CN112217795B - Method and device for managing communication security of intelligent electric meter - Google Patents

Method and device for managing communication security of intelligent electric meter Download PDF

Info

Publication number
CN112217795B
CN112217795B CN202010929442.XA CN202010929442A CN112217795B CN 112217795 B CN112217795 B CN 112217795B CN 202010929442 A CN202010929442 A CN 202010929442A CN 112217795 B CN112217795 B CN 112217795B
Authority
CN
China
Prior art keywords
message
module
application program
ciphertext
legal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010929442.XA
Other languages
Chinese (zh)
Other versions
CN112217795A (en
Inventor
李保丰
杜新纲
翟峰
葛德辉
梁晓兵
周晖
许斌
彭楚宁
冯占成
王齐
付义伦
刘书勇
任博
韩文博
孔令达
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Corp of China SGCC
China Electric Power Research Institute Co Ltd CEPRI
Original Assignee
State Grid Corp of China SGCC
China Electric Power Research Institute Co Ltd CEPRI
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Corp of China SGCC, China Electric Power Research Institute Co Ltd CEPRI filed Critical State Grid Corp of China SGCC
Priority to CN202010929442.XA priority Critical patent/CN112217795B/en
Publication of CN112217795A publication Critical patent/CN112217795A/en
Application granted granted Critical
Publication of CN112217795B publication Critical patent/CN112217795B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/162Implementing security features at a particular protocol layer at the data link layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/22Parsing or analysis of headers
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephonic Communication Services (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The application discloses a method and a device for managing communication safety of an intelligent electric meter. Wherein, the method comprises the following steps: receiving messages sent by other modules and external equipment, wherein the other modules are a metering module and an expansion module in the intelligent electric meter, and the intelligent electric meter comprises a metering module, a management module and an expansion module; checking the link layer format of the message to determine a qualified message with a qualified format, verifying the legality of the qualified message, and determining the qualified message passing the legality verification as a legal message; and realizing communication data interaction of the legal message by using the software security management application program in a mode of calling the embedded security control module.

Description

Method and device for managing communication safety of intelligent electric meter
Technical Field
The application relates to the technical field of power systems, in particular to a method and a device for managing communication safety of an intelligent electric meter.
Background
The power internet of things is an innovative fusion and development direction of a new generation of energy system and internet technology, is a higher stage of development of a smart power grid, and compared with the existing power grid, the smart power grid has the remarkable characteristic of high fusion of power flow, information flow and business flow. At present, the electric meter in China adopts a special electric energy meter integrated circuit to complete data acquisition of electric energy, the function expandability is low, under the background of promoting the construction of the electric power Internet of things, a new generation of modularized intelligent electric meters applies the electric meter service APP through constructing a credible operating system, the electric meter is used as a ubiquitous electric power Internet of things terminal sensing terminal, the electric meter becomes an entry point of various external network devices such as intelligent homes, electric vehicles and the like which are accessed into a power grid, and an ecological circle taking the electric meter as a core is constructed. The ammeter brings new safety risk points after introducing an operating system, and how to prevent problems of unauthorized access of multiple APPs, safe and credible APP service, communication between each APP and a hardware module, scheduling of ESAMs and the like are urgently needed to be solved, and a set of special safety management method is needed to process the problems.
Aiming at the technical problems that a new safety risk point is brought after an electric meter is introduced into an operating system in the prior art, and how to prevent the problems of unauthorized access of a plurality of APPs, safe and credible APP service, communication between each APP and a hardware module, scheduling of ESAMs and the like, an effective solution is not provided at present.
Disclosure of Invention
The embodiment of the disclosure provides a method and a device for managing communication safety of an intelligent ammeter, and the method and the device are used for at least solving the technical problems that in the prior art, after the ammeter is introduced into an operating system, a new safety risk point is brought, and the problems of unauthorized access of multiple APPs, safe and reliable APP service, communication between each APP and a hardware module, scheduling of ESAMs and the like are prevented.
According to an aspect of the embodiment of the present disclosure, there is provided a method for performing security management on communication of a smart meter, including: receiving messages sent by other modules and external equipment, wherein the other modules are a metering module and an expansion module in the intelligent electric meter, and the intelligent electric meter comprises a metering module, a management module and an expansion module; checking the link layer format of the message to determine a qualified message with a qualified format, verifying the legality of the qualified message, and determining the qualified message passing the legality verification as a legal message; and realizing communication data interaction of the legal message by using the software security management application program in a mode of calling the embedded security control module.
According to another aspect of the embodiments of the present disclosure, there is also provided a storage medium including a stored program, wherein the method of any one of the above is performed by a processor when the program is executed.
According to another aspect of the embodiments of the present disclosure, there is also provided an apparatus for managing communication security of a smart meter, including: the receiving module is used for receiving messages sent by other modules and external equipment, wherein the other modules are a metering module and an expansion module in the intelligent ammeter, and the intelligent ammeter comprises a metering module, a management module and an expansion module; the determining module is used for checking the link layer format of the message so as to determine the qualified message with qualified format, verifying the legality of the qualified message and determining the qualified message passing the legality verification as the legal message; and the interaction module is used for realizing the communication data interaction of the legal message by using the software security management application program in a mode of calling the embedded security control module.
According to another aspect of the embodiments of the present disclosure, there is also provided an apparatus for managing communication security of a smart meter, including: a processor; and a memory coupled to the processor for providing instructions to the processor for processing the following processing steps: receiving messages sent by other modules and external equipment, wherein the other modules are a metering module and an expansion module in the intelligent electric meter, and the intelligent electric meter comprises a metering module, a management module and an expansion module; checking the link layer format of the message to determine a qualified message with a qualified format, verifying the legality of the qualified message, and determining the qualified message passing the legality verification as a legal message; and realizing communication data interaction of legal messages by using a software security management application program in a mode of calling the embedded security control module.
In the embodiment of the disclosure, messages sent by other modules of the smart meter and external devices are received, the link layer format of the received messages is checked, so that qualified messages with qualified formats are determined, the legality of the qualified messages is verified, legal messages are obtained, the integrity and correctness of the messages are determined, and the messages are filtered for illegal messages and incomplete messages. And finally, realizing communication data interaction of legal messages by using a software security management application program in a mode of calling the embedded security control module.
Therefore, the integrity and the correctness of the message are determined by checking the link layer format and verifying the legality of the message received from other modules and external equipment, and the message filtering is realized on the illegal message and the incomplete message. The embedded security control module ESAM is called to encrypt the plaintext message and decrypt the ciphertext message, so that the security of the message in the transmission process is ensured, and the security management is realized. And unified scheduling is performed on the embedded security control module ESAM, so that system management is realized. Therefore, the technical problems that a new safety risk point is brought after an electric meter is introduced into an operating system, unauthorized access of multiple APPs, safety and credibility of APP services, communication between each APP and a hardware module, scheduling of ESAMs and the like are prevented in the prior art are solved.
Drawings
The accompanying drawings, which are included to provide a further understanding of the disclosure and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the disclosure and together with the description serve to explain the disclosure and not to limit the disclosure. In the drawings:
fig. 1 is a hardware block diagram of a computing device for implementing the method according to embodiment 1 of the present disclosure;
fig. 2 is a schematic flow chart of a method for managing communication security of a smart meter according to a first aspect of embodiment 1 of the present disclosure;
fig. 3 is a flowchart of a 698 frame message receiving process according to the first aspect of embodiment 1 of the present disclosure;
fig. 4 is a flowchart of APDU receiving processing according to the first aspect of embodiment 1 of the present disclosure;
fig. 5 is a flow chart of a service APP data request processing according to the first aspect of embodiment 1 of the present disclosure;
fig. 6 is a flow chart of security mode parameter checking according to the first aspect of embodiment 1 of the present disclosure;
fig. 7 is a flowchart of OAD determination processing according to the first aspect of embodiment 1 of the present disclosure;
fig. 8 is a schematic diagram of an apparatus for managing communication security of a smart meter according to embodiment 2 of the present disclosure; and
fig. 9 is a schematic diagram of an apparatus for managing communication security of a smart meter according to embodiment 3 of the present disclosure.
Detailed Description
In order to make those skilled in the art better understand the technical solutions of the present disclosure, the technical solutions in the embodiments of the present disclosure will be clearly and completely described below with reference to the drawings in the embodiments of the present disclosure. It is to be understood that the described embodiments are merely exemplary of some, and not all, of the present disclosure. All other embodiments, which can be derived by a person skilled in the art from the embodiments disclosed herein without making any creative effort, shall fall within the protection scope of the present disclosure.
It should be noted that the terms "first," "second," and the like in the description and claims of the present disclosure and in the foregoing drawings are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the disclosure described herein are capable of operation in other sequences than those illustrated or described herein. Moreover, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
Example 1
According to the present embodiment, there is also provided an embodiment of a method for securely managing communications of a smart meter, where it is noted that the steps illustrated in the flowchart of the drawings may be performed in a computer system, such as a set of computer-executable instructions, and that although a logical order is illustrated in the flowchart, in some cases, the steps illustrated or described may be performed in an order different than here.
The method embodiments provided by the present embodiment may be executed in a server or similar computing device. Fig. 1 shows a hardware block diagram of a computing device for implementing a method for securely managing communications of a smart meter. As shown in fig. 1, the computing device may include one or more processors (which may include, but are not limited to, a processing device such as a microprocessor MCU or a programmable logic device FPGA), a memory for storing data, and a transmission device for communication functions. Besides, the method can also comprise the following steps: a display, an input/output interface (I/O interface), a Universal Serial Bus (USB) port (which may be included as one of the ports of the I/O interface), a network interface, a power source, and/or a camera. It will be understood by those skilled in the art that the structure shown in fig. 1 is only an illustration and is not intended to limit the structure of the electronic device. For example, the computing device may also include more or fewer components than shown in FIG. 1, or have a different configuration than shown in FIG. 1.
It should be noted that the one or more processors and/or other data processing circuitry described above may be referred to generally herein as "data processing circuitry". The data processing circuitry may be embodied in whole or in part in software, hardware, firmware, or any combination thereof. Further, the data processing circuitry may be a single, stand-alone processing module, or incorporated in whole or in part into any of the other elements in the computing device. As referred to in the disclosed embodiments, the data processing circuit acts as a processor control (e.g., selection of a variable resistance termination path connected to the interface).
The memory can be used for storing software programs and modules of application software, such as a program instruction/data storage device corresponding to the method for safely managing communication of the smart meter in the embodiment of the disclosure, and the processor executes various functional applications and data processing by running the software programs and modules stored in the memory, namely, the method for safely managing communication of the smart meter of the application programs is realized. The memory may include high speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some instances, the memory may further include memory located remotely from the processor, which may be connected to the computing device over a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The transmission device is used for receiving or transmitting data via a network. Specific examples of such networks may include wireless networks provided by communication providers of the computing devices. In one example, the transmission device includes a Network adapter (NIC) that can be connected to other Network devices through a base station to communicate with the internet. In one example, the transmission device may be a Radio Frequency (RF) module, which is used for communicating with the internet in a wireless manner.
The display may be, for example, a touch screen type Liquid Crystal Display (LCD) that may enable a user to interact with a user interface of the computing device.
It should be noted here that in some alternative embodiments, the computing device shown in fig. 1 described above may include hardware elements (including circuitry), software elements (including computer code stored on a computer-readable medium), or a combination of both hardware and software elements. It should be noted that FIG. 1 is only one example of a particular specific example and is intended to illustrate the types of components that may be present in a computing device as described above.
According to a first aspect of the embodiment, a method for carrying out safety management on communication of a smart meter is provided. Fig. 2 shows a flow diagram of the method, which, with reference to fig. 2, comprises:
s202: receive the message that sends from other modules and external equipment, wherein other modules are measurement module and extension module among the smart electric meter, and smart electric meter includes measurement module, management module and extension module
S204: checking the link layer format of the message to determine a qualified message with a qualified format, verifying the legality of the qualified message, and determining the qualified message passing the legality verification as a legal message;
s206: and realizing communication data interaction of legal messages by using a software security management application program in a mode of calling the embedded security control module.
Specifically, the method in this embodiment is operated on the management module of the smart meter, the smart meter includes a metering module, a management module and an extension module, and a service application program (namely, a service APP) and a software security management program (namely, a software security management APP, referred to as a security management APP) are operated on the management module.
Specifically, referring to fig. 2, first, a message sent by another module of the smart meter and an external device is received, where the another module is a metering module and an expansion module in the smart meter, and the external device may be a terminal device or the like. For example, a 698 message is received from the master station that securely transmits "ciphertext + sid _ mac" to read the admin core data.
Further, the link layer format of the message is checked, so that a qualified message with a qualified format is determined, the legality of the qualified message is verified, and the qualified message passing the legality verification is determined to be a legal message. Thus determining the authenticity and integrity of the message.
And finally, realizing communication data interaction of a legal message by using a software security management application program in a mode of calling the embedded security control module, wherein the software security management application program runs on the management module, and the communication data interaction comprises communication data interaction among all service application programs in the management module, communication data interaction among all modules in the intelligent electric meter and communication data interaction between the intelligent electric meter and external equipment.
In this embodiment, messages sent by other modules of the smart meter and external devices are received, the link layer format of the received messages is checked, so that qualified messages with qualified formats are determined, the legality of the qualified messages is verified, legal messages are obtained, the integrity and correctness of the messages are determined, and message filtering is implemented on illegal messages and incomplete messages. And finally, realizing communication data interaction of the legal message by using a software security management application program in a mode of calling the embedded security control module.
Therefore, the integrity and the correctness of the message are determined by checking the link layer format and verifying the legality of the message received from other modules and external equipment, and the message filtering is realized on the illegal message and the incomplete message. The embedded security control module ESAM is called to encrypt the plaintext message and decrypt the ciphertext message, so that the security of the message in the transmission process is ensured, and the security management is realized. And unified scheduling is performed on the embedded security control module ESAM, so that system management is realized. Therefore, the technical problems that a new safety risk point is brought after an electric meter is introduced into an operating system, unauthorized access of multiple APPs, safety and credibility of APP services, communication between each APP and a hardware module, scheduling of ESAMs and the like are prevented in the prior art are solved.
Optionally, checking the link layer format of the packet to determine a qualified packet with a qualified format includes: checking whether the header byte, the trailer byte, the header check and the trailer check of the message are correct or not; under the condition that the frame header byte, the frame tail byte, the frame header check and the frame tail check of the message are incorrect, determining that the message is an unqualified message, and discarding the unqualified message; and determining the message as a qualified message under the condition that the header byte, the tail byte, the header check and the tail check of the message are correct.
Specifically, as shown in fig. 3, it is checked whether the header byte, the trailer byte, the header check, the trailer check, and the length of the packet are correct; checking whether the header byte, the trailer byte, the header check and the trailer check of the message are correct or not; under the condition that the frame header byte, the frame tail byte, the frame header check and the frame tail check of the message are incorrect, determining that the message is an unqualified message, and discarding the unqualified message; and determining the message as a qualified message under the condition that the header byte, the tail byte, the header check and the tail check of the message are correct. Therefore, the integrity and the correctness of the content of the received message are ensured, and the message filtering function is realized for the illegal message and the incomplete message.
Optionally, verifying the validity of the qualified packet, and determining the qualified packet that passes the validity verification as a valid packet includes: verifying the legality of the logical address, the beginning, the end, the CS check bit, the client address, the communication address and the length of the qualified message; determining the qualified message as an illegal message under the condition that the legality of the logic address, the beginning, the end, the CS check bit, the client address, the communication address and the length of the qualified message is not verified; and determining the qualified message as a legal message under the condition that the legality of the logical address, the beginning, the end, the CS check bit, the client address, the communication address and the length of the qualified message is verified.
Specifically, the validity of the logical address, the beginning, the end, the CS check bit, the client address, the communication address and the length of the qualified packet is verified; determining the qualified message as an illegal message under the condition that the legality of the logic address, the beginning, the end, the CS check bit, the client address, the communication address and the length of the qualified message is not verified; and determining the qualified message as a legal message under the condition that the legality of the logical address, the beginning, the end, the CS check bit, the client address, the communication address and the length of the qualified message is verified. Therefore, the integrity and the correctness of the content of the received message are ensured, and the message filtering function is realized for the illegal message and the incomplete message.
Optionally, the method of calling the embedded security control module and using the software security management application program to implement communication data interaction of the legitimate packet includes: the software safety management application program runs on the management module, and the communication data interaction comprises communication data interaction among all service application programs in the management module, communication data interaction among all modules in the intelligent electric meter and communication data interaction between the intelligent electric meter and external equipment.
Optionally, the method of calling the embedded security control module and using the software security management application program to implement communication data interaction of the valid message includes: after sending a ciphertext message to the software security management application program, the external device sends the ciphertext message to the metering module, wherein the ciphertext is a legal message; or after the external equipment sends the ciphertext message to the software security management application program, decrypting the ciphertext message to obtain a plaintext message, and sending the plaintext message to the service application program in the management module; or after the external equipment sends the ciphertext message to the software security management application program, decrypting the ciphertext message to obtain a plaintext message, encrypting the plaintext message in a manner that the expansion module can decrypt the plaintext message to obtain a first ciphertext, and sending the first ciphertext to the expansion module; or after the external device sends the ciphertext message to the software security management application program, decrypting the ciphertext message to obtain a plaintext message, judging whether the plaintext message is a message requested to respond by the master station system, encrypting the plaintext message in a manner that the master station system can decrypt the plaintext message under the condition that the plaintext message is the message requested to respond by the master station system to obtain a second ciphertext, sending the second ciphertext to the master station system, and discarding the plaintext message under the condition that the plaintext message is not the message requested to respond by the master station system.
Specifically, referring to fig. 4, after sending a ciphertext message to the software security management application, the external device sends the ciphertext message to the metering module, where the ciphertext is a valid message; or after the external equipment sends the ciphertext message to the software security management application program, decrypting the ciphertext message to obtain a plaintext message, and sending the plaintext message to the service application program in the management module; or after the external equipment sends the ciphertext message to the software security management application program, decrypting the ciphertext message to obtain a plaintext message, encrypting the plaintext message in a manner that the expansion module can decrypt the plaintext message to obtain a first ciphertext, and sending the first ciphertext to the expansion module; or after the external device sends the ciphertext message to the software security management application program, decrypting the ciphertext message to obtain a plaintext message, judging whether the plaintext message is a message requested to respond by the master station system, encrypting the plaintext message in a manner that the master station system can decrypt the plaintext message under the condition that the plaintext message is the message requested to respond by the master station system to obtain a second ciphertext, sending the second ciphertext to the master station system, and discarding the plaintext message under the condition that the plaintext message is not the message requested to respond by the master station system.
Therefore, corresponding operation is carried out according to the content of the ciphertext message sent to the software security management application program by the external equipment, so that communication data interaction of the legal message received from the external equipment is realized. Therefore, the message sending object is judged, and the routing forwarding function is realized.
Optionally, the method of calling the embedded security control module and using the software security management application program to implement communication data interaction of the legitimate packet includes: after the metering module sends a ciphertext message to the software security management application program, sending the ciphertext message to the master station, wherein the ciphertext is a legal message; or after the metering module sends the ciphertext message to the software security management application program, decrypting the ciphertext message to obtain a plaintext message, and sending the plaintext message to the service application program in the management module; or after the metering module sends the ciphertext message to the software security management application program, the ciphertext message is decrypted to obtain a plaintext message, the plaintext is encrypted in a manner that the expansion module can decrypt the plaintext message to obtain a third ciphertext, and the third ciphertext is sent to the expansion module.
Specifically, after the metering module sends a ciphertext message to the software security management application program, the ciphertext message is sent to the master station, wherein the ciphertext is a legal message; or after the metering module sends the ciphertext message to the software security management application program, decrypting the ciphertext message to obtain a plaintext message, and sending the plaintext message to the service application program in the management module; or after the metering module sends the ciphertext message to the software security management application program, the ciphertext message is decrypted to obtain a plaintext message, the plaintext is encrypted in a manner that the expansion module can decrypt the plaintext message to obtain a third ciphertext, and the third ciphertext is sent to the expansion module. Therefore, corresponding operation is carried out according to the content of the ciphertext message sent to the software security management application program by the metering module, so that communication data interaction of the legal message received from the metering module is realized. Therefore, the message sending object is judged, and the routing forwarding function is achieved.
Optionally, the method of calling the embedded security control module and using the software security management application program to implement communication data interaction of the legitimate packet includes: after a service application program in a management module sends a plaintext message to a software security management application program, verifying authority information of the service application program, wherein the plaintext is a legal message; and under the condition that the verification information passes, encrypting the plaintext message and then sending the encrypted plaintext message to the external equipment, the metering module and the expansion module.
Specifically, referring to fig. 5, after the service application in the management module sends a plaintext message to the software security management application, the authority information of the service application is verified, where the plaintext is a legal message; and under the condition that the verification information passes, encrypting the plaintext message and then sending the encrypted plaintext message to the external equipment, the metering module and the expansion module. Therefore, corresponding operation is carried out according to the content of the plaintext message sent to the software security management application program by the management module, so that communication data interaction of the legal message received from the management module is realized. Therefore, the message sending object is judged, and the routing forwarding function is achieved.
Optionally, the method of calling the embedded security control module and using the software security management application program to implement communication data interaction of the legitimate packet includes: after the extension module sends a ciphertext message to the software security management application program, verifying the authority information of the extension module, wherein the ciphertext message is a legal message; and sending the ciphertext message to the external equipment and the metering module under the condition that the verification information passes.
Specifically, after the extension module sends a ciphertext message to the software security management application program, the authority information of the extension module is verified, wherein the ciphertext message is a legal message; and sending the ciphertext message to the external equipment and the metering module under the condition that the verification information passes. Therefore, corresponding operation is carried out according to the content of the plaintext message sent to the software security management application program by the expansion module, so that communication data interaction of the legal message received from the expansion module is realized. Therefore, the message sending object is judged, and the routing forwarding function is achieved.
Optionally, verifying the authority information of the service application includes: calculating the service application program by using a state cryptographic algorithm to obtain a calculation result; and signing the calculation result by using the software security management application program through the encryption machine, and adding the authority information of the service application program and the signature result at the tail of the service application program.
Specifically, a national cryptographic algorithm is used for calculating a service application program to obtain a calculation result; and signing the calculation result by using the software security management application program through the encryption machine, and adding the authority information of the service application program and the signature result at the tail of the service application program. Therefore, the authority information and the signature result are added to the service application program, and the safety is guaranteed.
Optionally, the method of calling the embedded security control module and using the software security management application program to implement communication data interaction of the legitimate packet includes: and providing data interfaces within a certain quantity range for communication data interaction of legal messages, wherein the data interfaces are data interfaces of the embedded safety control module.
Specifically, referring to table 1, data interfaces within a certain number range are provided for communication data interaction of a legal packet, where the data interfaces are data interfaces of an embedded security control module ESAM.
TABLE 1
Figure BDA0002669687080000101
Figure BDA0002669687080000111
Optionally, when the communication data interaction is implemented by using a software security management application, the method includes: in the process of realizing communication data interaction by using a software security management application program, determining that the authority information of a legal message passes verification under the condition that a data request of the legal message belongs to one or more data interfaces in a certain number range; and determining that the authority information verification of the legal message fails under the condition that the data request of the legal message does not belong to the data interfaces within a certain quantity range.
Specifically, in the process of realizing communication data interaction by using a software security management application program, under the condition that a data request of a legal message belongs to one or more data interfaces in a certain number range, the authority information of the legal message is determined to pass verification; and determining that the authority information verification of the legal message fails under the condition that the data request of the legal message does not belong to the data interfaces within a certain quantity range.
For example, in the process of implementing communication data interaction by using a software security management application, when a data request of a valid message belongs to one or more data interfaces among 16 data interfaces in table 1, it is determined that the authority information of the valid message passes verification, and when the data request of the valid message does not belong to 16 data interfaces, it is determined that the authority information of the valid message fails verification. Therefore, the data request and the accessed content of the legal message are ensured to be in a certain data range, and the content outside the provided interface cannot be accessed without being authorized.
Optionally, the method of calling the embedded security control module and using the software security management application program to implement communication data interaction of the legitimate packet includes: judging the security parameter level of the legal message; determining that the detection of the security mode of the legal message passes under the condition that the security parameter level of the legal message is greater than or equal to a preset threshold value, and processing the legal message passing the detection of the security mode; and under the condition that the legal security parameter level is less than a preset threshold value, determining that the detection of the security mode of the message of the service application program fails, and not processing the legal message of which the detection of the security mode fails.
Specifically, referring to fig. 6, the security parameter level of the legitimate packet is determined; determining that the detection of the security mode of the legal message passes under the condition that the security parameter level of the legal message is greater than or equal to a preset threshold value, and processing the legal message passing the detection of the security mode; and under the condition that the legal security parameter level is less than a preset threshold value, determining that the detection of the security mode of the message of the service application program fails, and not processing the legal message of which the detection of the security mode fails. And when the security level is higher than or equal to the security level with the lowest request requirement, the message is not processed. The security of the legal message is guaranteed.
Optionally, the method of calling the embedded security control module and using the software security management application program to implement communication data interaction of the valid message further includes: judging whether the data identification of the legal message meets the execution content; when the data identification information conforms to the reading or setting of the legal message, determining that the data identification of the legal message passes the detection, and processing the legal message passing the detection of the data identification; and when the data identification information is inconsistent with the reading or setting of the legal message, determining that the detection of the data identification of the legal message fails, and not processing the legal message of which the detection of the data identification fails.
Specifically, referring to fig. 7, it is determined whether the data identifier (OAD) of the legitimate packet satisfies the execution content; when the data identification information conforms to the reading or setting of the legal message, determining that the data identification of the legal message passes the detection; and when the data identification information is not in accordance with the reading or setting of the legal message, determining that the detection of the data identification of the legal message fails. Thereby screening out the legal messages meeting the execution content.
Further, referring to fig. 1, according to a second aspect of the present embodiment, there is provided a storage medium. The storage medium comprises a stored program, wherein the method of any of the above is performed by a processor when the program is run.
Therefore, according to the embodiment, the link layer format of the received message is checked by receiving messages sent by other modules of the intelligent electric meter and the external equipment, so that the qualified message with a qualified format is determined, the legality of the qualified message is verified, the legal message is obtained, the integrity and the correctness of the message are determined, and the message filtering is realized on the illegal message and the incomplete message. And finally, realizing communication data interaction of the legal message by using a software security management application program in a mode of calling the embedded security control module.
Therefore, the integrity and the correctness of the message are determined by checking the link layer format and verifying the legality of the message received from other modules and external equipment, and the message filtering is realized on the illegal message and the incomplete message. The embedded security control module ESAM is called to encrypt the plaintext message and decrypt the ciphertext message, so that the security of the message in the transmission process is ensured, and the security management is realized. And unified scheduling is performed on the embedded security control module ESAM, so that system management is realized. And then solve the technical problem that the ammeter brings new safe risk point after introducing the operating system among the prior art, how to prevent a plurality of APP unauthorized access, APP business safety credibility, each APP and hardware module communication and ESAM's scheduling problem.
It should be noted that, for simplicity of description, the above-mentioned method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present invention is not limited by the order of acts, as some steps may occur in other orders or concurrently in accordance with the invention. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required by the invention.
Through the description of the foregoing embodiments, it is clear to those skilled in the art that the method according to the foregoing embodiments may be implemented by software plus a necessary general hardware platform, and certainly may also be implemented by hardware, but the former is a better implementation mode in many cases. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (e.g., ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal device (e.g., a mobile phone, a computer, a server, or a network device) to execute the method according to the embodiments of the present invention.
Example 2
Fig. 8 shows an apparatus 800 for managing communication security of a smart meter according to the present embodiment, where the apparatus 800 corresponds to the method according to the first aspect of embodiment 1. Referring to fig. 8, the apparatus 800 includes: the receiving module 810 is used for receiving messages sent by other modules and external equipment, wherein the other modules are a metering module and an expansion module in the intelligent electric meter, and the intelligent electric meter comprises a metering module, a management module and an expansion module; a determining module 820, configured to check the link layer format of the packet, so as to determine a qualified packet with a qualified format, verify the validity of the qualified packet, and determine the qualified packet that passes the validity verification as a valid packet; and an interaction module 830, configured to implement communication data interaction of a legal message by using a software security management application program in a manner of calling the embedded security control module.
Optionally, the determining module 820 includes: the checking submodule is used for checking whether the frame head byte, the frame tail byte, the frame head check and the frame tail check of the message are correct or not; the unqualified submodule is used for determining that the message is an unqualified message under the condition that the frame header byte, the frame tail byte, the frame header check and the frame tail check of the message are incorrect, and discarding the unqualified message; and the qualified submodule is used for determining that the message is a qualified message under the condition that the frame header byte, the frame tail byte, the frame header check and the frame tail check of the message are correct.
A determination module 820 comprising: the verification submodule is used for verifying the legality of the logic address, the beginning, the end, the CS check bit, the client address, the communication address and the length of the qualified message; determining an illegal submodule, which is used for determining the qualified message as an illegal message under the condition that the legality of the logic address, the beginning, the end, the CS check bit, the client address, the communication address and the length of the qualified message is not verified; and the legal determining sub-module is used for determining the qualified message as a legal message under the condition that the legality of the logic address, the beginning, the end, the CS check bit, the client address, the communication address and the length of the qualified message passes the verification.
Optionally, the interaction module 830 includes: the software safety management application program runs on the management module, and the communication data interaction comprises communication data interaction among all service application programs in the management module, communication data interaction among all modules in the intelligent electric meter and communication data interaction between the intelligent electric meter and external equipment.
Optionally, the interaction module 830 includes: the first sending submodule is used for sending a ciphertext message to the metering module after the external equipment sends the ciphertext message to the software security management application program, wherein the ciphertext is a legal message; or the second sending submodule is used for decrypting the ciphertext message after the external equipment sends the ciphertext message to the software security management application program to obtain a plaintext message and sending the plaintext message to the service application program in the management module; or the third sending submodule is used for decrypting the ciphertext message after the external equipment sends the ciphertext message to the software security management application program to obtain a plaintext message, encrypting the plaintext message in a manner that the expansion module can decrypt to obtain a first ciphertext, and sending the first ciphertext to the expansion module; or the fourth sending submodule is used for decrypting the ciphertext message after the external device sends the ciphertext message to the software security management application program to obtain a plaintext message, judging whether the plaintext message is a message requested to respond by the master station system, encrypting the plaintext message in a manner that the master station system can decrypt the plaintext message under the condition that the plaintext message is the message requested to respond by the master station system to obtain a second ciphertext, sending the second ciphertext to the master station system, and discarding the plaintext message under the condition that the plaintext message is not the message requested to respond by the master station system.
Optionally, the interaction module 830 includes: the fifth sending submodule is used for sending the ciphertext message to the master station after the metering module sends the ciphertext message to the software security management application program, wherein the ciphertext is a legal message; or the sixth sending submodule is used for decrypting the ciphertext message after the metering module sends the ciphertext message to the software security management application program to obtain a plaintext message and sending the plaintext message to the service application program in the management module; or the seventh sending submodule is used for decrypting the ciphertext message after the metering module sends the ciphertext message to the software security management application program to obtain a plaintext message, encrypting the plaintext in a manner that the expansion module can decrypt the plaintext message to obtain a third ciphertext, and sending the third ciphertext to the expansion module.
Optionally, the interaction module 830 includes: the eighth sending submodule is used for verifying the authority information of the service application program after the service application program in the management module sends a plaintext message to the software security management application program, wherein the plaintext message is a legal message; and the ninth sending submodule is used for encrypting the plaintext message and then sending the encrypted plaintext message to the external equipment, the metering module and the expansion module under the condition that the verification information passes.
Optionally, the interaction module 830 includes: the tenth sending submodule is used for verifying the authority information of the extension module after the extension module sends the ciphertext message to the software security management application program, wherein the ciphertext message is a legal message; and the eleventh sending submodule is used for sending the ciphertext message to the external equipment and the metering module under the condition that the verification information passes.
Optionally, the eighth sending submodule includes: the computing unit is used for computing the service application program by utilizing a state cryptographic algorithm to obtain a computing result; and the signature unit is used for signing the calculation result through the encryption machine by utilizing the software security management application program and adding the authority information of the service application program and the signature result at the tail of the service application program.
Optionally, the interaction module 830 includes: and providing a submodule for providing a data interface within a certain quantity range for communication data interaction of a legal message, wherein the data interface is a data interface of the embedded safety control module.
Optionally, the interaction module 830 includes: the verification information passing sub-module is used for determining that the authority information of the legal message passes the verification under the condition that the data request of the legal message belongs to one or more data interfaces in a certain number range in the process of realizing communication data interaction by using the software security management application program; and the verification information failure sub-module is used for determining that the authority information verification of the legal message fails under the condition that the data request of the legal message does not belong to the data interfaces within a certain number range.
Optionally, the interaction module 830 includes: the judgment safety submodule is used for judging the safety parameter level of the legal message; the safety passing determining submodule is used for determining that the detection of the safety mode of the legal message passes and processing the legal message passing the detection of the safety mode under the condition that the safety parameter level of the legal message is greater than or equal to a preset threshold value; and the safety failure determining submodule is used for determining that the detection of the safety mode of the message of the service application program fails and not processing the legal message of which the detection of the safety mode fails under the condition that the legal safety parameter level is smaller than a preset threshold value.
Optionally, the interaction module 830 includes: the judging submodule is used for judging whether the data identification of the legal message meets the execution content or not; the identification passing submodule is used for determining that the data identification of the legal message passes the detection and processing the legal message passing the data identification detection when the data identification information conforms to the reading or setting of the legal message; and the identification failing submodule is used for determining that the detection of the data identification of the legal message fails and not processing the legal message of which the detection of the data identification fails when the data identification information is not in accordance with the reading or setting of the legal message.
Therefore, according to the embodiment, the link layer format of the received message is checked by receiving messages sent by other modules of the intelligent electric meter and the external equipment, so that the qualified message with a qualified format is determined, the legality of the qualified message is verified, the legal message is obtained, the integrity and the correctness of the message are determined, and the message filtering is realized on the illegal message and the incomplete message. And finally, realizing communication data interaction of the legal message by using a software security management application program in a mode of calling the embedded security control module.
Therefore, the integrity and the correctness of the message are determined by checking the link layer format and verifying the legality of the message received from other modules and external equipment, and the message filtering is realized on the illegal message and the incomplete message. The embedded security control module ESAM is called to encrypt the plaintext message and decrypt the ciphertext message, so that the security of the message in the transmission process is ensured, and the security management is realized. And unified scheduling is performed on the embedded security control module ESAM, so that system management is realized. And then solve the technical problem that the ammeter brings new safe risk point after introducing the operating system among the prior art, how to prevent a plurality of APP unauthorized access, APP business safety credibility, each APP and hardware module communication and ESAM's scheduling problem.
Example 3
Fig. 9 shows an apparatus 900 for managing communication security of a smart meter according to the present embodiment, where the apparatus 900 corresponds to the method according to the first aspect of embodiment 1. Referring to fig. 9, the apparatus 900 includes: a processor 910; and a memory 920 coupled to the processor 910 for providing instructions to the processor 910 to process the following steps: receiving messages sent by other modules and external equipment, wherein the other modules are a metering module and an expansion module in the intelligent electric meter, and the intelligent electric meter comprises a metering module, a management module and an expansion module; checking the link layer format of the message to determine a qualified message with a qualified format, verifying the legality of the qualified message, and determining the qualified message passing the legality verification as a legal message; and realizing communication data interaction of the legal message by using the software security management application program in a mode of calling the embedded security control module.
Optionally, checking the link layer format of the packet to determine a qualified packet with a qualified format includes: checking whether the header byte, the trailer byte, the header check and the trailer check of the message are correct or not; under the condition that the frame header byte, the frame tail byte, the frame header check and the frame tail check of the message are incorrect, determining that the message is an unqualified message, and discarding the unqualified message; and determining the message as a qualified message under the condition that the header byte, the tail byte, the header check and the tail check of the message are correct.
Optionally, verifying the validity of the qualified packet, and determining the qualified packet that passes the validity verification as a valid packet includes: verifying the legality of the logical address, the beginning, the end, the CS check bit, the client address, the communication address and the length of the qualified message; determining the qualified message as an illegal message under the condition that the legality of the logic address, the beginning, the end, the CS check bit, the client address, the communication address and the length of the qualified message is not verified; and determining the qualified message as a legal message under the condition that the legality of the logical address, the beginning, the end, the CS check bit, the client address, the communication address and the length of the qualified message is verified.
Optionally, the method of calling the embedded security control module and using the software security management application program to implement communication data interaction of the valid message includes: the software safety management application program runs on the management module, and the communication data interaction comprises communication data interaction among all service application programs in the management module, communication data interaction among all modules in the intelligent electric meter and communication data interaction between the intelligent electric meter and external equipment.
Optionally, the method of calling the embedded security control module and using the software security management application program to implement communication data interaction of the valid message includes: after sending a ciphertext message to the software security management application program, the external device sends the ciphertext message to the metering module, wherein the ciphertext is a legal message; or after the external equipment sends the ciphertext message to the software security management application program, decrypting the ciphertext message to obtain a plaintext message, and sending the plaintext message to the service application program in the management module; or after the external equipment sends the ciphertext message to the software security management application program, decrypting the ciphertext message to obtain a plaintext message, encrypting the plaintext message in a manner that the expansion module can decrypt the plaintext message to obtain a first ciphertext, and sending the first ciphertext to the expansion module; or after the external device sends the ciphertext message to the software security management application program, decrypting the ciphertext message to obtain a plaintext message, judging whether the plaintext message is a message requested to respond by the master station system, encrypting the plaintext message in a manner that the master station system can decrypt the plaintext message under the condition that the plaintext message is the message requested to respond by the master station system to obtain a second ciphertext, sending the second ciphertext to the master station system, and discarding the plaintext message under the condition that the plaintext message is not the message requested to respond by the master station system.
Optionally, the method of calling the embedded security control module and using the software security management application program to implement communication data interaction of the valid message includes: after the metering module sends a ciphertext message to the software security management application program, sending the ciphertext message to the master station, wherein the ciphertext is a legal message; or after the metering module sends the ciphertext message to the software security management application program, decrypting the ciphertext message to obtain a plaintext message, and sending the plaintext message to a service application program in the management module; or after the metering module sends the ciphertext message to the software security management application program, the ciphertext message is decrypted to obtain a plaintext message, the plaintext is encrypted in a manner that the expansion module can decrypt the plaintext message to obtain a third ciphertext, and the third ciphertext is sent to the expansion module.
Optionally, the method of calling the embedded security control module and using the software security management application program to implement communication data interaction of the valid message includes: after a service application program in a management module sends a plaintext message to a software security management application program, verifying authority information of the service application program, wherein the plaintext is a legal message; and under the condition that the verification information passes, encrypting the plaintext message and then sending the encrypted plaintext message to the external equipment, the metering module and the expansion module.
Optionally, the method of calling the embedded security control module and using the software security management application program to implement communication data interaction of the legitimate packet includes: after the extension module sends a ciphertext message to the software security management application program, verifying the authority information of the extension module, wherein the ciphertext message is a legal message; and sending the ciphertext message to the external equipment and the metering module under the condition that the verification information passes.
Optionally, verifying the authority information of the service application includes: calculating the service application program by using a state cryptographic algorithm to obtain a calculation result; and signing the calculation result by using the software security management application program through the encryption machine, and adding the authority information of the service application program and the signature result at the tail of the service application program.
Optionally, the method of calling the embedded security control module and using the software security management application program to implement communication data interaction of the legitimate packet includes: and providing data interfaces within a certain quantity range for communication data interaction of legal messages, wherein the data interfaces are data interfaces of the embedded safety control module.
Optionally, the communication data interaction is implemented by using a software security management application, including: in the process of realizing communication data interaction by using a software security management application program, determining that the authority information of a legal message passes verification under the condition that a data request of the legal message belongs to one or more data interfaces in a certain number range; and determining that the authority information verification of the legal message fails under the condition that the data request of the legal message does not belong to the data interfaces within a certain quantity range.
Optionally, the method of calling the embedded security control module and using the software security management application program to implement communication data interaction of the legitimate packet includes: judging the security parameter level of the legal message; determining that the detection of the security mode of the legal message passes under the condition that the security parameter level of the legal message is greater than or equal to a preset threshold value, and processing the legal message passing the detection of the security mode; and under the condition that the legal security parameter level is less than a preset threshold value, determining that the detection of the security mode of the message of the service application program fails, and not processing the legal message of which the detection of the security mode fails.
Optionally, the method of calling the embedded security control module and using the software security management application program to implement communication data interaction of the legitimate packet further includes: judging whether the data identification of the legal message meets the execution content; when the data identification information conforms to the reading or setting of the legal message, determining that the data identification of the legal message passes the detection, and processing the legal message passing the detection of the data identification; and when the data identification information is not in accordance with the reading or setting of the legal message, determining that the detection of the data identification of the legal message fails, and not processing the legal message of which the detection of the data identification fails.
Therefore, according to the embodiment, messages sent by other modules of the smart electric meter and external equipment are received, the link layer format of the received messages is checked, so that qualified messages with qualified formats are determined, the legality of the qualified messages is verified, legal messages are obtained, the integrity and correctness of the messages are determined, and message filtering is achieved for illegal messages and incomplete messages. And finally, realizing communication data interaction of legal messages by using a software security management application program in a mode of calling the embedded security control module.
Therefore, the integrity and the correctness of the message are determined by checking the link layer format and verifying the legality of the message received from other modules and external equipment, and the message filtering is realized on the illegal message and the incomplete message. The embedded security control module ESAM is called to encrypt the plaintext message and decrypt the ciphertext message, so that the security of the message in the transmission process is ensured, and the security management is realized. And unified scheduling is performed on the embedded security control module ESAM, so that system management is realized. And then solve the technical problem that the ammeter brings new safe risk point after introducing the operating system among the prior art, how to prevent a plurality of APP unauthorized access, APP business safety credibility, each APP and hardware module communication and ESAM's scheduling problem.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
In the above embodiments of the present invention, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the embodiments provided in the present application, it should be understood that the disclosed technology can be implemented in other ways. The above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only one type of division of logical functions, and there may be other divisions when actually implemented, for example, a plurality of units or components may be combined or may be integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, units or modules, and may be in an electrical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention, which is substantially or partly contributed by the prior art, or all or part of the technical solution may be embodied in a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to perform all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and other various media capable of storing program codes.
The foregoing is only a preferred embodiment of the present invention, and it should be noted that, for those skilled in the art, various modifications and decorations can be made without departing from the principle of the present invention, and these modifications and decorations should also be regarded as the protection scope of the present invention.

Claims (4)

1. A method for managing the communication security of a smart meter, said method operating on a management module of the smart meter, characterized in that it comprises:
receiving messages sent by other modules and external equipment, wherein the other modules are a metering module and an expansion module in the intelligent ammeter, and the intelligent ammeter comprises a metering module, a management module and an expansion module;
checking the link layer format of the message to determine a qualified message with a qualified format, verifying the legality of the qualified message, and determining the qualified message passing the legality verification as a legal message; and
the communication data interaction of the legal message is realized by using a software security management application program in a mode of calling an embedded security control module;
the method for realizing the communication data interaction of the legal message by using the software security management application program in a mode of calling the embedded security control module comprises the following steps:
the software safety management application program runs on the management module, and the communication data interaction comprises communication data interaction among all service application programs in the management module, communication data interaction among all modules in the intelligent electric meter and communication data interaction between the intelligent electric meter and external equipment;
after sending a ciphertext message to a software security management application program, an external device sends the ciphertext message to a metering module, wherein the ciphertext is a legal message; or alternatively
After sending a ciphertext message to a software security management application program, an external device decrypts the ciphertext message to obtain a plaintext message, and sends the plaintext message to a service application program in a management module; or
After sending a ciphertext message to a software security management application program, an external device decrypts the ciphertext message to obtain a plaintext message, encrypts the plaintext message in a manner that an expansion module can decrypt the plaintext message to obtain a first ciphertext, and sends the first ciphertext to the expansion module; or alternatively
After sending a ciphertext message to a software security management application program, an external device decrypts the ciphertext message to obtain a plaintext message, judges whether the plaintext message is a message requested to respond by a master station system, encrypts the plaintext message in a manner that the master station system can decrypt the plaintext message under the condition that the plaintext message is the message requested to respond by the master station system to obtain a second ciphertext, sends the second ciphertext to the master station system, and discards the plaintext message under the condition that the plaintext message is not the message requested to respond by the master station system;
after a metering module sends a ciphertext message to a software security management application program, sending the ciphertext message to a master station, wherein the ciphertext is a legal message; or
After the metering module sends a ciphertext message to a software security management application program, decrypting the ciphertext message to obtain a plaintext message, and sending the plaintext message to a service application program in the management module; or
After the metering module sends a ciphertext message to the software security management application program, decrypting the ciphertext message to obtain a plaintext message, encrypting the plaintext in a manner that the expansion module can decrypt the plaintext to obtain a third ciphertext, and sending the third ciphertext to the expansion module;
the method for realizing the communication data interaction of the legal message by using the software security management application program in a mode of calling the embedded security control module comprises the following steps:
after a service application program in a management module sends a plaintext message to a software security management application program, verifying authority information of the service application program, wherein the plaintext is a legal message; and
under the condition that the verification information passes, encrypting the plaintext message and then sending the encrypted plaintext message to external equipment, a metering module and an expansion module;
the method for realizing the communication data interaction of the legal message by using the software security management application program in a mode of calling the embedded security control module comprises the following steps:
after an extension module sends a ciphertext message to a software security management application program, verifying authority information of the extension module, wherein the ciphertext message is a legal message; and
under the condition that the verification information passes, sending the ciphertext message to external equipment and a metering module;
verifying the authority information of the service application program, including:
calculating the service application program by using a state cryptographic algorithm to obtain a calculation result; and
signing the calculation result by utilizing the software security management application program through an encryption machine, and adding authority information and a signature result of the service application program at the tail of the service application program;
the method for realizing the communication data interaction of the legal message by using the software security management application program in a mode of calling the embedded security control module comprises the following steps:
providing data interfaces within a certain quantity range for communication data interaction of the legal message, wherein the data interfaces are data interfaces of an embedded safety control module;
the communication data interaction is realized by utilizing a software safety management application program, and the method comprises the following steps:
in the process of realizing communication data interaction by using a software security management application program, determining that the authority information of the legal message passes verification under the condition that the data request of the legal message belongs to one or more data interfaces in the data interfaces within the certain number range; and
determining that the authority information verification of the legal message fails under the condition that the data request of the legal message does not belong to the data interfaces within the certain number range;
the method for realizing the communication data interaction of the legal message by using the software security management application program in a mode of calling the embedded security control module comprises the following steps:
judging the security parameter level of the legal message;
determining that the detection of the security mode of the legal message passes under the condition that the security parameter level of the legal message is greater than or equal to a preset threshold value, and processing the legal message passing the detection of the security mode; and
determining that the detection of the security mode of the message of the service application program fails under the condition that the legal security parameter level is smaller than a preset threshold value, and not processing the legal message which is detected to fail by the security mode;
the communication data interaction of the legal message is realized by using the software security management application program in a mode of calling the embedded security control module, and the method also comprises the following steps:
judging whether the data identification of the legal message meets the execution content;
when the data identification information conforms to the reading or setting of the legal message, determining that the data identification of the legal message passes the detection, and processing the legal message passing the data identification detection; and
and when the data identification information is not in accordance with the reading or setting of the legal message, determining that the detection of the data identification of the legal message fails, and not processing the legal message of which the detection of the data identification fails.
2. The method of claim 1, wherein examining the link layer format of the packet to determine a qualified packet that is qualified in format comprises:
checking whether the header byte, the trailer byte, the header check and the trailer check of the message are correct or not;
under the condition that the frame header byte, the frame tail byte, the frame header check and the frame tail check of the message are incorrect, determining that the message is an unqualified message, and discarding the unqualified message; and
and determining the message to be a qualified message under the condition that the header byte, the tail byte, the header check and the tail check of the message are correct.
3. The method of claim 1, wherein verifying the validity of the qualified message and determining the qualified message passing the validity verification as a valid message comprises:
verifying the legality of the logic address, the beginning, the end, the CS check bit, the client address, the communication address and the length of the qualified message;
determining the qualified message as an illegal message under the condition that the legality of the logic address, the beginning, the end, the CS check bit, the client address, the communication address and the length of the qualified message is not verified; and
and under the condition that the legality of the logic address, the beginning, the end, the CS check bit, the client address, the communication address and the length of the qualified message passes the verification, determining that the qualified message is a legal message.
4. An apparatus for managing communication security of a smart meter, comprising:
the intelligent ammeter comprises a receiving module, a processing module and a processing module, wherein the receiving module is used for receiving messages sent from other modules and external equipment, the other modules are a metering module and an expansion module in the intelligent ammeter, and the intelligent ammeter comprises a metering module, a management module and an expansion module;
the determining module is used for checking the link layer format of the message so as to determine a qualified message with a qualified format, verifying the legality of the qualified message and determining the qualified message passing the legality verification as a legal message; and
the interaction module is used for realizing communication data interaction of a legal message by using a software security management application program in a mode of calling the embedded security control module, wherein the software security management application program runs on the management module, and the communication data interaction comprises communication data interaction among all service application programs in the management module, communication data interaction among all modules in the intelligent ammeter and communication data interaction between the intelligent ammeter and external equipment;
an interaction module comprising:
the first sending submodule is used for sending a ciphertext message to the metering module after the external equipment sends the ciphertext message to the software security management application program, wherein the ciphertext is a legal message; or
The second sending submodule is used for decrypting the ciphertext message after the external equipment sends the ciphertext message to the software security management application program to obtain a plaintext message and sending the plaintext message to the service application program in the management module; or
The third sending submodule is used for decrypting the ciphertext message after the external equipment sends the ciphertext message to the software security management application program to obtain a plaintext message, encrypting the plaintext message in a manner that the expansion module can decrypt to obtain a first ciphertext, and sending the first ciphertext to the expansion module; or alternatively
The fourth sending sub-module is used for decrypting the ciphertext message after the external device sends the ciphertext message to the software security management application program to obtain a plaintext message, judging whether the plaintext message is a message requested to respond by the master station system, encrypting the plaintext message in a manner that the master station system can decrypt the plaintext message under the condition that the plaintext message is the message requested to respond by the master station system to obtain a second ciphertext, sending the second ciphertext to the master station system, and discarding the plaintext message under the condition that the plaintext message is not the message requested to respond by the master station system;
the fifth sending submodule is used for sending the ciphertext message to the master station after the metering module sends the ciphertext message to the software security management application program, wherein the ciphertext is a legal message; or alternatively
The sixth sending sub-module is used for decrypting the ciphertext message after the metering module sends the ciphertext message to the software security management application program to obtain a plaintext message, and sending the plaintext message to the service application program in the management module; or
The seventh sending submodule is used for decrypting the ciphertext message after the metering module sends the ciphertext message to the software security management application program to obtain a plaintext message, encrypting the plaintext in a manner that the expansion module can decrypt the plaintext message to obtain a third ciphertext, and sending the third ciphertext to the expansion module;
an interaction module comprising: the eighth sending submodule is used for verifying the authority information of the service application program after the service application program in the management module sends a plaintext message to the software security management application program, wherein the plaintext message is a legal message; the ninth sending submodule is used for encrypting the plaintext message and then sending the encrypted plaintext message to the external equipment, the metering module and the expansion module under the condition that the verification information passes;
an interaction module comprising: the tenth sending submodule is used for verifying the authority information of the extension module after the extension module sends the ciphertext message to the software security management application program, wherein the ciphertext message is a legal message; the eleventh sending submodule is used for sending the ciphertext message to the external equipment and the metering module under the condition that the verification information passes;
an eighth transmitting submodule comprising: the computing unit is used for computing the service application program by utilizing a state cryptographic algorithm to obtain a computing result; the signature unit is used for signing the calculation result by utilizing the software security management application program through the encryption machine and adding authority information and a signature result of the service application program at the tail of the service application program;
an interaction module comprising: providing a submodule for providing a data interface within a certain quantity range for communication data interaction of a legal message, wherein the data interface is a data interface of an embedded safety control module;
an interaction module comprising: the verification information passing sub-module is used for determining that the authority information of the legal message passes the verification under the condition that the data request of the legal message belongs to one or more data interfaces in a certain number range in the process of realizing communication data interaction by using the software security management application program; the verification information failure sub-module is used for determining that the authority information verification of the legal message fails under the condition that the data request of the legal message does not belong to the data interfaces within a certain number range;
an interaction module comprising: the safety judgment sub-module is used for judging the safety parameter level of the legal message; the safety passing determining submodule is used for determining that the detection of the safety mode of the legal message passes and processing the legal message passing the detection of the safety mode under the condition that the safety parameter level of the legal message is greater than or equal to a preset threshold value; and a security failure determining submodule, configured to determine that, when the level of the legal security parameter is smaller than a predetermined threshold, the detection of the security mode of the message of the service application program fails, and not process the legal message whose detection of the security mode fails;
an interaction module comprising: the judging submodule is used for judging whether the data identification of the legal message meets the execution content or not; the identification passing submodule is used for determining that the data identification of the legal message passes the detection and processing the legal message passing the data identification detection when the data identification information conforms to the reading or setting of the legal message; and the identification failing submodule is used for determining that the detection of the data identification of the legal message fails and not processing the legal message of which the detection of the data identification fails when the data identification information is not in accordance with the reading or setting of the legal message.
CN202010929442.XA 2020-09-07 2020-09-07 Method and device for managing communication security of intelligent electric meter Active CN112217795B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010929442.XA CN112217795B (en) 2020-09-07 2020-09-07 Method and device for managing communication security of intelligent electric meter

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010929442.XA CN112217795B (en) 2020-09-07 2020-09-07 Method and device for managing communication security of intelligent electric meter

Publications (2)

Publication Number Publication Date
CN112217795A CN112217795A (en) 2021-01-12
CN112217795B true CN112217795B (en) 2022-08-26

Family

ID=74049121

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010929442.XA Active CN112217795B (en) 2020-09-07 2020-09-07 Method and device for managing communication security of intelligent electric meter

Country Status (1)

Country Link
CN (1) CN112217795B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113038300B (en) * 2021-02-05 2023-05-26 宁波三星医疗电气股份有限公司 Modularized electric energy meter communication method and modularized electric energy meter applying same
CN113986359A (en) * 2021-09-26 2022-01-28 北京智芯微电子科技有限公司 Safe operating system suitable for smart electric meter
CN114301621B (en) * 2021-11-17 2024-06-14 北京智芯微电子科技有限公司 Intelligent transformer substation and network communication safety control method and device thereof
CN114244572B (en) * 2021-11-23 2022-08-19 慧之安信息技术股份有限公司 Internet of things security gateway method based on zero-copy message collection system
CN115175015A (en) * 2022-05-31 2022-10-11 海南电网有限责任公司海口供电局 Communication conversion method and system for remote switching on and off of electric energy meter

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN202305612U (en) * 2011-10-08 2012-07-04 江阴长仪集团有限公司 Intelligent electric energy meter with embedded safety control module
CN103679062A (en) * 2013-12-23 2014-03-26 上海贝岭股份有限公司 Intelligent electric meter main control chip and security encryption method
EP3122061A1 (en) * 2015-07-21 2017-01-25 Sagemcom Energy & Telecom Sas Transmission of encrypted data from smart electric meters
CN111488166A (en) * 2020-04-28 2020-08-04 南方电网数字电网研究院有限公司 Method and device for upgrading software of management unit of double-core intelligent ammeter and storage medium

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102074076B (en) * 2011-01-19 2013-10-16 四川电力科学研究院 Intelligent electric meter centralized recharging terminal and control method thereof
CN103033656B (en) * 2011-10-08 2015-06-03 江阴长仪集团有限公司 Intelligent electric energy meter with embedded type safety control module
CN105871873A (en) * 2016-04-29 2016-08-17 国家电网公司 Security encryption authentication module for power distribution terminal communication and method thereof
CN111060727A (en) * 2020-01-15 2020-04-24 广东电网有限责任公司电力科学研究院 Electric energy meter
CN111343199B (en) * 2020-04-28 2020-11-17 南方电网数字电网研究院有限公司 Communication method and system of double-core intelligent electric meter

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN202305612U (en) * 2011-10-08 2012-07-04 江阴长仪集团有限公司 Intelligent electric energy meter with embedded safety control module
CN103679062A (en) * 2013-12-23 2014-03-26 上海贝岭股份有限公司 Intelligent electric meter main control chip and security encryption method
EP3122061A1 (en) * 2015-07-21 2017-01-25 Sagemcom Energy & Telecom Sas Transmission of encrypted data from smart electric meters
CN111488166A (en) * 2020-04-28 2020-08-04 南方电网数字电网研究院有限公司 Method and device for upgrading software of management unit of double-core intelligent ammeter and storage medium

Also Published As

Publication number Publication date
CN112217795A (en) 2021-01-12

Similar Documents

Publication Publication Date Title
CN112217795B (en) Method and device for managing communication security of intelligent electric meter
US20070257813A1 (en) Secure network bootstrap of devices in an automatic meter reading network
US9900296B2 (en) Securing communication within a network endpoint
CN110598429B (en) Data encryption storage and reading method, terminal equipment and storage medium
CN111182527B (en) OTA (over the air) firmware upgrading method and device, terminal equipment and storage medium thereof
CN112688942B (en) Electric energy meter firmware program upgrading method, device, medium and equipment based on ESAM
CN112311718A (en) Method, device and equipment for detecting hardware and storage medium
CN113868713B (en) Data verification method and device, electronic equipment and storage medium
CN109302425B (en) Identity authentication method and terminal equipment
CN112367664B (en) Method and device for safely accessing external equipment into intelligent ammeter
CN113259315B (en) Communication message safety protection method and system suitable for power distribution network
CN109951416B (en) Credible verification method and terminal
CN110602218B (en) Method and related device for assembling cloud service in user-defined manner
CN103002430A (en) Method, device and system for binding terminal applications to terminal numbers
CN107846390B (en) Authentication method and device for application program
CN107294726B (en) Export, import and processing method, device and system of virtual encryption machine data
CN110875902A (en) Communication method, device and system
CN115344848A (en) Identification obtaining method, device, equipment and computer readable storage medium
CN107798520A (en) It is a kind of to cut machine method and apparatus for the anti-of POS terminal
CN104094274A (en) Method for personalizing security module for smart meter or smart meter gateway
CN106651555A (en) Method for online billing machine to share network, online billing machine, and system for online billing machine to share network
CN109948326B (en) Abnormal state backtracking method and terminal
CN108243034B (en) Fault determination method, receiver and transmitter
CN111555873B (en) Remote authentication method, device and system
CN112202725B (en) Service verification method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CB03 Change of inventor or designer information
CB03 Change of inventor or designer information

Inventor after: Li Baofeng

Inventor after: Wang Qi

Inventor after: Fu Yilun

Inventor after: Liu Shuyong

Inventor after: Ren Bo

Inventor after: Han Wenbo

Inventor after: Kong Lingda

Inventor after: Du Xingang

Inventor after: Zhai Feng

Inventor after: Ge Dehui

Inventor after: Liang Xiaobing

Inventor after: Zhou Hui

Inventor after: Xu Bin

Inventor after: Peng Chuning

Inventor after: Feng Zhancheng

Inventor before: Li Baofeng

Inventor before: Wang Qi

Inventor before: Fu Yilun

Inventor before: Liu Shuyong

Inventor before: Ren Bo

Inventor before: Han Wenbo

Inventor before: Kong Lingda

Inventor before: Du Xingang

Inventor before: Zhai Feng

Inventor before: Ge Dehui

Inventor before: Liang Xiaobing

Inventor before: Zhou Hui

Inventor before: Xu Bin

Inventor before: Peng Chuning

Inventor before: Feng Zhancheng