CN111131156A - Data reading method and device, metering equipment and server - Google Patents
Data reading method and device, metering equipment and server Download PDFInfo
- Publication number
- CN111131156A CN111131156A CN201911139709.9A CN201911139709A CN111131156A CN 111131156 A CN111131156 A CN 111131156A CN 201911139709 A CN201911139709 A CN 201911139709A CN 111131156 A CN111131156 A CN 111131156A
- Authority
- CN
- China
- Prior art keywords
- data
- metering
- beacon information
- encrypted data
- timestamp
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D10/00—Energy efficient computing, e.g. low power processors, power management or thermal management
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Arrangements For Transmission Of Measured Signals (AREA)
- Selective Calling Equipment (AREA)
- Telephonic Communication Services (AREA)
Abstract
The embodiment of the specification discloses a data reading method and device, metering equipment and a server. The method comprises the steps that metering data on metering equipment are obtained, first encrypted data are generated on the basis of the metering data, an identification mark and a first timestamp, and then beacon information comprising the metering data, the first encrypted data and the identification mark is sent to terminal equipment; the terminal equipment sends the received beacon information to a server; and the server generates second encrypted data based on the identification identifier, the metering data and a corresponding second timestamp when the beacon information is received, compares the second encrypted data with the first encrypted data, and records the metering data when the comparison result meets the recording requirement. The data reading implementation scheme provided by the method can realize reading of the device data with low power consumption, low cost, high efficiency and high safety.
Description
Technical Field
The embodiment scheme of the specification belongs to the technical field of data processing, and particularly relates to a data reading method and device, metering equipment and a server.
Background
The reading of the meter can provide important reference for charging and allocating resources and the like of related departments. The traditional manual meter reading mode is mainly used for obtaining the readings of the meters in many areas, however, the manual meter reading mode not only needs workers to read the meters by logging in a home, but also needs light rays and climbing height, and therefore the problems of large workload, low working efficiency and the like can be caused.
With the development of science and technology, the traditional manual household-by-household meter reading mode is gradually replaced by automatic meter reading. The automatic meter reading does not need manual participation, the reading of the meter is mainly obtained through the collector connected with the meter, then the collector sends the obtained reading to the concentrator, and the concentrator collects the reading of the managed meter and then sends the reading to the data management center. Therefore, the automatic meter reading can read the information of the electric meters, the water meters, the gas meters, the heat meters and other meters of a plurality of users at one time, and the meter reading is quick and convenient. However, in the automatic meter reading process, the data acquired by the collector is sent to the concentrator, and the collected readings of the meters are sent to the data management center by the concentrator, which may be maliciously tampered, so that the finally acquired data is not real data.
Therefore, there is a need for a solution that can efficiently and safely obtain meter data.
Disclosure of Invention
The embodiment of the specification aims to provide a data reading method, a data reading device, metering equipment and a server, and the data reading of the equipment can be completed with low power consumption, low cost, high efficiency and high safety.
The data reading method, the data reading device, the metering equipment and the server provided by the embodiment of the specification are realized in the following modes:
a method of data reading, the method comprising:
the method comprises the steps of obtaining metering data on metering equipment, and generating first encrypted data based on the metering data, an identification mark and a first timestamp, wherein the first timestamp comprises the corresponding time when the metering equipment obtains the metering data;
the metering equipment sends beacon information to terminal equipment, wherein the beacon information comprises the metering data, the first encryption data and the identification mark;
the terminal equipment sends the beacon information to a server;
the server generates second encrypted data based on the identification identifier, the metering data and a corresponding second timestamp when the beacon information is received;
and the server compares the second encrypted data with the first encrypted data, and records the metering data when the comparison result meets the recording requirement.
A method of data reading, the method comprising:
receiving beacon information, wherein the beacon information comprises metering data, first encrypted data and an identification mark, the first encrypted data is generated based on the metering data, the identification mark and a first timestamp, and the first timestamp comprises time corresponding to metering data acquired by metering equipment;
generating second encrypted data based on the identification identifier, the metering data and a corresponding second timestamp when the beacon information is received;
and comparing the second encrypted data with the first encrypted data, and recording the metering data when the comparison result meets the recording requirement.
A method of data reading, the method comprising:
acquiring metering data, and generating first encrypted data based on the metering data, an identification mark and a first timestamp, wherein the first timestamp comprises corresponding time when metering equipment acquires the metering data;
and sending beacon information to a server, wherein the beacon information comprises the metering data, the first encrypted data and the identification identifier, so that the server generates second encrypted data based on the identification identifier, the metering data and a second timestamp corresponding to the beacon information, and records the metering data when the comparison result of the second encrypted data and the first encrypted data meets the recording requirement.
A data reading apparatus, the apparatus comprising:
the receiving module is used for receiving beacon information, wherein the beacon information comprises metering data, first encrypted data and an identification mark, the first encrypted data is generated based on the metering data, the identification mark and a first timestamp, and the first timestamp comprises time corresponding to the metering data acquired by metering equipment;
the first generating module is used for generating second encrypted data based on the identification identifier, the metering data and a corresponding second timestamp when the beacon information is received;
and the comparison module is used for comparing the second encrypted data with the first encrypted data and recording the metering data when the comparison result meets the recording requirement.
A data reading apparatus, the apparatus comprising:
the second generation module is used for acquiring metering data and generating first encrypted data based on the metering data, the identification mark and a first timestamp, wherein the first timestamp comprises the time corresponding to the metering data acquired by the metering equipment;
and the sending module is used for sending beacon information to a server, wherein the beacon information comprises the metering data, the first encrypted data and the identification identifier, so that the server generates second encrypted data based on the identification identifier, the metering data and a second timestamp corresponding to the beacon information when receiving the beacon information, and records the metering data when determining that a comparison result of the second encrypted data and the first encrypted data meets a recording requirement.
A server comprising a processor and a memory for storing processor-executable instructions that when executed by the processor implement:
receiving beacon information, wherein the beacon information comprises metering data, first encrypted data and an identification mark, the first encrypted data is generated based on the metering data, the identification mark and a first timestamp, and the first timestamp comprises time corresponding to metering data acquired by metering equipment;
generating second encrypted data based on the identification identifier, the metering data and a corresponding second timestamp when the beacon information is received;
and comparing the second encrypted data with the first encrypted data, and recording the metering data when the comparison result meets the recording requirement.
A metering device comprising a processor and a memory for storing processor-executable instructions that when executed by the processor implement:
acquiring metering data, and generating first encrypted data based on the metering data, an identification mark and a first timestamp, wherein the first timestamp comprises corresponding time when metering equipment acquires the metering data;
and sending beacon information to a server, wherein the beacon information comprises the metering data, the first encrypted data and the identification identifier, so that the server generates second encrypted data based on the identification identifier, the metering data and a second timestamp corresponding to the beacon information, and records the metering data when the comparison result of the second encrypted data and the first encrypted data meets the recording requirement.
A data reading system comprises a metering device and a server,
the metering equipment acquires metering data, generates first encrypted data based on the metering data, an identification mark and a first timestamp, and sends beacon information to a server, wherein the first timestamp comprises the time corresponding to the metering data acquired by the metering equipment, and the beacon information comprises the metering data, the first encrypted data and the identification mark;
and the server receives the beacon information, generates second encrypted data based on the identification identifier, the metering data and a corresponding second timestamp when the beacon information is received, compares the second encrypted data with the first encrypted data, and records the metering data when the comparison result meets the recording requirement.
A method of data reading, the method comprising:
the method comprises the steps of obtaining metering data on metering equipment, and generating first encrypted data based on the metering data, an identification mark and a first timestamp, wherein the first timestamp comprises the corresponding time when the metering equipment obtains the metering data;
the metering equipment sends beacon information to a server, wherein the beacon information comprises the metering data, the first encryption data and the identification mark;
the server generates second encrypted data based on the identification identifier, the metering data and a corresponding second timestamp when the beacon information is received;
and the server compares the second encrypted data with the first encrypted data, and records the metering data when the comparison result meets the recording requirement.
The embodiment of the specification provides a data reading method and device, metering equipment and a server. In some embodiments, the metering device encrypts its metering data and broadcasts the encrypted metering data, and the server, after receiving the information, encrypts the metering data based on the corresponding information and compares the encrypted metering data with the received encrypted metering data. Therefore, metering data of each metering device can be obtained without visual observation or door-to-door observation of meter reading personnel, so that the authenticity of data recorded by a server can be guaranteed, the problem of malicious tampering in the data transmission process can be effectively solved, and the safety of data reading is improved.
Drawings
In order to more clearly illustrate the embodiments of the present specification or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, it is obvious that the drawings in the following description are only some embodiments described in the present specification, and for those skilled in the art, other drawings can be obtained according to the drawings without any creative effort.
Fig. 1 is a schematic diagram of a scenario of a data reading method provided in the present specification;
FIG. 2 is a schematic flow chart diagram of an embodiment of the data reading method provided in the present specification;
FIG. 3 is a flow chart of another embodiment of the data reading method provided in the present specification;
FIG. 4 is a schematic flow chart diagram of one embodiment of a method that may be used on one side of a metrology tool provided herein;
FIG. 5 is a flow diagram of one embodiment of a method that may be used on the server side as provided by the present description;
FIG. 6 is a block diagram of a hardware structure of a server for data reading in an embodiment of the present specification;
FIG. 7 is a block diagram of an embodiment of a data reading apparatus that can be used on the server side;
fig. 8 is a schematic block diagram of an embodiment of a data reading apparatus that can be used on one side of a metering device.
Detailed Description
In order to make those skilled in the art better understand the technical solutions in the present specification, the technical solutions in the embodiments of the present specification will be clearly and completely described below with reference to the drawings in the embodiments of the present specification, and it is obvious that the described embodiments are only a part of the embodiments in the present specification, and not all of the embodiments. All other embodiments that can be derived by a person skilled in the art from one or more of the embodiments described herein without making any inventive step shall fall within the scope of protection of the embodiments described herein.
One embodiment provided by the present description may be applied to a system architecture of a metering device/terminal device/server. The metering device may include a device which needs to read its own data, such as a water meter, an electric meter or a gas meter. The metering device can comprise a communication module, can be connected with a terminal device through Bluetooth or WiFi and can perform data transmission, and can also be in communication connection with a remote server to realize data transmission with the server. The terminal device can comprise a communication module, can be connected with the metering device through Bluetooth or WiFi and can carry out data transmission, and can also be in communication connection with a remote server to realize data transmission with the server. The terminal device may include a mobile terminal, such as a smart phone or a tablet computer. The server may include a single computer device, or may include a server cluster composed of a plurality of servers, or a server structure of a distributed system. The server, the metering device and the terminal device described in the embodiments of the present specification include different information processing parties logically divided.
As shown in fig. 1, fig. 1 is a schematic view of a scenario of a data reading method provided in this specification. The metering equipment such as the water meter, the electric meter or the gas meter and the terminal equipment such as the smart phone or the tablet personal computer comprise a Bluetooth module, the metering equipment and the terminal equipment can be connected and data transmitted through Bluetooth, and the metering equipment is in a slave mode and is used for broadcasting beacon information. The terminal equipment can be in communication connection with a remote server, so that data transmission with the server is achieved. In some implementation scenarios, when data in the metering device needs to be acquired, the metering device can encrypt the metering data of the metering device and then broadcast the data in a bluetooth mode, the terminal device can establish communication connection with the metering device within a preset distance range and when a matching instruction of a specified application is triggered, then the received beacon information is collected and sent to the server, the server performs corresponding verification after receiving the collected information, and the metering data is recorded after the verification is passed. Like this, need not meter reading personnel naked eye observation or visit the door and observe, alright in order to obtain each metering device's measurement data to when can guaranteeing the authenticity of the data of server record, can effectively solve the problem of being maliciously falsified among the data transmission process, improve the security that data read.
The following describes an embodiment of the present disclosure with a specific application scenario as an example. Specifically, fig. 2 is a schematic flow chart of an embodiment of the data reading method provided in this specification. Although the present specification provides the method operation steps or apparatus structures as shown in the following embodiments or figures, more or less operation steps or module units after partial functions are combined in the method or apparatus may be included based on conventional or non-inventive labor. In the case of steps or structures which do not logically have the necessary cause and effect relationship, the execution order of the steps or the block structure of the apparatus is not limited to the execution order or the block structure shown in the embodiments or the drawings of the present specification. When the described method or module structure is applied to a device, a server or an end product in practice, the method or module structure according to the embodiment or the figures may be executed sequentially or in parallel (for example, in a parallel processor or multi-thread processing environment, or even in an implementation environment including distributed processing and server clustering).
It should be noted that the following description of the embodiments of metering device/terminal device/server interaction does not limit the technical solutions in other extensible application scenarios based on the present specification. In a specific embodiment, as shown in fig. 2, in an embodiment of a data reading method provided in this specification, the method may include:
s10: the method comprises the steps of obtaining metering data on metering equipment, and generating first encrypted data based on the metering data, an identification mark and a first timestamp, wherein the first timestamp comprises corresponding time when the metering equipment obtains the metering data.
The metering device may include a device which needs to read its own data, such as a water meter, an electric meter or a gas meter. The metering device can comprise a communication module, can be connected with a terminal device through Bluetooth or WiFi and can perform data transmission, and can also be in communication connection with a remote server to realize data transmission with the server. The metering data comprises data to be read on the metering equipment, such as water consumption, electricity consumption, gas consumption and the like. The identification mark may include a mark for distinguishing different devices (hereinafter, may be simply referred to as "device unique mark"), a device number, and the like. The timestamp may uniquely identify the time of a moment. The first timestamp may include a time corresponding to when the metering device acquired the metering data. It should be noted that the device unique identifier of the same device may be kept unchanged, and the device number may be changed.
In one embodiment of the present description, the metering device may include broadcast firmware, an encryption module, and a data reading module. The data reading module may be configured to obtain current data (e.g., metering data, time stamp, etc.) of the metering device. The encryption module can be used for encrypting the data read by the data module. The broadcast firmware may be configured to broadcast the data processed by the encryption module, and the broadcast firmware may be BLE (Bluetooth low energy) broadcast firmware or WiFi firmware. The encryption processing algorithm may include a One-Time Password (OTP) algorithm, a HMAC-based One-Time Password (HOTP) algorithm encrypted based on a Hashed Message Authentication Code (HMAC) algorithm, and the like. In some implementations, the OTP, HOTP, etc. algorithms may generate a time-dependent, unpredictable combination of random numbers at intervals according to a specialized algorithm, each password being used only once. In some implementation scenarios, the OTP and the HOTP may include a time window mechanism, and the information encrypted by the OTP and the HOTP is valid for a preset time period and invalid after exceeding the preset time period.
It should be noted that in some implementation scenarios, the metering data may be acquired by a data reading module included in the metering device, may also be acquired by an intelligent chip, may also be acquired by the metering device equipped with the intelligent chip, and may also be acquired by other manners. In the embodiments and the drawings of this specification, the example of obtaining the self-metering data by the metering device is schematically illustrated, and other manners are similar and will not be described again.
In this embodiment of the present specification, in order to safely and effectively provide the metering data of the metering device to the server, so that the server accurately records the metering data, and accurately counts the usage of each owner of the household according to the recorded metering data, each metering device may read its own metering data, and then generate corresponding encrypted data according to the device unique identifier included in its own identification identifier, the metering data, and the time corresponding to the reading of the metering data.
In some implementations, the metering device may be an electricity meter. For example, in a certain building of a cell, a plurality of owners are provided, and each owner corresponds to an electric meter, and the electric meter comprises BLE broadcasting firmware, an OTP encryption module and a data reading module. When the staff needs to acquire the current ammeter data, the staff can trigger a matching instruction of a designated application on the mobile terminal within a preset distance range of the metering device to send a request for acquiring the current ammeter data to the ammeter, the ammeter can acquire the current ammeter reading and the corresponding time through the data reading module after receiving the request, and then the ammeter reading, the unique identifier of the ammeter and the corresponding time are generated into first encrypted data through the OTP encryption module. Since the electricity meter data according to which the corresponding first encrypted data is generated is directly read, it can be ensured that the electricity meter data is authentic.
It should be noted that, the identification identifier of the beacon information may include not only a unique identifier for distinguishing different devices, but also a device number. Therefore, in some embodiments, in order to prevent the transmitted data from being maliciously tampered and ensure the security of the transmitted data, the metering device may use the unique identifier of the device included in the identification identifier when encrypting the acquired data. In some implementation scenarios, the metering device, the terminal device, and the server may perform real-time communication, so that when the metering device acquires the metering data, the terminal device and the server may acquire and store corresponding time. It should be noted that the terminal device and the server may acquire the corresponding time in any manner known by those skilled in the art, and this description does not limit this.
S12: and the metering equipment sends beacon information to terminal equipment, wherein the beacon information comprises the metering data, the first encryption data and the identification mark.
The identification may include a device unique identifier, a device number, etc.
In an embodiment of the present specification, after the metering devices generate the respective corresponding first encrypted data, the metering devices may broadcast the metering data, the encrypted data, and the identification identifier via their own bluetooth or WiFi networks.
In an embodiment of the present specification, the sending, by the metering device, the beacon information to the terminal device may include: the method comprises the steps that when the terminal equipment is within a preset distance range of the metering equipment and/or based on a matching instruction of a designated application on a trigger terminal, communication connection between the metering equipment and the terminal equipment is established; and the metering equipment sends the beacon information to the terminal equipment. The condition for establishing the communication connection between the metering device and the terminal device may include that the terminal device is within a preset distance range of the metering device or a matching instruction for triggering a specified application on the terminal device, or that the terminal device is within the preset distance range of the metering device and a matching instruction for triggering the specified application on the terminal device, and the like. It should be noted that the condition for establishing the communication connection may also include other conditions, which are not limited in this specification.
For example, in one implementation scenario, a meter reading worker may start a metering app (application) on a smartphone used, and then may receive information broadcast by a metering device by clicking a "data receiving" control on the metering app to establish a communication connection with the metering device. In another implementation scenario, a meter reading worker may start a metering app (application) on a smart phone used within a preset distance range of the metering device, and then establish a communication connection with the metering device by clicking a "data receiving" control on the metering app, so as to receive information broadcast by the metering device.
In some embodiments, the terminal device may summarize the received information after receiving the metering data, the encrypted data, and the identification. For example, a meter reading worker starts a metering app on a used smart phone, clicks a "data receiving" control on the metering app to establish communication connection with metering devices, and receives information broadcast by each metering device, and then can collect the received information. For example, in some implementation scenarios, after receiving the metering data, the encrypted data, and the identification mark, the terminal device may collect the metering data, the encrypted data, and the identification mark according to a time interval, or according to location information corresponding to the metering device, or according to a quantity. For example, after receiving the metering data, the encrypted data, and the identification mark, the terminal device may collect information belonging to the same cell, or collect the received information once when the number of the received information is 100, or collect the received information within a week, or the like.
It should be noted that, the identification identifier of the beacon information may include not only a unique identifier for distinguishing different devices, but also a device number and the like. Therefore, in some embodiments, in order to prevent the transmitted data from being maliciously tampered and ensure the security of the transmitted data, the identification identifier included in the beacon information is the device number when the metering device broadcasts. In addition, the information broadcasted by the metering device includes metering data, first encrypted data, and a device number, which is only an exemplary description, and the information broadcasted by the metering device may also include other information, which is not limited in this specification.
S20: and the terminal equipment sends the beacon information to a server.
In an embodiment of the present description, after the metering device sends the beacon information to the terminal device, the terminal device may summarize the beacon information and send the summarized beacon information to the server. In some embodiments, the terminal device may send the beacon information to the server when a preset sending requirement is met. The preset sending requirement may include that the number of the beacon information received by the terminal device reaches a preset number, or the terminal device receives one beacon information and sends the beacon information to the server, or the terminal device sends the beacon information after checking all the beacon information, or the beacon information is sent at regular time, for example, once every hour.
In an embodiment of the present specification, the terminal device may be a mobile terminal, and accordingly, the sending the beacon information to the terminal device, and the sending the beacon information to the server by the terminal device may include: the method comprises the steps that when the mobile terminal is within a preset distance range of metering equipment and/or based on a matching instruction for triggering a designated application on the mobile terminal, communication connection between the metering equipment and the mobile terminal is established; the metering equipment sends the beacon information to the mobile terminal; and when the mobile terminal meets the preset sending requirement, the beacon information is sent to a server.
In some embodiments, when the information received by the terminal device includes the metering data, the first encrypted data, and the device number in the identification, the terminal device may summarize the received information according to the device number and send the summarized information to the server.
In another embodiment provided by this specification, the terminal device may store information related to each metering device, such as an identification identifier in advance, where a device number in the identification identifier stored in advance and a device unique identifier may be set to be associated with each other in advance. After receiving the beacon information, the terminal device may further include:
s200: generating third encrypted data based on the metering data, the identification mark and a corresponding third timestamp when the beacon information is received;
s202: and comparing the third encrypted data with the first encrypted data, and recording the metering data when the comparison result meets the recording requirement.
In some embodiments, the beacon information may include the metering data, the first encryption data, and the identification. In other embodiments, the beacon information may include other information, such as third encrypted data, in addition to the metering data, the first encrypted data, and the identification. In some embodiments, meeting the recording requirement may include the comparison result being within a preset error range, or the comparison results being the same, or the like.
In order to improve the security of data transmission, in some embodiments, when the information received by the terminal device includes the metering data, the first encrypted data, and the device number in the identification identifier, the terminal device may search, in the pre-stored information, for the device corresponding to the device number, obtain the unique identifier of the device, encrypt, by an encryption method, the metering data, the unique identifier of the device, and the third timestamp corresponding to when the beacon information is received, obtain third encrypted information, compare, by the terminal device, the third encrypted data with the first encrypted data, and when a comparison result meets a record requirement, indicate that the received metering data of the metering device is the same as the metering data based on which the first encrypted data was generated, so as to indicate that the received metering data of the metering device is authentic, and finally, the metering data, the identification mark and the first encrypted data can be sent to a server, so that the safety of data transmission is improved.
In other embodiments, when the information received by the terminal device includes the metering data, the first encrypted data, and the device number in the identification identifier, the terminal device may search for the device corresponding to the device number from the pre-stored information, obtain the unique identifier of the device, encrypt the metering data, the unique identifier of the device, and the third timestamp corresponding to the beacon information received by the encryption method to obtain third encrypted information, then the terminal device compares the third encrypted data with the first encrypted data, and when the comparison result does not meet the record requirement, it indicates that the received metering data of the metering device is different from the metering data based on which the first encrypted data was generated, so that it may indicate that the received metering data of the metering device is not authentic, and at this time, the unreal condition may be fed back to the relevant technical person, to enhance the security of the data transmission process.
In other embodiments, when the information received by the terminal device includes the metering data, the first encrypted data, and the device number in the identification identifier, the terminal device may search for a device corresponding to the device number in the pre-stored information, acquire a unique identifier of the device, encrypt the metering data, the unique identifier of the device, and a third timestamp corresponding to the time when the beacon information is received by using an encryption method, acquire third encrypted information, and then send the metering data, the identification identifier, the first encrypted data, and the third encrypted data to the server, so that the server performs further verification, thereby improving the security of data transmission.
It should be noted that, in some embodiments, the third timestamp may be a time corresponding to when the terminal device receives the beacon information. The third timestamp may be in the same time window or a predetermined time window period as the first timestamp used in generating the first encrypted data. For example, if the preset time window is 60 seconds, and the time taken to generate the first encrypted data is 16 hours, 12 minutes and 24 seconds, the third timestamp may be between 16 hours, 12 minutes and 24 seconds, and 16 hours, 13 minutes and 24 seconds.
The encryption method may be the same as the encryption method used by the metering device or may be different from the encryption method used by the metering device, and this is not limited in the present specification.
S30: and the server generates second encrypted data based on the identification identifier, the metering data and a corresponding second timestamp when the beacon information is received.
In some embodiments, the second timestamp and the first timestamp may be within the same time window or a preset time window.
In an embodiment of the present specification, the server may store the identification of each metering device in advance. The identification may include a device unique identifier, a device number, etc. Wherein, the device number and the device unique identification can be correlated with each other in advance. The second timestamp may include a time corresponding to when the server received the beacon information. The time window may represent a preset time period. The second timestamp and the first timestamp may be understood to be in the same time window: the first time stamp is used as a starting time, the sum of the starting time and the preset time period is used as an ending time, and the second time stamp can be between the starting time and the ending time. In some embodiments, the second timestamp is in the same time window as the first timestamp, which can prevent data from being tampered.
In an embodiment of the present specification, since there may be a case where the metering data is maliciously fictitious or tampered during the information broadcasting and data transmission, after receiving the beacon information, the server may encrypt the metering data, the device unique identifier in the identification identifier, and the corresponding time by using an encryption algorithm, so as to obtain encrypted data.
In some embodiments, since the identification received by the server includes a device number, in order to ensure data security, a device unique identifier corresponding to the device number may be obtained. For example, in some implementation scenarios, the server may store the identification identifier of each metering device in advance, and the device number included in the identification identifier is associated with the unique device identifier, and when the identification identifier received by the server includes the device number, the server may search for the corresponding unique device identifier according to the device number included in the beacon information, and then encrypt the metering data, the searched unique device identifier, and the corresponding time by using an encryption algorithm to obtain second encrypted data.
In other embodiments, in order to ensure the security of the data, after the server receives the beacon information, the server may first search for the corresponding unique device identifier in the server according to the device number in the identification identifier, then compare the searched unique device identifier with the unique device identifier included in the received beacon information, and encrypt the metering data, the unique device identifier in the identification identifier, and the corresponding time through an encryption algorithm if the two are the same, so as to obtain second encrypted data. In some embodiments, if the found device unique identifier is different from the device unique identifier included in the received beacon information, the device unique identifier may be fed back to the relevant technical staff to enhance the security of the data transmission process.
The encryption method may be an encryption method used by the metering device, or may be a method different from the encryption method used by the metering device, and this is not limited in the present specification.
S32: and the server compares the second encrypted data with the first encrypted data, and records the metering data when the comparison result meets the recording requirement.
In some embodiments, the server, after generating the second encrypted data, compares the second encrypted data with previously received encrypted data to determine whether the received metering data is tampered, thereby improving the security of data transmission. The meeting of the recording requirement may include that the comparison result is within a preset error range, or the comparison results are the same, or other requirements, etc.
In one embodiment of the present specification, when the server receives the beacon information and generates the second encrypted data based on the related information, the second encrypted data may be compared with the first encrypted data included in the received beacon information. If the comparison result meets the recording requirement, the received metering data of the metering device is indicated to be the same as the metering data based on which the first encrypted data is generated, so that the received metering data of the metering device can be indicated to be real, and the server can record the metering data of the metering device. Otherwise, it indicates that the received metering data of the metering device is not the same as the metering data on which the first encrypted data is generated, so that it may indicate that the received metering data of the metering device may be maliciously fictitious or tampered in the previous data transmission process, and is not authentic.
In some embodiments, when the server receives the metering data, the identification, the first encrypted data, and the third encrypted data, the second encrypted data may be compared to the received first encrypted data and the third encrypted data. When the comparison result of the second encrypted data, the first encrypted data and the third encrypted data meets the recording requirement, it is indicated that the received metering data of the metering device is the same as the metering data based on which the first encrypted data is generated, so that it can be indicated that the received metering data of the metering device is real, and the server can record the metering data of the metering device.
It should be noted that, when the received metering data of the metering device may be maliciously fabricated or tampered in the previous data transmission process, the server may feed back the unreal situation to the relevant technical personnel to enhance the security of the data transmission process. Therefore, the metering data of each metering device can be acquired without the visual observation of a meter reading person, and the authenticity of the data recorded by the server can be ensured.
This specification also provides another scenario example. For example, in practical applications, there are multiple owners in a building in a cell, each owner corresponds to a metering device, and an intelligent summary table may be set in the building. Each metering device can broadcast in a Bluetooth mode after reading respective metering data and generating corresponding first encrypted data, the intelligent summary table can summarize after scanning and receiving information broadcasted by the metering device, then the summarized information is sent to the server through communication connection established with the server, and the server verifies the received information, so that real data of the metering device can be obtained. Therefore, meter reading personnel do not need to observe by naked eyes or by visiting, metering data of each metering device can be obtained, and authenticity of data recorded by the server is guaranteed. The metering device and the intelligent summary table can comprise a Bluetooth module and/or a WiFi module, connection and data transmission can be carried out between the metering device and the intelligent summary table through a Bluetooth or WiFi network, and the metering device is in a slave mode and is used for broadcasting information. In addition, the intelligent summary table can also comprise a remote communication module which can be in communication connection with a remote server to realize data transmission with the server.
In the data reading method provided in the embodiments of the present specification, the metering device may encrypt its own metering data and broadcast the encrypted metering data in a bluetooth manner, and the server encrypts the metering data based on corresponding information after receiving the information, and compares the encrypted metering data with the received encrypted metering data. Like this, need not meter reading personnel naked eye observation or visit the door and observe, alright in order to obtain each metering device's measurement data to when can guaranteeing the authenticity of the data of server record, can effectively solve the problem of being maliciously falsified among the data transmission process, improve the security that data read.
The above embodiments describe implementations of the data reading method from the perspective of a metering device/terminal device/server interaction. Based on the above description of the embodiments, the present specification further provides a data reading method applicable to angle description of metering device/server interaction. Fig. 3 is a schematic flow chart of another embodiment of the data reading method provided in this specification. Specifically, in an embodiment, the method may include:
s40: the method comprises the steps of obtaining metering data on metering equipment, and generating first encrypted data based on the metering data, an identification mark and a first timestamp, wherein the first timestamp comprises the corresponding time when the metering equipment obtains the metering data;
s42: the metering equipment sends beacon information to a server, wherein the beacon information comprises the metering data, the first encryption data and the identification mark;
s50: the server generates second encrypted data based on the identification identifier, the metering data and a corresponding second timestamp when the beacon information is received;
s52: and the server compares the second encrypted data with the first encrypted data, and records the metering data when the comparison result meets the recording requirement.
The metering device can comprise a Bluetooth module and a WiFi module, and is in a slave mode for broadcasting information. In addition, the metering equipment can also comprise a remote communication module which can be in communication connection with a remote server to realize data transmission with the server.
In an embodiment of the present specification, after reading respective metering data and generating corresponding first encrypted data, each metering device may broadcast through a bluetooth or WiFi network, and after scanning and receiving information broadcast by the metering device, the server may verify the received information, thereby obtaining real data of the metering device. Therefore, the meter reading personnel do not need to observe by naked eyes or by visiting, and the terminal equipment does not need to perform corresponding processing, so that the metering data of each metering equipment can be acquired, the authenticity of the data recorded by the server is ensured, and the safety of data reading is improved.
In the present specification, each embodiment of the method is described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. Reference is made to the description of the method embodiments.
The above embodiments describe implementations of the data reading method from the perspective of a metering device/terminal device/server interaction. Based on the above description of the embodiments, the present specification further provides a data reading method that can be applied to a metering device side. FIG. 4 is a flow diagram of one embodiment of a method that may be used on one side of a metrology device as provided herein. Specifically, in an embodiment, the method may include:
s60: acquiring metering data, and generating first encrypted data based on the metering data, an identification mark and a first timestamp, wherein the first timestamp comprises corresponding time when metering equipment acquires the metering data;
s62: and sending beacon information to a server, wherein the beacon information comprises the metering data, the first encrypted data and the identification identifier, so that the server generates second encrypted data based on the identification identifier, the metering data and a second timestamp corresponding to the beacon information, and records the metering data when the comparison result of the second encrypted data and the first encrypted data meets the recording requirement.
In some embodiments, the sending of the beacon information to the terminal device may be performed by using a bluetooth or WiFi network.
In some embodiments, the sending beacon information to the server may include: and sending the beacon information to terminal equipment, and sending the beacon information to a server by the terminal equipment. In other embodiments, the terminal device may be a mobile terminal, and accordingly, the sending the beacon information to the terminal device, and the sending the beacon information to the server by the terminal device may include: the method comprises the steps that when the mobile terminal is within a preset distance range of metering equipment and/or based on a matching instruction for triggering a designated application on the mobile terminal, communication connection between the metering equipment and the mobile terminal is established; the metering equipment sends the beacon information to the mobile terminal; and when the mobile terminal meets the preset sending requirement, the beacon information is sent to a server.
For one side of the metering device, when a user or a worker triggers a corresponding instruction, the metering device may start to acquire corresponding metering data based on the instruction, generate first encrypted data based on the metering data, an identification identifier and a timestamp, and then broadcast corresponding information, so that the server generates second encrypted data based on the received information and compares the second encrypted data to determine whether the received metering data is real data obtained by the metering device, thereby preventing malicious tampering or falsification in the data transmission process.
In the present specification, each embodiment of the method is described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. Reference is made to the description of the method embodiments.
The above embodiments describe implementations of the data reading method from the perspective of a metering device/terminal device/server interaction. Based on the above description of the embodiments, the present specification further provides a data reading method that can be applied to the server side. FIG. 5 is a flow diagram of one embodiment of a method that may be used on the server side as provided by the present description. Specifically, in an embodiment, the method may include:
s70: receiving beacon information, wherein the beacon information comprises metering data, first encrypted data and an identification mark, the first encrypted data is generated based on the metering data, the identification mark and a first timestamp, and the first timestamp comprises time corresponding to metering data acquired by metering equipment;
s72: generating second encrypted data based on the identification identifier, the metering data and a corresponding second timestamp when the beacon information is received;
s74: and comparing the second encrypted data with the first encrypted data, and recording the metering data when the comparison result meets the recording requirement.
In an embodiment of this specification, the beacon information received by the server may be directly sent by the metering device, or may be forwarded by another terminal device.
In the data reading method provided in the embodiment of the present specification, the metering device encrypts its own metering data and broadcasts the encrypted data in a bluetooth manner, and the server encrypts the encrypted data based on the corresponding information after receiving the information and compares the encrypted data with the received encrypted data. Like this, need not meter reading personnel naked eye observation or visit the door and observe, alright in order to obtain each metering device's measurement data to when can guaranteeing the authenticity of the data of server record, can effectively solve the problem of being maliciously falsified among the data transmission process, improve the security that data read.
The method provided by the embodiment of the application can be executed in a mobile terminal, a computer terminal, a server or a similar operation device. Taking an example of the data reading method running on a server, fig. 6 is a hardware structure block diagram of a server for data reading in an embodiment of this specification. As shown in fig. 6, the server 10 may include one or more (only one shown) processors 102 (the processors 102 may include, but are not limited to, a processing device such as a microprocessor MCU or a programmable logic device FPGA, etc.), a memory 104 for storing data, and a transmission module 106 for communication functions. It will be understood by those skilled in the art that the structure shown in fig. 6 is only an illustration and is not intended to limit the structure of the electronic device. For example, the server 10 may also include more or fewer components than shown in FIG. 6, and may also include other processing hardware, such as a GPU (graphics processing Unit), or have a different configuration than shown in FIG. 6, for example.
The memory 104 may be used to store software programs and modules of application software, such as program instructions/modules corresponding to the data reading method in the embodiment of the present invention, and the processor 102 executes various functional applications and data processing by running the software programs and modules stored in the memory 104, so as to implement the data reading method. The memory 104 may include high speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some examples, the memory 104 may further include memory located remotely from the processor 102, which may be connected to the computer terminal 10 via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The transmission module 106 is used to receive or transmit data via a network. Specific examples of the network described above may include a wireless network provided by a communication provider of the computer terminal 10. In one example, the transmission module 106 includes a Network adapter (NIC) that can be connected to other Network devices through a base station to communicate with the internet. In one example, the transmission module 106 may be a Radio Frequency (RF) module, which is used for communicating with the internet in a wireless manner.
Based on the data reading method, the specification further provides a data reading device. The apparatus may comprise a system (including a distributed system), software (applications), modules, components, servers, metering devices, etc. that utilize the methods described in embodiments of the present specification in conjunction with any necessary equipment to implement the hardware. Based on the same innovative concept, the processing device in one embodiment provided in the present specification is as described in the following embodiment. Since the implementation scheme for solving the problem of the apparatus is similar to that of the method, the implementation of the specific processing apparatus in the embodiment of the present specification may refer to the implementation of the foregoing method, and repeated details are not repeated. Although the means described in the embodiments below are preferably implemented in software, an implementation in hardware, or a combination of software and hardware is also possible and contemplated. Specifically, as shown in fig. 7, fig. 7 is a schematic block structure diagram of an embodiment of a data reading apparatus that can be used on a server side and provided by this specification, and specifically, the data reading apparatus may include:
a receiving module 120, configured to receive beacon information, where the beacon information includes metering data, first encrypted data, and an identification identifier, where the first encrypted data is generated based on the metering data, the identification identifier, and a first timestamp, where the first timestamp includes a time corresponding to when a metering device acquires the metering data;
a first generating module 122, configured to generate second encrypted data based on the identification, the metering data, and a corresponding second timestamp when the beacon information is received;
the comparing module 124 may be configured to compare the second encrypted data with the first encrypted data, and record the metering data when a comparison result meets a recording requirement.
The specific implementation of the apparatus in the foregoing embodiments may refer to the description of the related method embodiments, which is not described herein again.
Based on the data reading method, the specification further provides a data reading device which can be used on one side of the metering equipment. Fig. 8 is a schematic block diagram of an embodiment of a data reading apparatus that can be used on one side of a metering device, which may specifically include:
a second generating module 210, configured to obtain metering data, and generate first encrypted data based on the metering data, an identification identifier, and a first timestamp, where the first timestamp includes a time corresponding to when the metering device obtains the metering data;
the sending module 212 may be configured to send beacon information to a server, where the beacon information includes the metering data, the first encrypted data, and the identification identifier, so that the server generates second encrypted data based on the identification identifier, the metering data, and a second timestamp corresponding to when the beacon information is received, and records the metering data when it is determined that a comparison result of the second encrypted data and the first encrypted data meets a recording requirement.
In another embodiment of the apparatus, the sending module 212 may include:
a first sending unit 2120, configured to send the beacon information to a terminal device, where the terminal device sends the beacon information to a server.
In another embodiment of the apparatus, the terminal device is a mobile terminal, and accordingly, the sending the beacon information to the terminal device, and the sending the beacon information to the server by the terminal device includes:
the connection establishing unit is used for establishing communication connection between the metering equipment and the mobile terminal when the mobile terminal is within a preset distance range of the metering equipment and/or based on a matching instruction for triggering a specified application on the mobile terminal;
the second sending unit is used for sending the beacon information to the mobile terminal by the metering equipment;
and the third sending unit is used for sending the beacon information to a server when the mobile terminal meets a preset sending requirement.
The specific implementation of the apparatus in the foregoing embodiments may refer to the description of the related method embodiments, which is not described herein again.
The data reading method provided in the embodiments of the present specification may be implemented in a computer by a processor executing corresponding program instructions, for example, implemented on a PC side using a c + + language of a windows operating system, or implemented in other hardware necessary for an application design language set corresponding to, for example, Linux, android, and iOS systems, or implemented based on processing logic of a quantum computer. Specifically, in an embodiment where the server provided by the present specification implements the above method, the server may include a processor and a memory for storing processor-executable instructions, and when the processor executes the instructions, the processor implements:
receiving beacon information, wherein the beacon information comprises metering data, first encrypted data and an identification mark, the first encrypted data is generated based on the metering data, the identification mark and a first timestamp, and the first timestamp comprises time corresponding to metering data acquired by metering equipment;
generating second encrypted data based on the identification identifier, the metering data and a corresponding second timestamp when the beacon information is received;
and comparing the second encrypted data with the first encrypted data, and recording the metering data when the comparison result meets the recording requirement.
Accordingly, the present specification provides a metering device implementing the above-described embodiments of the method, the metering device may include a processor and a memory for storing processor-executable instructions, the processor implementing, when executing the instructions:
acquiring metering data, and generating first encrypted data based on the metering data, an identification mark and a first timestamp, wherein the first timestamp comprises corresponding time when metering equipment acquires the metering data;
and sending beacon information to a server, wherein the beacon information comprises the metering data, the first encrypted data and the identification identifier, so that the server generates second encrypted data based on the identification identifier, the metering data and a second timestamp corresponding to the beacon information, and records the metering data when the comparison result of the second encrypted data and the first encrypted data meets the recording requirement.
The instructions described above may be stored in a variety of computer-readable storage media. The computer readable storage medium may include physical devices for storing information, which may be digitized and then stored using an electrical, magnetic, or optical media. The computer-readable storage medium according to this embodiment may include: devices that store information using electrical energy, such as various types of memory, e.g., RAM, ROM, etc.; devices that store information using magnetic energy, such as hard disks, floppy disks, tapes, core memories, bubble memories, and usb disks; devices that store information optically, such as CDs or DVDs. Of course, there are other ways of storing media that can be read, such as quantum memory, graphene memory, and so forth. The instructions in the apparatus or server or metering device or system described below are as described above.
Based on the foregoing, this specification also provides a data reading system, which in one embodiment, may include a metering device and a server,
the metering equipment acquires metering data, generates first encrypted data based on the metering data, an identification mark and a first timestamp, and sends beacon information to a server, wherein the first timestamp comprises the time corresponding to the metering data acquired by the metering equipment, and the beacon information comprises the metering data, the first encrypted data and the identification mark;
and the server receives the beacon information, generates second encrypted data based on the identification identifier, the metering data and a corresponding second timestamp when the beacon information is received, compares the second encrypted data with the first encrypted data, and records the metering data when the comparison result meets the recording requirement.
It should be noted that, the apparatuses, the metering devices, the servers, and the systems described above in the embodiments of the present specification may also include other embodiments according to the description of the related method embodiments. The specific implementation manner may refer to the description of the method embodiment, and is not described in detail herein.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the hardware + program class embodiment, since it is substantially similar to the method embodiment, the description is simple, and the relevant points can be referred to the partial description of the method embodiment.
The foregoing description has been directed to specific embodiments of this disclosure. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims may be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing may also be possible or may be advantageous.
According to the metering device or the server for reading data provided by the embodiment of the specification, the metering device can encrypt the metering data of the metering device and broadcast the metering data in a Bluetooth mode, and the server encrypts the metering data based on the corresponding information after receiving the information and compares the encrypted data with the received encrypted data. Like this, need not meter reading personnel naked eye observation or visit the door and observe, alright in order to obtain each metering device's measurement data to when can guaranteeing the authenticity of the data of server record, can effectively solve the problem of being maliciously falsified among the data transmission process, improve the security that data read.
Of course, the implementation of the above embodiment can also be used in other application scenarios that require the acquisition of own data.
Although the present application provides method steps as described in an embodiment or flowchart, additional or fewer steps may be included based on conventional or non-inventive efforts. The order of steps recited in the embodiments is merely one manner of performing the steps in a multitude of orders and does not represent the only order of execution. In practice, the apparatus or the product of the metering device may be implemented sequentially or in parallel (e.g., in the context of parallel processors or multi-threaded processing) according to the embodiments or methods shown in the drawings.
Although the content of the embodiments of the present specification refers to the operation and data description of the interaction mode of the metering device/terminal device/server, the interaction mode of the metering device/server, the encryption algorithm, the data acquisition, interaction, processing, comparison and the like of the information broadcast and the like, the embodiments of the present specification are not limited to the case of conforming to the industry communication standard, the standard image data processing protocol, the communication protocol and the standard data model/template or the case described in the embodiments of the present specification. Certain industry standards, or implementations modified slightly from those described using custom modes or examples, may also achieve the same, equivalent, or similar, or other, contemplated implementations of the above-described examples. The embodiments using these modified or transformed data acquisition, storage, judgment, processing, etc. may still fall within the scope of the alternative embodiments of the present description.
In the 90 s of the 20 th century, improvements in a technology could clearly distinguish between improvements in hardware (e.g., improvements in circuit structures such as diodes, transistors, switches, etc.) and improvements in software (improvements in process flow). However, as technology advances, many of today's process flow improvements have been seen as direct improvements in hardware circuit architecture. Designers almost always obtain the corresponding hardware circuit structure by programming an improved method flow into the hardware circuit. Thus, it cannot be said that an improvement in the process flow cannot be realized by hardware physical modules. For example, a Programmable Logic Device (PLD), such as a Field Programmable Gate Array (FPGA), is an integrated circuit whose Logic functions are determined by programming the Device by a user. A digital system is "integrated" on a PLD by the designer's own programming without requiring the chip manufacturer to design and fabricate application-specific integrated circuit chips. Furthermore, nowadays, instead of manually making an integrated Circuit chip, such Programming is often implemented by "logic compiler" software, which is similar to a software compiler used in program development and writing, but the original code before compiling is also written by a specific Programming Language, which is called Hardware Description Language (HDL), and HDL is not only one but many, such as abel (advanced Boolean Expression Language), ahdl (alternate Language Description Language), traffic, pl (core unified Programming Language), HDCal, JHDL (Java Hardware Description Language), langue, Lola, HDL, laspam, hardsradware (Hardware Description Language), vhjhd (Hardware Description Language), and vhigh-Language, which are currently used in most common. It will also be apparent to those skilled in the art that hardware circuitry that implements the logical method flows can be readily obtained by merely slightly programming the method flows into an integrated circuit using the hardware description languages described above.
The controller may be implemented in any suitable manner, for example, the controller may take the form of, for example, a microprocessor or processor and a computer-readable medium storing computer-readable program code (e.g., software or firmware) executable by the (micro) processor, logic gates, switches, an Application Specific Integrated Circuit (ASIC), a programmable logic controller, and an embedded microcontroller, examples of which include, but are not limited to, the following microcontrollers: ARC 625D, Atmel AT91SAM, Microchip PIC18F26K20, and Silicone Labs C8051F320, the memory controller may also be implemented as part of the control logic for the memory. Those skilled in the art will also appreciate that, in addition to implementing the controller as pure computer readable program code, the same functionality can be implemented by logically programming method steps such that the controller is in the form of logic gates, switches, application specific integrated circuits, programmable logic controllers, embedded microcontrollers and the like. Such a controller may thus be considered a hardware component, and the means included therein for performing the various functions may also be considered as a structure within the hardware component. Or even means for performing the functions may be regarded as being both a software module for performing the method and a structure within a hardware component.
The systems, devices, modules or units illustrated in the above embodiments may be implemented by a computer chip or an entity, or by a product with certain functions. One typical implementation device is a computer. In particular, the computer may be, for example, a personal computer, a laptop computer, a vehicle-mounted human-computer interaction device, a cellular telephone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or a combination of any of these devices.
Although embodiments of the present description provide method steps as described in embodiments or flowcharts, more or fewer steps may be included based on conventional or non-inventive means. The order of steps recited in the embodiments is merely one manner of performing the steps in a multitude of orders and does not represent the only order of execution. When an actual apparatus or end product executes, it may execute sequentially or in parallel (e.g., parallel processors or multi-threaded environments, or even distributed data processing environments) according to the method shown in the embodiment or the figures. The terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, the presence of additional identical or equivalent elements in a process, method, article, or apparatus that comprises the recited elements is not excluded.
For convenience of description, the above devices are described as being divided into various modules by functions, and are described separately. Of course, in implementing the embodiments of the present description, the functions of each module may be implemented in one or more software and/or hardware, or a module implementing the same function may be implemented by a combination of multiple sub-modules or sub-units, and the like. The above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
Those skilled in the art will also appreciate that, in addition to implementing the controller as pure computer readable program code, the same functionality can be implemented by logically programming method steps such that the controller is in the form of logic gates, switches, application specific integrated circuits, programmable logic controllers, embedded microcontrollers and the like. Such a controller may therefore be considered as a hardware component, and the means included therein for performing the various functions may also be considered as a structure within the hardware component. Or even means for performing the functions may be regarded as being both a software module for performing the method and a structure within a hardware component.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
As will be appreciated by one skilled in the art, embodiments of the present description may be provided as a method, system, or computer program product. Accordingly, embodiments of the present description may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, embodiments of the present description may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and so forth) having computer-usable program code embodied therein.
The embodiments of this specification may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The described embodiments may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the system embodiment, since it is substantially similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment. In the description herein, references to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of an embodiment of the specification. In this specification, the schematic representations of the terms used above are not necessarily intended to refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, various embodiments or examples and features of different embodiments or examples described in this specification can be combined and combined by one skilled in the art without contradiction.
The above description is only an example of the embodiments of the present disclosure, and is not intended to limit the embodiments of the present disclosure. Various modifications and variations to the embodiments described herein will be apparent to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the embodiments of the present specification should be included in the scope of the claims of the embodiments of the present specification.
Claims (16)
1. A method of data reading, the method comprising:
the method comprises the steps of obtaining metering data on metering equipment, and generating first encrypted data based on the metering data, an identification mark and a first timestamp, wherein the first timestamp comprises the corresponding time when the metering equipment obtains the metering data;
the metering equipment sends beacon information to terminal equipment, wherein the beacon information comprises the metering data, the first encryption data and the identification mark;
the terminal equipment sends the beacon information to a server;
the server generates second encrypted data based on the identification identifier, the metering data and a corresponding second timestamp when the beacon information is received;
and the server compares the second encrypted data with the first encrypted data, and records the metering data when the comparison result meets the recording requirement.
2. A method of data reading, the method comprising:
receiving beacon information, wherein the beacon information comprises metering data, first encrypted data and an identification mark, the first encrypted data is generated based on the metering data, the identification mark and a first timestamp, and the first timestamp comprises time corresponding to metering data acquired by metering equipment;
generating second encrypted data based on the identification identifier, the metering data and a corresponding second timestamp when the beacon information is received;
and comparing the second encrypted data with the first encrypted data, and recording the metering data when the comparison result meets the recording requirement.
3. A method of data reading, the method comprising:
acquiring metering data, and generating first encrypted data based on the metering data, an identification mark and a first timestamp, wherein the first timestamp comprises corresponding time when metering equipment acquires the metering data;
and sending beacon information to a server, wherein the beacon information comprises the metering data, the first encrypted data and the identification identifier, so that the server generates second encrypted data based on the identification identifier, the metering data and a second timestamp corresponding to the beacon information, and records the metering data when the comparison result of the second encrypted data and the first encrypted data meets the recording requirement.
4. The method of claim 3, the sending beacon information to a server, comprising:
and sending the beacon information to terminal equipment, and sending the beacon information to a server by the terminal equipment.
5. The method of claim 4, wherein the sending the beacon information to the terminal device comprises at least one of:
bluetooth;
a WiFi network.
6. The method of claim 4, wherein the terminal device is a mobile terminal, and accordingly, the sending the beacon information to the terminal device, and the sending the beacon information to the server by the terminal device comprises:
the method comprises the steps that when the mobile terminal is within a preset distance range of metering equipment and/or based on a matching instruction for triggering a designated application on the mobile terminal, communication connection between the metering equipment and the mobile terminal is established;
the metering equipment sends the beacon information to the mobile terminal;
and when the mobile terminal meets the preset sending requirement, the beacon information is sent to a server.
7. A data reading apparatus, the apparatus comprising:
the receiving module is used for receiving beacon information, wherein the beacon information comprises metering data, first encrypted data and an identification mark, the first encrypted data is generated based on the metering data, the identification mark and a first timestamp, and the first timestamp comprises time corresponding to the metering data acquired by metering equipment;
the first generating module is used for generating second encrypted data based on the identification identifier, the metering data and a corresponding second timestamp when the beacon information is received;
and the comparison module is used for comparing the second encrypted data with the first encrypted data and recording the metering data when the comparison result meets the recording requirement.
8. A data reading apparatus, the apparatus comprising:
the second generation module is used for acquiring metering data and generating first encrypted data based on the metering data, the identification mark and a first timestamp, wherein the first timestamp comprises the time corresponding to the metering data acquired by the metering equipment;
and the sending module is used for sending beacon information to a server, wherein the beacon information comprises the metering data, the first encrypted data and the identification identifier, so that the server generates second encrypted data based on the identification identifier, the metering data and a second timestamp corresponding to the beacon information when receiving the beacon information, and records the metering data when determining that a comparison result of the second encrypted data and the first encrypted data meets a recording requirement.
9. The apparatus of claim 8, the sending module comprising:
and the first sending unit is used for sending the beacon information to terminal equipment, and the terminal equipment sends the beacon information to a server.
10. The apparatus of claim 9, wherein the terminal device is a mobile terminal, and accordingly, the sending the beacon information to the terminal device, and the sending the beacon information to the server by the terminal device comprises:
the connection establishing unit is used for establishing communication connection between the metering equipment and the mobile terminal when the mobile terminal is within a preset distance range of the metering equipment and/or based on a matching instruction for triggering a specified application on the mobile terminal;
the second sending unit is used for sending the beacon information to the mobile terminal by the metering equipment;
and the third sending unit is used for sending the beacon information to a server when the mobile terminal meets a preset sending requirement.
11. The apparatus of any one of claims 7 and 8, wherein the first timestamp and the second timestamp are within a preset time window.
12. A server comprising a processor and a memory for storing processor-executable instructions that when executed by the processor implement:
receiving beacon information, wherein the beacon information comprises metering data, first encrypted data and an identification mark, the first encrypted data is generated based on the metering data, the identification mark and a first timestamp, and the first timestamp comprises time corresponding to metering data acquired by metering equipment;
generating second encrypted data based on the identification identifier, the metering data and a corresponding second timestamp when the beacon information is received;
and comparing the second encrypted data with the first encrypted data, and recording the metering data when the comparison result meets the recording requirement.
13. A metering device comprising a processor and a memory for storing processor-executable instructions that when executed by the processor implement:
acquiring metering data, and generating first encrypted data based on the metering data, an identification mark and a first timestamp, wherein the first timestamp comprises corresponding time when metering equipment acquires the metering data;
and sending beacon information to a server, wherein the beacon information comprises the metering data, the first encrypted data and the identification identifier, so that the server generates second encrypted data based on the identification identifier, the metering data and a second timestamp corresponding to the beacon information, and records the metering data when the comparison result of the second encrypted data and the first encrypted data meets the recording requirement.
14. A data reading system comprises a metering device and a server,
the metering equipment acquires metering data, generates first encrypted data based on the metering data, an identification mark and a first timestamp, and sends beacon information to a server, wherein the first timestamp comprises the time corresponding to the metering data acquired by the metering equipment, and the beacon information comprises the metering data, the first encrypted data and the identification mark;
and the server receives the beacon information, generates second encrypted data based on the identification identifier, the metering data and a corresponding second timestamp when the beacon information is received, compares the second encrypted data with the first encrypted data, and records the metering data when the comparison result meets the recording requirement.
15. A method of data reading, the method comprising:
the method comprises the steps of obtaining metering data on metering equipment, and generating first encrypted data based on the metering data, an identification mark and a first timestamp, wherein the first timestamp comprises the corresponding time when the metering equipment obtains the metering data;
the metering equipment sends beacon information to a server, wherein the beacon information comprises the metering data, the first encryption data and the identification mark;
the server generates second encrypted data based on the identification identifier, the metering data and a corresponding second timestamp when the beacon information is received;
and the server compares the second encrypted data with the first encrypted data, and records the metering data when the comparison result meets the recording requirement.
16. The method of any one of claims 1, 2, 3, and 15, wherein the first timestamp and the second timestamp are within a preset time window.
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911139709.9A CN111131156A (en) | 2019-11-20 | 2019-11-20 | Data reading method and device, metering equipment and server |
TW109115222A TWI764146B (en) | 2019-11-20 | 2020-05-07 | Data reading method, device, measuring device and server |
PCT/CN2020/105094 WO2021098272A1 (en) | 2019-11-20 | 2020-07-28 | Data reading method and apparatus, metering device, and server |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911139709.9A CN111131156A (en) | 2019-11-20 | 2019-11-20 | Data reading method and device, metering equipment and server |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111131156A true CN111131156A (en) | 2020-05-08 |
Family
ID=70495936
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911139709.9A Pending CN111131156A (en) | 2019-11-20 | 2019-11-20 | Data reading method and device, metering equipment and server |
Country Status (3)
Country | Link |
---|---|
CN (1) | CN111131156A (en) |
TW (1) | TWI764146B (en) |
WO (1) | WO2021098272A1 (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112134696A (en) * | 2020-08-21 | 2020-12-25 | 杭州海兴电力科技股份有限公司 | Electric energy meter dynamic password generation and communication method and communication system thereof |
WO2021098272A1 (en) * | 2019-11-20 | 2021-05-27 | 支付宝(杭州)信息技术有限公司 | Data reading method and apparatus, metering device, and server |
CN114257385A (en) * | 2020-09-10 | 2022-03-29 | 西交利物浦大学 | Secure communication method and device, electronic equipment and storage medium |
CN114417416A (en) * | 2022-01-24 | 2022-04-29 | 成都秦川物联网科技股份有限公司 | Synchronous energy metering device embedded with information security module and Internet of things system |
CN114422551A (en) * | 2022-01-24 | 2022-04-29 | 成都秦川物联网科技股份有限公司 | Centralized operation type energy metering device with built-in gateway and Internet of things system |
CN117294535A (en) * | 2023-11-24 | 2023-12-26 | 北京邮电大学 | Method and system for verifying security of data packet explicit information expression instruction |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117577283B (en) * | 2024-01-16 | 2024-03-19 | 四川互慧软件有限公司 | Internet-based door-to-door nursing management method |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101123502A (en) * | 2007-08-28 | 2008-02-13 | 浙江大学 | Measurement authentication method based on digital signature |
CN101738516A (en) * | 2008-11-25 | 2010-06-16 | 深圳市宝利达实业有限公司 | Electronic electric energy meter and data secure transmission method thereof |
CN102571984A (en) * | 2012-02-23 | 2012-07-11 | 山东大学 | Remote transmission and management system of thermal power measuring data |
CN103632526A (en) * | 2013-12-17 | 2014-03-12 | 浙江正泰仪器仪表有限责任公司 | Meter reading system of wireless intelligent meter |
CN105978972A (en) * | 2016-05-13 | 2016-09-28 | 新智数字科技有限公司 | Data processing method, device and system and related equipment |
CN107809434A (en) * | 2017-11-08 | 2018-03-16 | 济南大陆机电股份有限公司 | A kind of continuous data validation verification system and method |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1932865A (en) * | 2006-10-10 | 2007-03-21 | 潘铁军 | Payment method for precharging meter |
CN102624740B (en) * | 2012-03-30 | 2016-05-11 | 北京奇虎科技有限公司 | A kind of data interactive method and client, server |
TWI571086B (en) * | 2012-12-11 | 2017-02-11 | 財團法人資訊工業策進會 | Advanced metering infrastructure network system and message broadcasting method |
US20140258718A1 (en) * | 2013-03-07 | 2014-09-11 | Asymptote Security Llc | Method and system for secure transmission of biometric data |
CN107231353B (en) * | 2017-06-01 | 2021-01-29 | 成都信息工程大学 | Binary tree-based batch authentication method in smart power grid |
CN111131156A (en) * | 2019-11-20 | 2020-05-08 | 支付宝(杭州)信息技术有限公司 | Data reading method and device, metering equipment and server |
-
2019
- 2019-11-20 CN CN201911139709.9A patent/CN111131156A/en active Pending
-
2020
- 2020-05-07 TW TW109115222A patent/TWI764146B/en active
- 2020-07-28 WO PCT/CN2020/105094 patent/WO2021098272A1/en active Application Filing
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101123502A (en) * | 2007-08-28 | 2008-02-13 | 浙江大学 | Measurement authentication method based on digital signature |
CN101738516A (en) * | 2008-11-25 | 2010-06-16 | 深圳市宝利达实业有限公司 | Electronic electric energy meter and data secure transmission method thereof |
CN102571984A (en) * | 2012-02-23 | 2012-07-11 | 山东大学 | Remote transmission and management system of thermal power measuring data |
CN103632526A (en) * | 2013-12-17 | 2014-03-12 | 浙江正泰仪器仪表有限责任公司 | Meter reading system of wireless intelligent meter |
CN105978972A (en) * | 2016-05-13 | 2016-09-28 | 新智数字科技有限公司 | Data processing method, device and system and related equipment |
CN107809434A (en) * | 2017-11-08 | 2018-03-16 | 济南大陆机电股份有限公司 | A kind of continuous data validation verification system and method |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2021098272A1 (en) * | 2019-11-20 | 2021-05-27 | 支付宝(杭州)信息技术有限公司 | Data reading method and apparatus, metering device, and server |
CN112134696A (en) * | 2020-08-21 | 2020-12-25 | 杭州海兴电力科技股份有限公司 | Electric energy meter dynamic password generation and communication method and communication system thereof |
CN114257385A (en) * | 2020-09-10 | 2022-03-29 | 西交利物浦大学 | Secure communication method and device, electronic equipment and storage medium |
CN114417416A (en) * | 2022-01-24 | 2022-04-29 | 成都秦川物联网科技股份有限公司 | Synchronous energy metering device embedded with information security module and Internet of things system |
CN114422551A (en) * | 2022-01-24 | 2022-04-29 | 成都秦川物联网科技股份有限公司 | Centralized operation type energy metering device with built-in gateway and Internet of things system |
CN114422551B (en) * | 2022-01-24 | 2023-06-20 | 成都秦川物联网科技股份有限公司 | Centralized operation type energy metering device with built-in gateway and Internet of things system |
CN117294535A (en) * | 2023-11-24 | 2023-12-26 | 北京邮电大学 | Method and system for verifying security of data packet explicit information expression instruction |
CN117294535B (en) * | 2023-11-24 | 2024-04-02 | 北京邮电大学 | Method and system for verifying security of data packet explicit information expression instruction |
Also Published As
Publication number | Publication date |
---|---|
TWI764146B (en) | 2022-05-11 |
TW202121186A (en) | 2021-06-01 |
WO2021098272A1 (en) | 2021-05-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111131156A (en) | Data reading method and device, metering equipment and server | |
US11646886B2 (en) | Data offload and time synchronization for ubiquitous visual computing witness | |
CN112367246B (en) | Message pushing method and device, electronic equipment and storage medium | |
TWI692990B (en) | Smart device binding method, device and system, communication system | |
CN104360852A (en) | Application program management method and application program management device of mobile terminal | |
CN110177088B (en) | Temporary identity authentication method, device and system | |
US20180113500A1 (en) | Systems and methods for monitoring battery life | |
US11509637B2 (en) | Data transmission method, system and platform using blockchain, and storage medium | |
WO2020052133A1 (en) | Gateway communication method, gateway, and energy system | |
CN103957580A (en) | Rapid WIFI networking matching method and module for smart hardware | |
CN114629902B (en) | Sharing data between different service providers at the edge level through a collaboration channel | |
CN110401539A (en) | A kind of certificate data processing method, server, terminal and system | |
KR20130064217A (en) | Control module system and method for m2m services | |
CN114417258A (en) | Carbon emission reduction accounting method and device | |
Zhang et al. | Privacy-preserved mobile sensing through hybrid cloud trust framework | |
CN103780690B (en) | Method and system for safely sharing user data | |
CN111131465B (en) | Internet of things data processing method and device based on block chain and server | |
CN109922056B (en) | Data security processing method, terminal and server thereof | |
US11797712B2 (en) | Verifying data integrity | |
CN112087301A (en) | Gas meter safety certification system based on state cryptographic algorithm | |
CN109544380B (en) | Method for settling claims based on location service and related products | |
JP7499696B2 (en) | Meter reading system and mobile terminal | |
TWM501055U (en) | Beacons, mobile communication devices for identifying the same and management systems for managing the same | |
Heins | NB-IoT Use Cases and Devices | |
CN114449019A (en) | Operation data recording method, node, system and equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200508 |
|
RJ01 | Rejection of invention patent application after publication |