CN110278077A - A kind of method, apparatus for obtaining electric energy meter data information, electronic equipment and storage medium - Google Patents
A kind of method, apparatus for obtaining electric energy meter data information, electronic equipment and storage medium Download PDFInfo
- Publication number
- CN110278077A CN110278077A CN201910472000.4A CN201910472000A CN110278077A CN 110278077 A CN110278077 A CN 110278077A CN 201910472000 A CN201910472000 A CN 201910472000A CN 110278077 A CN110278077 A CN 110278077A
- Authority
- CN
- China
- Prior art keywords
- code key
- data packet
- key vector
- packet
- vector data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 57
- 239000013598 vector Substances 0.000 claims abstract description 108
- 238000009434 installation Methods 0.000 claims abstract description 70
- 102100038591 Endothelial cell-selective adhesion molecule Human genes 0.000 claims abstract description 51
- 101000882622 Homo sapiens Endothelial cell-selective adhesion molecule Proteins 0.000 claims abstract description 51
- 230000004044 response Effects 0.000 claims abstract description 24
- 241001269238 Data Species 0.000 claims description 29
- 230000008569 process Effects 0.000 claims description 18
- 238000004891 communication Methods 0.000 claims description 17
- 238000004590 computer program Methods 0.000 claims description 13
- 230000005611 electricity Effects 0.000 description 12
- 230000005540 biological transmission Effects 0.000 description 11
- 238000010586 diagram Methods 0.000 description 10
- 230000006870 function Effects 0.000 description 4
- 230000000694 effects Effects 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 235000013399 edible fruits Nutrition 0.000 description 2
- 239000000463 material Substances 0.000 description 2
- 238000012795 verification Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 230000002457 bidirectional effect Effects 0.000 description 1
- 239000011248 coating agent Substances 0.000 description 1
- 238000000576 coating method Methods 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000005194 fractionation Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0877—Generation of secret information including derivation or calculation of cryptographic keys or passwords using additional device, e.g. trusted platform module [TPM], smartcard, USB or hardware security module [HSM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3234—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a kind of methods for obtaining electric energy meter data information, comprising: obtains code key negotiation data packet according to ESAM information;Encryption code key vector data packet is obtained according to the code key negotiation data packet;The encryption code key vector data packet is decrypted, decryption code key vector data packet is obtained;According to the decryption code key vector data packet, target packet is obtained.The embodiment of the present invention is firstly the need of the certification for completing repeating installation by ESAM information, by obtaining through the encrypted collecting data information of mobile client or telegram in reply information after the completion of certification, data acquisition information or telegram in reply information are sent to electric energy meter by repeating installation with ciphertext form, the corresponding response data for obtaining electric energy meter, the response data is sent to mobile client again with ciphertext form by repeating installation, to realize the data information of safe and reliable, complete acquisition electric energy meter or the function for information of sending a telegram in reply.
Description
Technical field
The invention belongs to technical field of data transmission, and in particular to a kind of method for obtaining electric energy meter data information,
Device, electronic equipment and storage medium.
Background technique
Electric energy meter is also known as kilowatt-hour meter, energy meter, kilowatt-hour table, is the instrument for measuring various electrical quantities.With electricity consumption
Information collection construction is carried out in a deep going way, is acquired coverage rate at present and is had reached 45% or more, provides greatly just for counting cost by gas meter
Benefit.
With the propulsion of national smart grid, the manual meter reading mode of gradually abandoning tradition is adopted in the acquisition of electricity consumption data
Control meter reading method with remote terminal, and with the continuous improvement of people's living standards, people to directly passing through mobile client
End obtains electric energy meter information and realizes that the demand of the functions such as long-range telegram in reply is increasing.
But how safe and reliable power information system that is, convenient and completely making user and mobile client realization be remote
The functions such as Cheng Fu electricity, electric energy meter information collection, become urgent problem to be solved.
Summary of the invention
In order to solve the above-mentioned problems in the prior art, the present invention provides one kind for obtaining electric energy meter data letter
Method, apparatus, electronic equipment and the storage medium of breath.The technical problem to be solved in the present invention is achieved through the following technical solutions:
A method of for obtaining electric energy meter data information, comprising:
Code key negotiation data packet is obtained according to ESAM information;
Encryption code key vector data packet is obtained according to the code key negotiation data packet;
The encryption code key vector data packet is decrypted to obtain decryption code key vector data packet;
Target packet is obtained according to the decryption code key vector data packet.
In one embodiment of the invention, code key negotiation data packet is obtained according to the ESAM information, comprising:
Deconsolidation process is carried out to the ESAM information according to the first data length, obtains several first pending datas;
The code key negotiation data packet is obtained according to several first pending datas.
In one embodiment of the invention, encryption code key vector data packet is obtained according to the code key negotiation data packet,
Include:
Several negotiation response encryption datas are obtained according to the code key negotiation data packet;
Encryption code key vector data packet is obtained according to several negotiation response encryption datas.
In one embodiment of the invention, the encryption code key vector data packet is decrypted to obtain decrypt it is secret
Key vector data packet, comprising:
The encryption code key vector data packet is decrypted according to ESAM to obtain the decryption code key vector data
Packet.
In one embodiment of the invention, target packet is obtained according to the decryption code key vector data packet, comprising:
The first identification data of the decryption code key vector data are removed, and the decryption code key vector data packet is carried out
Deconsolidation process obtains several decryption code key vector datas;
The target packet is obtained according to several decryption code key vector datas.
In one embodiment of the invention, the target data is obtained according to several decryption code key vector datas
Packet, comprising:
The first target data to be processed is obtained according to several decryption code key vector datas;
Described first target data to be processed is encrypted to obtain the target packet.
In one embodiment of the invention, the described first target data to be processed is encrypted to obtain the mesh
Mark data, comprising:
The described first target data to be processed is encrypted to obtain the target packet according to ESAM.
One embodiment of the invention also provides a kind of repeating installation, comprising:
Code key negotiation data packet obtains module, for obtaining code key negotiation data packet according to ESAM information;
Primary vector data packet handing module, for obtaining encryption code key vector data according to the code key negotiation data packet
Packet;
Secondary vector data packet handing module is solved for the encryption code key vector data packet to be decrypted
Close code key vector data packet;
Target data processing module, for obtaining target packet according to the decryption code key vector data packet.
One embodiment of the invention also provides a kind of electronic equipment, including processor, communication interface, memory and communication are always
Line, wherein processor, communication interface, memory complete mutual communication by communication bus;
Memory, for storing computer program;
Processor when for executing the computer program, realizes any of the above-described method and step.
One embodiment of the invention also provides a kind of computer readable storage medium, in the computer readable storage medium
It is stored with computer program, preceding claim any method step is realized when the computer program is executed by processor
Suddenly.
Beneficial effects of the present invention:
The embodiment of the present invention is firstly the need of the certification for completing repeating installation by ESAM information, by obtaining after the completion of certification
Through the encrypted collecting data information of mobile client or telegram in reply information, by data acquisition information or telegram in reply information with ciphertext form
It is sent to electric energy meter by repeating installation, the corresponding response data for obtaining electric energy meter, repeating installation is again by the response data with close
Literary form is sent to mobile client, to realize the data information or telegram in reply information of safe and reliable, complete acquisition electric energy meter
Function.
The present invention is described in further details below with reference to accompanying drawings and embodiments.
Detailed description of the invention
Fig. 1 is provided in an embodiment of the present invention a kind of for obtaining the flow diagram of the method for electric energy meter data information;
Fig. 2 is a kind of flow diagram of method for obtaining code key negotiation data packet provided in an embodiment of the present invention;
Fig. 3 is a kind of flow diagram of method for obtaining encryption code key vector data packet provided in an embodiment of the present invention;
Fig. 4 is a kind of flow diagram of method for obtaining target packet provided in an embodiment of the present invention;
Fig. 5 is another process signal for obtaining the method for electric energy meter data information provided in an embodiment of the present invention
Figure;
Fig. 6 is a kind of structural schematic diagram of repeating installation provided in an embodiment of the present invention;
Fig. 7 is the structural schematic diagram of a kind of electronic equipment provided in an embodiment of the present invention.
Specific embodiment
Further detailed description is done to the present invention combined with specific embodiments below, but embodiments of the present invention are not limited to
This.
Embodiment one
Referring to Figure 1, Fig. 1 is provided in an embodiment of the present invention a kind of for obtaining the stream of the method for electric energy meter data information
Journey schematic diagram.The present embodiment provides a kind of methods for obtaining electric energy meter data information, comprising:
Step 1 obtains code key negotiation data packet according to the ESAM information;
Step 2 obtains encryption code key vector data packet according to the code key negotiation data packet;
Step 3 is decrypted the encryption code key vector data packet to obtain decryption code key vector data packet;
Step 4 obtains target data according to the decryption code key vector data packet.
In above-mentioned steps, user's electric energy meter information in order to obtain or is stopping such as electricity consumption situation, expense service condition
Electricity consumption situation is restored by remotely control when electricity consumption, request data need to be sent extremely by mobile client (such as wechat small routine)
The repeating installation of the present embodiment then needs before transmitting in order to guarantee the safety of request data using in repeating installation
ESAM chip encrypts request data, before encryption in order to match with corresponding repeating installation, then needs to fill telegram in reply
ESAM chip in setting is authenticated, thus mobile client connect first repeating installation (such as wechat small routine pass through bluetooth connect
Connect repeating installation), after repeating installation, which receives mobile client, needs to obtain the instruction of ESAM information, repeating installation just will
ESAM information is sent to mobile client, and ESAM information for example can be the sequence number of ESAM chip, while also by ESAM chip
Counter information be sent to mobile client, after mobile client receives ESAM information and counter information, just call on
Bit encryption machine handles ESAM information, and processing obtains code key negotiation data packet, and unison counter information carries out plus 1 processing,
It is called primary to represent corresponding ESAM chip, upper encryption equipment passes through mobile client for code key negotiation data packet again later
It is handed down to repeating installation, if repeating installation responds the code key negotiation data, response code key is also negotiated number by repeating installation
According to data be back to mobile client, response code key negotiation data is back to upper encryption equipment again by mobile client, upper
Encryption equipment verifies it, if verification passes through, can complete the certification of the identification to ESAM chip;After completing certification, move
Request data is sent to upper encryption equipment and encrypted by dynamic client, and correspondence is encrypted after upper encryption equipment encryption
Code key vector data packet, upper encryption equipment pass through mobile client again and the encryption code key vector data packet are sent to telegram in reply dress
It sets, repeating installation is just decrypted it after receiving encryption code key vector data packet again, and by the number after decryption processing
According to electric energy meter is pass-through to, electric energy meter responds encryption code key vector data packet transmitted by repeating installation, by electricity required for user
Energy table information is back to repeating installation, and repeating installation again returns the electric energy meter information data (target packet) that electric energy meter is responded
It is back to mobile client.
The present embodiment needs to authenticate the ESAM chip in repeating installation first, ensure that acquired electric energy meter information
Accuracy, and the present embodiment passes through repeating installation as medium, carries out in transmission process to the request data of mobile client
Encryption and decryption process ensure that the safety and reliability of electric energy meter information, while it can be prevented to be tampered and intercept again, protect
The integrality of the finally obtained electric energy meter information of mobile client is demonstrate,proved, and this mode can be realized in low-power consumption
Complete the acquisition of electric energy meter information.
Embodiment two
Fig. 2 is referred to, Fig. 2 is that a kind of process of method for obtaining code key negotiation data packet provided in an embodiment of the present invention is shown
It is intended to.The present embodiment on the basis of the above embodiments, illustrates the step 1 in embodiment one, and step 1 specifically can be with
Include:
Step 101, carrying out deconsolidation process to the ESAM information according to the first data length, to obtain several first to be processed
Data;
Step 102 obtains the code key negotiation data packet according to several first pending datas.
When mobile client needs to inquire electric energy meter information, repeating installation is just sent a command to, repeating installation receives
After instruction, ESAM information is just split into the several first numbers to be processed according to the first data length by the ESAM information of ESAM chip
According to the first pending data is successively sent to mobile visitor by repeating installation in such a way that subpackage is sent according to sequence from front to back
Family end, mobile client send it to upper encryption equipment again, and upper encryption equipment is just handled ESAM information, obtain code key
Code key negotiation data packet is sent in a manner of subpackage transmission multiple by negotiation data packet, upper encryption equipment mobile client again
Electric installation, repeating installation just respond thereto, and the data for responding code key negotiation data are back to by mobile client
Upper encryption equipment verifies the response data, and after verification passes through, mobile client can be obtained by the repeating installation
Required electric energy meter information.
Further, the sending method of mobile client is subpackage transmission, such as the word of the first data length can be set
Section is a packet, i.e., carries out subpackage processing to data according to the byte length of the first data length, the repeating installation of the present embodiment is then
Data are received according to the first data length, it is when last remaining byte length is discontented with the first preset data length, then it is complete
Portion is sent in repeating installation, for example, when mobile client is realized by bluetooth and the repeating installation of the present embodiment and connected, then
The sending method of its request data can be a packet for every 20 byte, and such as inadequate 20 byte then all sends remaining data
Into repeating installation.
Fig. 3 is referred to, Fig. 3 is a kind of stream of method for obtaining encryption code key vector data packet provided in an embodiment of the present invention
Journey schematic diagram.The present embodiment on the basis of the above embodiments, illustrates the step 2 in embodiment one, and step 2 is specific
May include:
Step 201 obtains several negotiations response encryption datas according to the code key negotiation data packet;
Step 202 obtains encryption code key vector data packet according to several negotiation response encryption datas.
After completing to the certification of the ESAM chip in repeating installation, mobile client is obtained for obtaining electric energy meter first
The request data of information, and the first identification of addition data in request data, the letter of identification data request data for identification
Type is ceased, for example, request data is acquisition electricity consumption situation, then the customized identification data for adding electricity consumption situation for identification, make
Repeating installation can accurately transmit requesting data information, and carry out at encryption to the request data added with the first identification data
Reason, such as cipher mode are ESAM cipher mode, and the request data is just carried out deconsolidation process according to the second data length later
Encryption data is responded at several negotiations, and is in sequence sent to several negotiations response encryption data in such a way that subpackage is sent
Repeating installation is then combined all negotiation response encryption datas in sequence one after repeating installation all finishes receiving
It rises, encryption code key vector data packet can be obtained, wherein the sequence is from first data to the last one data.
Added with the first identification data in the request data of the present embodiment, it can determine the type of request data, pass through subpackage mode
The encryption code key vector data packet of encrypted processing is obtained, the data that repeating installation and mobile client not only may be implemented pass
It is defeated, and can also prevent from being tampered in data transmission procedure, intercept, it is ensured that safety in data transmission procedure, can
By property, accuracy and integrality.
The present embodiment on the basis of the above embodiments, illustrates the step 3 in embodiment one, and step 3 is specific
May include:
The encryption code key vector data packet is decrypted according to ESAM to obtain the decryption code key vector data
Packet.
The present embodiment is decrypted to obtain using the ESAM chip in repeating installation to encryption code key vector data packet
Code key vector data packet is decrypted, ESAM chip can prevent data to be tampered and intercept, while transmitting data letter that can be safe
Breath.
Fig. 4 is referred to, Fig. 4 is a kind of process signal of method for obtaining target packet provided in an embodiment of the present invention
Figure.The present embodiment on the basis of the above embodiments, illustrates the step 4 in embodiment one, step 4 specifically can wrap
It includes:
Step 401 obtains several decryption code key vector datas to decryption code key vector data packet progress deconsolidation process;
Step 402 obtains the target packet according to several decryption code key vector datas.
It is secret then to split the decryption after having received decryption code key vector data packet in sequence for the repeating installation of the present embodiment
Key vector data packet, decryption code key vector data packet are to carry out deconsolidation process according to the second data length to obtain several decryption code keys
Vector data, while the first identification data in decryption code key vector data packet need to be removed, wherein decrypting code key vector data is
By ESAM decryption chip treated data, repeating installation, which will decrypt code key vector data, to be combined and is pass-through to electric energy
Table, the request of electric energy meter response decryption code key vector data, so that apparatus for coating obtains target packet.
Further, step 402 can specifically include:
Step 4021 obtains the first target data to be processed according to several decryption code key vector datas;
Step 4022 is encrypted to obtain the target packet to the described first target data to be processed.
The repeating installation of the present embodiment combines all decryption code key vector datas in sequence by 485 thoroughly
Reach electric energy meter, electric energy meter according to received decryption code key vector data information, respond thereto, and by the number of response
Repeating installation is passed through by 485 according to (the first target data to be processed), the target data to be processed of the first of the response is to use
The data obtained required for family, such as the information by obtaining required for decryption code key vector data are electricity consumption situation, then electric energy
When table receives the solicited message of repeating installation transparent transmission, the electricity consumption situation of the user is just pass-through to repeating installation by 485, it is multiple
Electricity consumption situation is fed back to mobile client again by electric installation.
It further, can be to first target to be processed after repeating installation receives the first target data to be processed
The second identification of addition data in data, repeating installation again carry out the first target data to be processed added with the second identification data
Encryption and deconsolidation process obtain target packet after processing, repeating installation is by target packet in such a way that subpackage is sent
It is sent to mobile client, client easy to remove is timely, accurately obtains the content that the second target data to be processed is responded.
In above-mentioned steps, after the completion of the second identification of addition data into the first target data to be processed, in order to guarantee
The validity and real-time of data security transmission, the present embodiment carry out the first target data to be processed using such as ESAM chip
Encryption, in order to which fast and accurately treated that the first target data to be processed is back to mobile client by encrypted
End, the present embodiment carry out deconsolidation process to it into several sub-goal data, then these sub-goal data are combined into final
Target packet, into mobile client transmission objectives process data packet, repeating installation divides sub-goal data in sequence
Packet is sent to mobile client, so that mobile client is after finishing receiving final target packet, it can be accurate
Electric energy meter information required for obtaining.
Wherein, 485 be RS485 communication standard, and RS485 is that a definition balances the driver in digital multi-drop system and connects
The standard for receiving the electrical characteristic of device, using the digital communications network of the standard can be under the conditions of remote and electronic noise is big
Effectively transmitted signal under environment.
In the present embodiment, for the ease of the addition and removal of the first identification data and the second identification data, first is known
Other data and the second identification data are set to the initial position and/or terminal position of data, it should be appreciated that, art technology
Personnel can add the first identification data and the second identification data in any of first object data according to actual use demand
Position, and the first identification data and the second identification data can be the same or different.
In the present embodiment, the data length that each data are split can be equal, for example, be 20 bytes, it can also not
The fractionation length of all data can be disposed as by equal, for the ease of repeating installation to data reception and deconsolidation process
Identical length.
In order to make it easy to understand, being illustrated to the method for obtaining electric energy meter data information provided by the present embodiment, ask
Referring to Fig. 5, detailed process: the app (wechat small routine) that for example mobile phone is used to obtain electric energy meter information needs to obtain electric energy meter
When, repeating installation will be sent a command to first (such as to be instructed as 803600FF000), to obtain the information of repeating installation, wechat
Small routine passes through bluetooth discovery and connects low-power consumption bluetooth repeating installation, and the ESAM chip of repeating installation is receiving the instruction
Afterwards, it will pass through repeating installation and ESAM information be back to wechat small routine, wechat small routine calls upper encryption equipment, ESAM is believed
Breath is sent to upper encryption equipment, obtains code key negotiation data packet, and wechat small routine is issued code key negotiation data packet by bluetooth
To repeating installation, repeating installation response code key negotiation data returns to wechat small routine, and wechat small routine is negotiation response data
Packet is handed down to upper encryption equipment, and negotiation data packet passes through processing acquisition encryption code key vector data to upper encryption equipment according to response
Packet, wechat small routine encrypt ciphertext according to encryption code key vector data packet and are handed down to repeating installation, the ESAM in repeating installation
The ciphertext is decrypted (decryption code key vector data packet) in plain text by chip, then is handed down to electric energy meter by 485, and electric energy meter response is bright
Literary data (the first target data to be processed) give repeating installation, which is encrypted to close by repeating installation by ESAM chip
Literary data (target packet), the ciphertext data pass through Bluetooth transmission again and give wechat small routine client, and wechat small routine passes through
Upper encryption equipment decrypts in plain text and then carries out business processing.
Embodiment three
Fig. 6 is referred to, Fig. 6 is a kind of structural schematic diagram of repeating installation provided in an embodiment of the present invention.As shown in fig. 6,
The repeating installation, comprising:
Code key negotiation data packet obtains module, for obtaining code key negotiation data packet according to ESAM information;
Primary vector data packet handing module, for obtaining encryption code key vector data according to the code key negotiation data packet
Packet;
Secondary vector data packet handing module is solved for the encryption code key vector data packet to be decrypted
Close code key vector data packet;
Target data processing module, for obtaining target packet according to the decryption code key vector data packet.
In one embodiment of the invention, code key negotiation data packet obtains module and is specifically used for according to the first data length
Deconsolidation process is carried out to the ESAM information and obtains several first pending datas;It is obtained according to several first pending datas
To the code key negotiation data packet.
In one embodiment of the invention, primary vector data packet handing module is specifically used for being negotiated according to the code key
Data packet obtains several negotiation response encryption datas;Encryption code key vector number is obtained according to several negotiation response encryption datas
According to packet.
In one embodiment of the invention, secondary vector data packet handing module is specifically used for being added according to ESAM to described
Close code key vector data packet is decrypted to obtain the decryption code key vector data packet.
In one embodiment of the invention, target data processing module is specifically used for removing the decryption code key vector number
According to first identification data, and to the decryption code key vector data packet progress deconsolidation process, obtain several decryption code key vectors
Data;The target packet is obtained according to several decryption code key vector datas.
In one embodiment of the invention, target data processing module is also used to according to several decryption code key vectors
Data obtain the first target data to be processed;Described first target data to be processed is encrypted to obtain the number of targets
According to packet.
In one embodiment of the invention, target data processing module is also used to be processed to described first according to ESAM
Target data is encrypted to obtain the target packet.
Repeating installation provided in an embodiment of the present invention can execute above method embodiment, realization principle and technology effect
Seemingly, details are not described herein for fruit.
Repeating installation provided in an embodiment of the present invention is a kind of device of low-power consumption, and user can pass through mobile client
(such as wechat small routine) connects the repeating installation of the present embodiment by such as blue tooth interface, then user is asked by the repeating installation
It asks data by 485 Bidirectional transparent transmissions to electric energy meter, and then reaches the function of collecting electric energy meter data by wechat small routine.
Example IV
Fig. 7 is referred to, Fig. 7 is the structural schematic diagram of a kind of electronic equipment provided in an embodiment of the present invention.As shown in fig. 7,
Electronic equipment 1100, comprising: processor 1101, communication interface 1102, memory 1103 and communication bus 1104, wherein place
Device 1101, communication interface 1102 are managed, memory 1103 completes mutual communication by communication bus 1104;
Memory 1103, for storing computer program;
Processor 1101 when for executing the computer program, realizes above method step.
Processor 1101 realizes following steps when executing the computer program: obtaining code key according to ESAM information and negotiates number
According to packet;Encryption code key vector data packet is obtained according to the code key negotiation data packet;To the encryption code key vector data packet into
Row decryption processing obtains decryption code key vector data packet;Target packet is obtained according to the decryption code key vector data packet.
Electronic equipment provided in an embodiment of the present invention can execute above method embodiment, realization principle and technology effect
Seemingly, details are not described herein for fruit.
Embodiment five
Another embodiment of the invention provides a kind of computer readable storage medium, is stored thereon with computer journey
Sequence, above-mentioned computer program perform the steps of when being executed by processor
Code key negotiation data packet is obtained according to ESAM information;
Encryption code key vector data packet is obtained according to the code key negotiation data packet;
The encryption code key vector data packet is decrypted to obtain decryption code key vector data packet;
Target packet is obtained according to the decryption code key vector data packet.
Computer readable storage medium provided in an embodiment of the present invention can execute above method embodiment, realize former
Reason is similar with technical effect, and details are not described herein.
It will be understood by those skilled in the art that embodiments herein can provide as method, apparatus (equipment) or computer journey
Sequence product.Therefore, complete hardware embodiment, complete software embodiment or combining software and hardware aspects can be used in the application
They are all referred to as " module " or " system " by the form of embodiment here.Moreover, the application can be used it is one or more its
In include computer usable program code computer-usable storage medium (including but not limited to magnetic disk storage, CD-ROM,
Optical memory etc.) on the form of computer program product implemented.Computer program is stored/distributed in suitable medium,
There is provided together with other hardware or as hardware a part, can also use other distribution forms, such as by Internet or
Other wired or wireless telecommunication systems.
In the description of the present invention, term " first ", " second " are used for description purposes only, and should not be understood as instruction or dark
Show relative importance or implicitly indicates the quantity of indicated technical characteristic.The feature of " first ", " second " is defined as a result,
It can explicitly or implicitly include one or more of the features.In the description of the present invention, the meaning of " plurality " is two
It is a or more than two, unless otherwise specifically defined.
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show
The description of example " or " some examples " etc. means specific features, structure, material or spy described in conjunction with this embodiment or example
Point is included at least one embodiment or example of the invention.In the present specification, schematic expression of the above terms are not
It must be directed to identical embodiment or example.Moreover, particular features, structures, materials, or characteristics described can be in office
What can be combined in any suitable manner in one or more embodiment or examples.In addition, those skilled in the art can say this
Different embodiments or examples described in bright book are engaged and are combined.
The above content is a further detailed description of the present invention in conjunction with specific preferred embodiments, and it cannot be said that
Specific implementation of the invention is only limited to these instructions.For those of ordinary skill in the art to which the present invention belongs, exist
Under the premise of not departing from present inventive concept, a number of simple deductions or replacements can also be made, all shall be regarded as belonging to of the invention
Protection scope.
Claims (10)
1. a kind of method for obtaining electric energy meter data information characterized by comprising
Code key negotiation data packet is obtained according to ESAM information;
Encryption code key vector data packet is obtained according to the code key negotiation data packet;
The encryption code key vector data packet is decrypted to obtain decryption code key vector data packet;
Target packet is obtained according to the decryption code key vector data packet.
2. the method according to claim 1, wherein obtain code key negotiation data packet according to the ESAM information,
Include:
Deconsolidation process is carried out to the ESAM information according to the first data length, obtains several first pending datas;
The code key negotiation data packet is obtained according to several first pending datas.
3. the method according to claim 1, wherein according to the code key negotiation data packet obtain encryption code key to
Measure data packet, comprising:
Several negotiation response encryption datas are obtained according to the code key negotiation data packet;
Encryption code key vector data packet is obtained according to several negotiation response encryption datas.
4. the method according to claim 1, wherein the encryption code key vector data packet is decrypted
Obtain decryption code key vector data packet, comprising:
The encryption code key vector data packet is decrypted according to ESAM to obtain the decryption code key vector data packet.
5. the method according to claim 1, wherein obtaining number of targets according to the decryption code key vector data packet
According to packet, comprising:
The first identification data of the decryption code key vector data are removed, and the decryption code key vector data packet is split
Processing, obtains several decryption code key vector datas;
The target packet is obtained according to several decryption code key vector datas.
6. according to the method described in claim 5, it is characterized in that, being obtained according to several decryption code key vector datas described
Target packet, comprising:
The first target data to be processed is obtained according to several decryption code key vector datas;
Described first target data to be processed is encrypted to obtain the target packet.
7. according to the method described in claim 6, it is characterized in that, the described first target data to be processed is encrypted
Obtain the target data, comprising:
The described first target data to be processed is encrypted to obtain the target packet according to ESAM.
8. a kind of repeating installation characterized by comprising
Code key negotiation data packet obtains module, for obtaining code key negotiation data packet according to ESAM information;
Primary vector data packet handing module, for obtaining encryption code key vector data packet according to the code key negotiation data packet;
Secondary vector data packet handing module is decrypted for the encryption code key vector data packet to be decrypted
Code key vector data packet;
Target data processing module, for obtaining target packet according to the decryption code key vector data packet.
9. a kind of electronic equipment, which is characterized in that including processor, communication interface, memory and communication bus, wherein processing
Device, communication interface, memory complete mutual communication by communication bus;
Memory, for storing computer program;
Processor when for executing the computer program, realizes method and step as claimed in claim 1 to 7.
10. a kind of computer readable storage medium, which is characterized in that be stored with computer in the computer readable storage medium
Program, the computer program realize method and step as claimed in claim 1 to 7 when being executed by processor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910472000.4A CN110278077B (en) | 2019-05-31 | 2019-05-31 | Method, device, equipment and storage medium for acquiring data information of electric energy meter |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910472000.4A CN110278077B (en) | 2019-05-31 | 2019-05-31 | Method, device, equipment and storage medium for acquiring data information of electric energy meter |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110278077A true CN110278077A (en) | 2019-09-24 |
CN110278077B CN110278077B (en) | 2022-11-01 |
Family
ID=67960490
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910472000.4A Expired - Fee Related CN110278077B (en) | 2019-05-31 | 2019-05-31 | Method, device, equipment and storage medium for acquiring data information of electric energy meter |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110278077B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110765475A (en) * | 2019-10-24 | 2020-02-07 | 华立科技股份有限公司 | Virtual electric meter data encryption method, encryption device and encryption system |
CN112100473A (en) * | 2020-09-21 | 2020-12-18 | 工业互联网创新中心(上海)有限公司 | Crawler method based on application interface, terminal and storage medium |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070180227A1 (en) * | 2005-03-01 | 2007-08-02 | Matsushita Electric Works, Ltd. | Decryption apparatus for use in encrypted communications |
CN102074076A (en) * | 2011-01-19 | 2011-05-25 | 四川电力科学研究院 | Intelligent electric meter centralized recharging terminal and control method thereof |
CN102377566A (en) * | 2010-08-11 | 2012-03-14 | 北京融通高科科技发展有限公司 | Security processing device and system for electric meter data |
CN102682529A (en) * | 2012-05-09 | 2012-09-19 | 重庆市电力公司电力科学研究院 | Prepayment electric energy meter and information processing system |
US20140337614A1 (en) * | 2013-05-07 | 2014-11-13 | Imperva, Inc. | Selective modification of encrypted application layer data in a transparent security gateway |
CN105759237A (en) * | 2016-03-21 | 2016-07-13 | 国家电网公司 | Programmable control method for electric energy meter metering device clock timing |
US20180069699A1 (en) * | 2016-09-02 | 2018-03-08 | Blackberry Limited | Decrypting encrypted data on an electronic device |
CN108616604A (en) * | 2018-05-17 | 2018-10-02 | 深圳市新越微电子有限公司 | A kind of intelligent electric energy meter supplements repeating installation, ammeter communication system and the means of communication with money |
-
2019
- 2019-05-31 CN CN201910472000.4A patent/CN110278077B/en not_active Expired - Fee Related
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070180227A1 (en) * | 2005-03-01 | 2007-08-02 | Matsushita Electric Works, Ltd. | Decryption apparatus for use in encrypted communications |
CN102377566A (en) * | 2010-08-11 | 2012-03-14 | 北京融通高科科技发展有限公司 | Security processing device and system for electric meter data |
CN102074076A (en) * | 2011-01-19 | 2011-05-25 | 四川电力科学研究院 | Intelligent electric meter centralized recharging terminal and control method thereof |
CN102682529A (en) * | 2012-05-09 | 2012-09-19 | 重庆市电力公司电力科学研究院 | Prepayment electric energy meter and information processing system |
US20140337614A1 (en) * | 2013-05-07 | 2014-11-13 | Imperva, Inc. | Selective modification of encrypted application layer data in a transparent security gateway |
CN105759237A (en) * | 2016-03-21 | 2016-07-13 | 国家电网公司 | Programmable control method for electric energy meter metering device clock timing |
US20180069699A1 (en) * | 2016-09-02 | 2018-03-08 | Blackberry Limited | Decrypting encrypted data on an electronic device |
CN108616604A (en) * | 2018-05-17 | 2018-10-02 | 深圳市新越微电子有限公司 | A kind of intelligent electric energy meter supplements repeating installation, ammeter communication system and the means of communication with money |
Non-Patent Citations (4)
Title |
---|
YUANCHENG LI ET AL.: ""Lightweight Quantum Encryption for Secure Transmission of Power Data in Smart Grid"", 《IEEE ACCESS》 * |
卢炳德: "物联网数据通讯安全的研究", 《中国新通信》 * |
洪晓彬等: "大型多层次数据库外层数据传输同步加密仿真", 《计算机仿真》 * |
谢婉娟: "基于多路密钥协商的物联网安全通信方法", 《计算机与现代化》 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110765475A (en) * | 2019-10-24 | 2020-02-07 | 华立科技股份有限公司 | Virtual electric meter data encryption method, encryption device and encryption system |
CN112100473A (en) * | 2020-09-21 | 2020-12-18 | 工业互联网创新中心(上海)有限公司 | Crawler method based on application interface, terminal and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN110278077B (en) | 2022-11-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103729940B (en) | A kind of main cipher key T MK method for safely downloading of terminal and system | |
CN103503366B (en) | Manage the data for authenticating device | |
CN103001771B (en) | Data transmission security encryption method for metering automation system | |
CN110460439A (en) | Information transferring method, device, client, server-side and storage medium | |
CN102170357B (en) | Combined secret key dynamic security management system | |
CN206922808U (en) | A kind of intelligent automobile communication system and quantum car-mounted terminal based on quantum cryptography | |
CN106788977A (en) | Low-power consumption bluetooth device talk encryption method and system | |
CN107172056A (en) | A kind of channel safety determines method, device, system, client and server | |
CN105897784B (en) | Internet-of-things terminal equipment encryption communication method and device | |
CN113595744B (en) | Network access method, device, electronic equipment and storage medium | |
CN104365127A (en) | Method for tracking a mobile device onto a remote displaying unit | |
CN110446177A (en) | Communication means, the apparatus and system of Internet of Things gauge table | |
US9325670B2 (en) | Communication information transmitting process and system | |
CN110278077A (en) | A kind of method, apparatus for obtaining electric energy meter data information, electronic equipment and storage medium | |
CN107070874A (en) | System, encryption method and the device of broadcast communication, decryption method and device | |
CN109586924A (en) | A kind of intelligent distribution network data safe transmission method based on cloud computing | |
CN112672342A (en) | Data transmission method, device, equipment, system and storage medium | |
CN102571804A (en) | Internet of things center first login method based on product identification code | |
CN108848503A (en) | A kind of smart home dynamic encryption means of communication and system transmitted using merogenesis | |
CN103139737A (en) | Method and device for key negotiation, method, system and device for short message second-time confirmation | |
CN103384233B (en) | A kind of methods, devices and systems for acting on behalf of conversion | |
CN110248362A (en) | A kind of method, apparatus being used for transmission electric energy meter data information, electronic equipment and storage medium | |
CN103997483B (en) | A kind of information security control method, device and electronic equipment | |
CN110381011A (en) | A kind of method and apparatus for realizing logistics equipment secure communication | |
CN102761417A (en) | Method for processing data transmission of terminals and terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20221101 |