CN117749472A - Data encryption and transmission method for safety vision meter reading system - Google Patents

Data encryption and transmission method for safety vision meter reading system Download PDF

Info

Publication number
CN117749472A
CN117749472A CN202311743150.7A CN202311743150A CN117749472A CN 117749472 A CN117749472 A CN 117749472A CN 202311743150 A CN202311743150 A CN 202311743150A CN 117749472 A CN117749472 A CN 117749472A
Authority
CN
China
Prior art keywords
data
meter reading
code
cloud platform
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311743150.7A
Other languages
Chinese (zh)
Inventor
侯建勤
张艾森
王珩
余芸
何斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Institute of Process Automation Instrumentation
Original Assignee
Shanghai Institute of Process Automation Instrumentation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Institute of Process Automation Instrumentation filed Critical Shanghai Institute of Process Automation Instrumentation
Priority to CN202311743150.7A priority Critical patent/CN117749472A/en
Publication of CN117749472A publication Critical patent/CN117749472A/en
Pending legal-status Critical Current

Links

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Selective Calling Equipment (AREA)
  • Arrangements For Transmission Of Measured Signals (AREA)

Abstract

The invention provides a data encryption and transmission method for a secure visual meter reading system, and relates to the technical field of data encryption and transmission. The method comprises the following steps: the meter reading terminal encrypts meter reading data; the meter reading terminal performs identity authentication with the cloud platform; the encrypted data is transmitted to the cloud platform through the authenticated security channel by the combination rule; the meter reading terminal and the cloud platform carry out integrity verification on the received data in a verification mode; and the data receiving end decrypts the received data by using the corresponding rules and decryption keys. The data encryption and transmission method for the secure visual meter reading system can improve confidentiality, integrity and security of data, protect user privacy, prevent data tampering and illegal access and enhance the security and reliability of the system through technical means such as encryption, identity authentication, secure transmission, data integrity verification and the like.

Description

Data encryption and transmission method for safety vision meter reading system
Technical Field
The invention relates to the technical field of data encryption and transmission, in particular to a data encryption and transmission method for a safety vision meter reading system.
Background
Meter reading is an important task in the field of energy supply, such as electricity, gas and the like. In order to improve meter reading efficiency and accuracy, visual meter reading devices are widely used. However, as data transmission increases, data security issues become particularly important. Traditional data transmission methods are susceptible to unauthorized access, tampering, or theft. Therefore, a secure data encryption and transmission method is required to solve this problem.
Disclosure of Invention
The invention aims to provide a data encryption and transmission method for a safe vision meter reading system to solve the data encryption and transmission problems of the meter reading system.
In order to achieve the above purpose, the technical scheme adopted by the invention is as follows:
the invention provides a data encryption and transmission method for a secure visual meter reading system, which comprises the following steps:
s1, the meter reading terminal encrypts meter reading data;
s2, authenticating identities of the meter reading terminal and the cloud platform;
s3, the encrypted data are transmitted to the cloud platform through the authenticated security channel through the combination rule;
s4, the meter reading terminal and the cloud platform carry out integrity verification on the received data in a verification mode;
and S5, the data receiving end decrypts the received data by using the corresponding rules and the decryption key.
Optionally, in step S1, the encryption of the data is implemented using a cryptographic chip built in the meter reading terminal, and the cryptographic algorithm is SM4.
Optionally, step S2 includes:
recording identification information of a meter reading terminal at a cloud platform end in advance, wherein the identification information comprises ICCID information and IMEI information;
the meter reading terminal generates an authentication code by using ICCID information and a random code of the equipment through a specific encryption algorithm and sends the authentication code to the cloud platform end;
the cloud platform end obtains ICCID information of the equipment through a decryption algorithm and an agreed information rule, generates an authentication code according to an encryption rule, compares the authentication code with the received authentication code, and if the authentication code is consistent with the received authentication code, the authentication code passes authentication;
the cloud platform end finds corresponding IMEI information according to the received ICCID information, generates a verification code through an encryption algorithm by using a random code generated by the cloud platform end, and sends the verification code to the meter reading terminal;
the meter reading terminal obtains the random code through the agreed decryption mode, generates the verification code in the same mode, compares the verification code with the received verification code, and if the verification code is consistent with the received verification code, the verification code passes the authentication.
Optionally, step S3 includes:
the meter reading terminal utilizes ICCID information of the terminal, and the generated random code and encrypted data are sent to the cloud platform end after being subjected to custom packaging;
the cloud platform end obtains data by using an existing rule and appointed decryption method;
after the data is received, the cloud platform end packages the generated random code and the confirmation information into a response message and returns the response message to the meter reading terminal;
and the meter reading terminal analyzes the data according to the agreed rule, checks the integrity of the data packet, passes through the data packet consistently, and outputs the end of transmission.
Optionally, in step S4, the integrity verification includes: verification of data packet length bytes, verification of data packet sequence and verification of data packet check codes.
Alternatively, the random code is a dynamically generated one-time random code, and is generated by using a hash function.
The beneficial effects of the invention include:
the data encryption and transmission method for the safe visual meter reading system provided by the invention comprises the following steps: s1, the meter reading terminal encrypts meter reading data; s2, authenticating identities of the meter reading terminal and the cloud platform; s3, the encrypted data are transmitted to the cloud platform through the authenticated security channel through the combination rule; s4, the meter reading terminal and the cloud platform carry out integrity verification on the received data in a verification mode; and S5, the data receiving end decrypts the received data by using the corresponding rules and the decryption key. The data encryption and transmission method for the secure visual meter reading system can improve confidentiality, integrity and security of data, protect user privacy, prevent data tampering and illegal access and enhance the security and reliability of the system through technical means such as encryption, identity authentication, secure transmission, data integrity verification and the like.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings that are needed in the embodiments or the description of the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and that other drawings can be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a schematic flow chart of a data encryption and transmission method for a secure visual meter reading system according to an embodiment of the present invention;
FIG. 2 is a flowchart of authentication in a data encryption and transmission method for a secure visual meter reading system according to an embodiment of the present invention;
fig. 3 is a data security transmission flow chart in the data encryption and transmission method for the security vision meter reading system according to the embodiment of the invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Meter reading is an important task in the field of energy supply, such as electricity, gas and the like. In order to improve meter reading efficiency and accuracy, visual meter reading devices are widely used. However, as data transmission increases, data security issues become particularly important. Traditional data transmission methods are susceptible to unauthorized access, tampering, or theft. Therefore, a secure data encryption and transmission method is required to solve this problem.
The present invention provides an effective mechanism to protect the confidentiality and integrity of meter reading data. The method is suitable for meter reading work in various energy supply fields, and can ensure the safety of meter reading data in the transmission process.
As shown in fig. 1, the present invention provides a data encryption and transmission method for a secure visual meter reading system, the method comprising the steps of:
and S1, the meter reading terminal encrypts meter reading data.
This step is a data encryption step to ensure confidentiality and integrity of the data.
And S2, authenticating identities of the meter reading terminal and the cloud platform.
The step is an identity authentication step for ensuring that encrypted meter reading data is accessed by a legitimate user.
And S3, transmitting the encrypted data to the cloud platform through the authenticated secure channel by means of a combination rule.
This step is a secure transmission step for preventing data from being eavesdropped, tampered or falsified.
And S4, carrying out integrity verification on the received data by the meter reading terminal and the cloud platform in a verification mode.
This step is a data integrity verification step to ensure that the data transfer process has not been tampered with.
And S5, the data receiving end decrypts the received data by using the corresponding rules and the decryption key.
The step is a data decryption step for obtaining original meter reading data.
The data encryption and transmission method for the secure visual meter reading system can improve confidentiality, integrity and security of data, protect user privacy, prevent data tampering and illegal access and enhance the security and reliability of the system through technical means such as encryption, identity authentication, secure transmission, data integrity verification and the like.
Optionally, in step S1, the encryption of the data is implemented using a cryptographic chip built in the meter reading terminal, and the cryptographic algorithm is SM4. The national cipher chip has the safety performance and the hardware acceleration function, can provide efficient encryption operation, and performs encryption processing in the terminal immediately after meter reading data are acquired. The key used for encryption may be updated periodically to ensure long-term security of the data. The cryptographic algorithm SM4 is a symmetric encryption algorithm with high security and reliability.
The identity authentication in step S2 includes two steps of authentication code authentication and verification code authentication to ensure that only legal users can access the encrypted meter reading data, as shown in fig. 2, step S2 specifically includes:
step S201, identification information of a meter reading terminal is input in the cloud platform in advance.
The identification information includes ICCID information and IMEI information.
Step S202, the meter reading terminal generates an authentication code through a specific encryption algorithm by utilizing ICCID information of the equipment and sends the authentication code to the cloud platform end.
Step S203, the cloud platform end obtains ICCID information and random codes of the equipment through a decryption algorithm and agreed information rules, generates an authentication code according to encryption rules, compares the authentication code with the received authentication code, and if the authentication code is consistent with the received authentication code, the authentication code passes authentication.
Step S204, the cloud platform end finds corresponding IMEI information according to the received ICCID information, generates a verification code through an encryption algorithm by the random code generated by the cloud platform end, and sends the verification code to the meter reading terminal.
Step S205, the meter reading terminal obtains the random code through the agreed decryption mode, generates the verification code in the same mode (the same mode as that in the step S204), compares the verification code with the received verification code, and if the verification code is consistent with the received verification code, the verification code passes the authentication.
So far, the two-way authentication is finished, and the identity authentication is passed.
Optionally, the random code generated by the meter reading terminal is a dynamically generated disposable random code, and is generated by adopting a hash function, so that the safety in the data transmission process is enhanced and replay attack is prevented.
Optionally, the secure authentication channel in step S3 is a channel after S2 identity authentication, as shown in fig. 3, step S3 specifically includes:
and step S301, the meter reading terminal utilizes ICCID information of the terminal and the generated random code and encrypted data to send the random code and the encrypted data to the cloud platform terminal after custom packaging.
Step S302, the cloud platform end acquires data by using an existing rule and appointed decryption method.
And step S303, after the data is received, the cloud platform end packages the data into a response message by utilizing the generated random code and the confirmation information and returns the response message to the meter reading terminal.
And S304, the meter reading terminal analyzes the data according to the agreed rule, verifies the integrity of the data packet, passes the consistency, and outputs the transmission end.
Optionally, in step S4, the integrity verification includes: verification of data packet length bytes, verification of data packet sequence and verification of data packet check codes. Specifically, in order to ensure the integrity of the data in the transmission process, the integrity of the data packet is checked, three ways of integrity check are provided in this embodiment, the length of the data packet is checked, the time stamp and the serial number are added to the data packet to check the verification code of the data packet, and it is ensured that the received data packet is not tampered and is complete.
Alternatively, the decryption above obtains the data using a decryption method of a given rule and convention.
In summary, the method of the application ensures the safety of the data in the steps of acquisition, transmission and processing by combining with various safety technologies, effectively prevents the data from being illegally eavesdropped, tampered or forged, and ensures the safety and reliability of the meter reading system.
The above embodiments are only for illustrating the technical concept and features of the present invention, and are intended to enable those skilled in the art to understand the content of the present invention and implement the same, but not limit the scope of the present invention, and all equivalent changes or modifications made according to the spirit of the present invention should be included in the scope of the present invention.

Claims (6)

1. A data encryption and transmission method for a secure visual meter reading system, the method comprising the steps of:
s1, the meter reading terminal encrypts meter reading data;
s2, authenticating identities of the meter reading terminal and the cloud platform;
s3, the encrypted data are transmitted to the cloud platform through the authenticated security channel through the combination rule;
s4, the meter reading terminal and the cloud platform carry out integrity verification on the received data in a verification mode;
and S5, the data receiving end decrypts the received data by using the corresponding rules and the decryption key.
2. The method for encrypting and transmitting data for a secure visual meter reading system according to claim 1, wherein in step S1, the encryption of data is implemented using a cryptographic chip built in a meter reading terminal, and the cryptographic algorithm is SM4.
3. The data encryption and transmission method for a secure visual meter reading system according to claim 1, wherein step S2 comprises:
recording identification information of a meter reading terminal at a cloud platform end in advance, wherein the identification information comprises ICCID information and IMEI information;
the meter reading terminal generates an authentication code by using ICCID information and a random code of the equipment through a specific encryption algorithm and sends the authentication code to the cloud platform end;
the cloud platform end obtains ICCID information of the equipment through a decryption algorithm and an agreed information rule, generates an authentication code according to an encryption rule, compares the authentication code with the received authentication code, and if the authentication code is consistent with the received authentication code, the authentication code passes authentication;
the cloud platform end finds corresponding IMEI information according to the received ICCID information, generates a verification code through an encryption algorithm by using a random code generated by the cloud platform end, and sends the verification code to the meter reading terminal;
the meter reading terminal obtains the random code through the agreed decryption mode, generates the verification code in the same mode, compares the verification code with the received verification code, and if the verification code is consistent with the received verification code, the verification code passes the authentication.
4. A data encryption and transmission method for a secure visual meter reading system according to claim 3, wherein step S3 comprises:
the meter reading terminal utilizes ICCID information of the terminal, and the generated random code and encrypted data are sent to the cloud platform end after being subjected to custom packaging;
the cloud platform end obtains data by using an existing rule and appointed decryption method;
after the data is received, the cloud platform end packages the generated random code and the confirmation information into a response message and returns the response message to the meter reading terminal;
and the meter reading terminal analyzes the data according to the agreed rule, checks the integrity of the data packet, passes through the data packet consistently, and outputs the end of transmission.
5. The method for encrypting and transmitting data for a secure visual meter reading system according to claim 1, wherein in step S4, the integrity verification comprises: verification of data packet length bytes, verification of data packet sequence and verification of data packet check codes.
6. The method for encrypting and transmitting data for a secure visual meter reading system according to claim 3 or 4, wherein said random code is a dynamically generated one-time random code and is generated by a hash function.
CN202311743150.7A 2023-12-18 2023-12-18 Data encryption and transmission method for safety vision meter reading system Pending CN117749472A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311743150.7A CN117749472A (en) 2023-12-18 2023-12-18 Data encryption and transmission method for safety vision meter reading system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311743150.7A CN117749472A (en) 2023-12-18 2023-12-18 Data encryption and transmission method for safety vision meter reading system

Publications (1)

Publication Number Publication Date
CN117749472A true CN117749472A (en) 2024-03-22

Family

ID=90250297

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311743150.7A Pending CN117749472A (en) 2023-12-18 2023-12-18 Data encryption and transmission method for safety vision meter reading system

Country Status (1)

Country Link
CN (1) CN117749472A (en)

Similar Documents

Publication Publication Date Title
CN101917270B (en) Weak authentication and key agreement method based on symmetrical password
Nyang et al. Improvement of Das's two-factor authentication protocol in wireless sensor networks
CN110519309B (en) Data transmission method, device, terminal, server and storage medium
CN109559122A (en) Block chain data transmission method and block chain data transmission system
KR101753859B1 (en) Server and method for managing smart home environment thereby, method for joining smart home environment and method for connecting communication session with smart device
CN108418691A (en) Dynamic network identity identifying method based on SGX
KR20200012845A (en) Progressive Key Encryption Algorithm
CN111614621B (en) Internet of things communication method and system
CN104796265A (en) Internet-of-things identity authentication method based on Bluetooth communication access
CN102196375A (en) Securing out-of-band messages
CN106973056A (en) The safety chip and its encryption method of a kind of object-oriented
CN108323230B (en) Method for transmitting key, receiving terminal and distributing terminal
CN108809936B (en) Intelligent mobile terminal identity verification method based on hybrid encryption algorithm and implementation system thereof
CN110955918A (en) Contract text protection method based on RSA encrypted sha-256 digital signature
CN102255727A (en) Improved anti-attacking intelligent card authentication method based on user defined algorithm environment
KR102219086B1 (en) HMAC-based source authentication and secret key sharing method and system for Unnamed Aerial vehicle systems
CN113591109B (en) Method and system for communication between trusted execution environment and cloud
CN109922022A (en) Internet of Things communication means, platform, terminal and system
CN112968774B (en) Method, device storage medium and equipment for encrypting and decrypting configuration file
CN102056156B (en) Computer Data Security is downloaded to the method and system of mobile terminal
Luring et al. Analysis of security features in DLMS/COSEM: Vulnerabilities and countermeasures
CN117335989A (en) Safety application method in internet system based on national cryptographic algorithm
CN114978769B (en) Unidirectional leading-in device, unidirectional leading-in method, unidirectional leading-in medium and unidirectional leading-in equipment
CN110995671A (en) Communication method and system
CN117749472A (en) Data encryption and transmission method for safety vision meter reading system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination