad of the phone while in front of the service metering device.
Fig. 11 illustrates how usage information may be encapsulated in a Short Message Service (SMS) message for transmission to a service provider via a mobile phone. A customer may compose a message consisting of the customer's NIC; the amount of service consumed; and the relevant VC.
Each field is separated from the next with a comma character The use of a WO 02/060120 PCT/AU02/00050 13 SMS message allows customers to compose the message on a mobile phone which supports SMS by transposing information off the display of the service metering device.
The methods of communicating usage information using the system are not limited to those described above. The presence of a short, human readable but secure verification code allows verifiable usage information to be communicated to the service provider by the customer using any mechanism supporting the transmission of numerical information. In all cases the communication of a VC is essential to prevent falsification of the usage information provided.
While an embodiment of the invention has been described above which enables a customer to be billed at predefined intervals, another embodiment of the invention allows a customer to settle their service account at any chosen point in time. In this case, instead of summing service consumption over distinct billing periods, the service metering device maintains a running total of overall consumption since installation. In response to a customer pressing the "Read Meter" button on the device, a BPMS consisting of the customer's NIC; the current date (in numeric DDMMYY format); and a measurement of the total overall consumption, is generated. Fig. 12 illustrates the format of this string.
Following generation of a VC through the process illustrated in Fig. 2 (with the alternative BPMS), the service metering device displays the customer's NIC; the date on which the button was pressed; a measurement of the total overall consumption; and a matching VC. The customer may then communicate all four of these items to the service provider. Since the current WO 02/060120 PCT/AU02/00050 14 date is encoded as a six digit number and represented to the customer in this format, it may easily be transmitted using number only devices such as telephones. Following receipt of the four items, the service provider can perform the verification calculation illustrated in Fig. 5 (with the alternative BPMS) in order to determine whether the usage details are legitimate. Operation of the service metering device in this way enables a customer to communicate the amount of service they have consumed at any point in time. A service provider can ascertain the amount of service a person has consumed since they last communicated usage details by subtracting the previous total consumption measurement they received. Both this mode of operation and the billing period based mode described above may be supported within a single service metering device.
The present invention is not intended to be limited to the particular preferred embodiments described above. Modifications which fall within the spirit and scope of the invention will be apparent to those skilled in the art. For example, while a preferred embodiment utilizing the HMAC-RIPEMD160 algorithm has been described, any secure MAC algorithm or other cryptographic transformation could be utilized. Also, more than one consumption measurement can be embedded in a BPMS. For instance, it is possible to embed both peak and off peak consumption amounts, such as "2038 kWh peak, 1017 kWh off-peak" in the last field of the BPMS. A customer can then provide both these figures to the service provider and the verification process can take place as for one consumption measurement.

Claims (9)

1. A method for verifying the validity of consumption information transmitted from a consumer to a supplier, the method including:- at the consumer site, employing a cryptographic transformation process to generate a first verification code based on at least the consumption information and secret-consumer-specific information; transmitting at least the consumption information and first verification code together with public-consumer-specific information from the consumer to the supplier; at the supplier site, determining the secret-consumer-specific information from the transmitted public-consumer-specific information, and then employing the cryptographic transformation process to generate a second verification code based on at least the transmitted consumption information and determined secret-consumer-specific information; and comparing the first verification code and second verification code to determine the validity of the transmitted consumption information.
2. A method as claimed in.claim 1, wherein the verification codes are also based on billing-period-specific information. WO 02/060120 PCT/AU02/00050 16
3. A method as claimed in claim 1, wherein the consumption information, public-consumer-specific information and first verification code are all numerical to facilitate transmission from the consumer to the supplier.
4. A method as claimed in claim 3, wherein transmission of the consumption information, public-consumer-specific information and first verification code occurs via telephone, mail or the Internet.
A method as claimed in claim 1, wherein the cryptographic transformation process is a MAC algorithm.
6. A method for enabling a utility company to verify the validity of consumption information collected and transmitted to the utility company by a consumer, the method including:- at the consumer's location, inputting at least the consumption information, secret-consumer-specific information and billing-period-specific information into a MAC algorithm to generate a first verification code; transmitting at least the consumption information, public-consumer- specific information and first verification code to the utility company; at the utility company's location, determining the secret-consumer-specific information from the public-consumer-specific information, and then inputting at least the transmitted consumption information, secret-consumer-specific PCT/AU02/00050 Received 16 April 2002 17 information and billing-period-specific information into the MAC algorithm to generate a second verification code; comparing the first and second verification codes to ascertain the validity of the consumption information transmitted by the consumer to the utility company.
7. A method as claimed in claim 6, wherein billing-period-specific information is also input into the MAC algorithm to generate the verification codes.
8. A consumption meter including:- secure storage means for storing secret-consumer-specific information; cryptographic transformation means for generating a verification code based on at least consumption information and the secret-consumer-specific information; and means for outputting at least the consumption information and verification code.
9. A consumption meter as claimed in claim 8, wherein the verification code generated by the cryptographic transformation means is also based on billing- period-specific information. AMENDLED ONE
AU2002224657A 2001-01-23 2002-01-22 Method and apparatus for enabling a supplier to verify the vaildity of consumption information Ceased AU2002224657B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2002224657A AU2002224657B2 (en) 2001-01-23 2002-01-22 Method and apparatus for enabling a supplier to verify the vaildity of consumption information

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
AUPR2723A AUPR272301A0 (en) 2001-01-23 2001-01-23 Method and apparatus for enabling a supplier to verify the validity of consumption information
AUPR2723 2001-01-23
AU2002224657A AU2002224657B2 (en) 2001-01-23 2002-01-22 Method and apparatus for enabling a supplier to verify the vaildity of consumption information
PCT/AU2002/000050 WO2002060120A1 (en) 2001-01-23 2002-01-22 Method and apparatus for enabling a supplier to verify the validity of consumption information

Publications (2)

Publication Number Publication Date
AU2002224657A1 AU2002224657A1 (en) 2003-02-06
AU2002224657B2 true AU2002224657B2 (en) 2006-06-08

Family

ID=39338554

Family Applications (1)

Application Number Title Priority Date Filing Date
AU2002224657A Ceased AU2002224657B2 (en) 2001-01-23 2002-01-22 Method and apparatus for enabling a supplier to verify the vaildity of consumption information

Country Status (1)

Country Link
AU (1) AU2002224657B2 (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4749992A (en) * 1986-07-03 1988-06-07 Total Energy Management Consultants Corp. (Temco) Utility monitoring and control system
US5239584A (en) * 1991-12-26 1993-08-24 General Electric Corporation Method and apparatus for encryption/authentication of data in energy metering applications
US6029150A (en) * 1996-10-04 2000-02-22 Certco, Llc Payment and transactions in electronic commerce system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4749992A (en) * 1986-07-03 1988-06-07 Total Energy Management Consultants Corp. (Temco) Utility monitoring and control system
US4749992B1 (en) * 1986-07-03 1996-06-11 Total Energy Management Consul Utility monitoring and control system
US5239584A (en) * 1991-12-26 1993-08-24 General Electric Corporation Method and apparatus for encryption/authentication of data in energy metering applications
US6029150A (en) * 1996-10-04 2000-02-22 Certco, Llc Payment and transactions in electronic commerce system

Similar Documents

Publication Publication Date Title
CN1252478C (en) Method for transmitting and storing value and valve store electric power meter using the same
US6529883B1 (en) Prepayment energy metering system with two-way smart card communications
CN1332550C (en) Implementation of charging in a telecommunications system
WO2002093888A1 (en) Method of universal communication and devices thereof
WO2002073483A1 (en) Electronic money settlement method using mobile communication terminal
WO2002037358A1 (en) User authentication method in network
CA2273859A1 (en) Authenticating system with microcircuit card
GB2455965A (en) Remote control of commodity access and metering
CN105989466A (en) Method of payment with mobile phone
CN111784317A (en) Method and device for automatic payment
AU751465B2 (en) Improvements relating to metering systems
US20030130961A1 (en) System and method for making secure data transmissions
US20010029498A1 (en) Payment acting service method and system
EP1242983B1 (en) A system for recharging a prepaid value in respect of a telephone connection
AU2002224657B2 (en) Method and apparatus for enabling a supplier to verify the vaildity of consumption information
WO2002060120A1 (en) Method and apparatus for enabling a supplier to verify the validity of consumption information
AU2002224657A1 (en) Method and apparatus for enabling a supplier to verify the vaildity of consumption information
JP2006209589A (en) Acquisition system of house information for use in authentication
JP3538154B2 (en) Electricity usage metering system and power usage metering method
KR20000034234A (en) Method for using remote inspection combined wireless terminal capable of verifying rates
KR200361511Y1 (en) Rest charge alarm device
KR20010009666A (en) Method for inspecting remote using wireless terminal
KR100826056B1 (en) Smart card no charge filling up service method
KR20050121827A (en) Rest charge alarm device and method thereof
KR100421568B1 (en) Meter wireless meter reading method using handy terminal

Legal Events

Date Code Title Description
FGA Letters patent sealed or granted (standard patent)
MK14 Patent ceased section 143(a) (annual fees not paid) or expired