TWI764146B - Data reading method, device, measuring device and server - Google Patents

Data reading method, device, measuring device and server

Info

Publication number
TWI764146B
TWI764146B TW109115222A TW109115222A TWI764146B TW I764146 B TWI764146 B TW I764146B TW 109115222 A TW109115222 A TW 109115222A TW 109115222 A TW109115222 A TW 109115222A TW I764146 B TWI764146 B TW I764146B
Authority
TW
Taiwan
Prior art keywords
data
identification
metering
beacon information
server
Prior art date
Application number
TW109115222A
Other languages
Chinese (zh)
Other versions
TW202121186A (en
Inventor
宋宜濤
Original Assignee
大陸商支付寶(杭州)信息技術有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 大陸商支付寶(杭州)信息技術有限公司 filed Critical 大陸商支付寶(杭州)信息技術有限公司
Publication of TW202121186A publication Critical patent/TW202121186A/en
Application granted granted Critical
Publication of TWI764146B publication Critical patent/TWI764146B/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Arrangements For Transmission Of Measured Signals (AREA)
  • Selective Calling Equipment (AREA)
  • Telephonic Communication Services (AREA)

Abstract

本說明書實施例揭示了一種資料讀取方法、裝置、計量設備和伺服器。透過獲取計量設備上的計量資料,基於所述計量資料、識別標識以及第一時間戳產生第一加密資料,然後將包括所述計量資料、所述第一加密資料以及所述識別標識的信標資訊發送至終端設備;終端設備將接收到的信標資訊發送至伺服器;伺服器基於識別標識、計量資料以及接收到所述信標資訊時對應的第二時間戳產生第二加密資料,並比較所述第二加密資料與所述第一加密資料,在比較結果符合記錄要求時記錄所述計量資料。本方法提供的資料讀取的實施方案,可以實現低功耗、低成本、高效率、高安全性的讀取設備資料。 The embodiments of this specification disclose a data reading method, device, measuring device and server. By acquiring the metering data on the metering device, first encrypted data is generated based on the metering data, the identification and the first time stamp, and then the beacon including the metering data, the first encrypted data and the identification The information is sent to the terminal device; the terminal device sends the received beacon information to the server; the server generates the second encrypted data based on the identification identifier, the measurement data and the corresponding second timestamp when the beacon information is received, and Comparing the second encrypted data with the first encrypted data, and recording the measurement data when the comparison result meets the recording requirements. The implementation scheme of data reading provided by the method can realize low power consumption, low cost, high efficiency and high security for reading device data.

Description

資料讀取方法、裝置、計量設備和伺服器Data reading method, device, measuring device and server

本說明書實施例方案屬於資料處理的技術領域,特別有關一種資料讀取方法、裝置、計量設備和伺服器。The solutions of the embodiments of the present specification belong to the technical field of data processing, and particularly relate to a data reading method, device, measuring device and server.

計量表的讀數可以為相關部門收費和調配資源等提供重要參考。許多地區獲取計量表的讀數均以傳統手工抄表方式為主,然而手工抄表方式不僅需要工作人員親自入戶抄表,而且可能需要光線以及爬高,這樣就會造成工作量大、工作效率低下等問題。 隨著科學技術的發展,傳統人工逐戶抄表的方式逐漸被自動抄表所取代。自動抄表無需人工參與,其主要是透過與計量表相連接的採集器獲取計量表的讀數,然後採集器將獲取的讀數發送至集中器,集中器將所管轄的計量表的讀數進行匯總後發送到資料管理中心。可見,自動抄表可一次抄讀多個用戶的電錶、水錶、氣表、熱量表等計量表的資訊,抄表快捷方便。然而,自動抄表過程中,採集器將獲取的資料發送至集中器以及集中器將匯總後的計量表的讀數發送到資料管理中心時都可能會被惡意篡改,導致最終獲取的資料不是真實資料。 因此,業內亟需一種可以高效的、安全的獲取計量表資料的解決方案。The reading of the meter can provide an important reference for the relevant departments to charge and allocate resources. In many areas, the traditional manual meter reading method is the main method to obtain the reading of the meter low issues. With the development of science and technology, the traditional manual meter reading method from household to household is gradually replaced by automatic meter reading. Automatic meter reading does not require manual participation. It mainly obtains the readings of the meters through the collector connected to the meter, and then the collector sends the acquired readings to the concentrator, and the concentrator aggregates the readings of the meters under its jurisdiction. sent to the data management center. It can be seen that automatic meter reading can read the information of multiple users' electricity meters, water meters, gas meters, heat meters and other meters at one time, and meter reading is fast and convenient. However, in the process of automatic meter reading, when the collector sends the acquired data to the concentrator and the concentrator sends the aggregated meter readings to the data management center, they may be maliciously tampered with, resulting in the final acquired data not being real data. . Therefore, there is an urgent need in the industry for a solution that can efficiently and safely acquire meter data.

本說明書實施例在於提供一種資料讀取方法、裝置、計量設備和伺服器,可以低功耗、低成本、高效率、高安全性的完成設備資料讀取。 本說明書實施例提供的一種資料讀取方法、裝置、計量設備和伺服器是包括以下方式實現的: 一種資料讀取方法,所述方法包括: 獲取計量設備上的計量資料,基於所述計量資料、識別標識以及第一時間戳產生第一加密資料,所述第一時間戳包括計量設備獲取所述計量資料時所對應的時間; 所述計量設備發送信標資訊至終端設備,所述信標資訊包括所述計量資料、所述第一加密資料以及所述識別標識; 所述終端設備將所述信標資訊發送至伺服器; 所述伺服器基於所述識別標識、所述計量資料以及接收到所述信標資訊時對應的第二時間戳產生第二加密資料; 所述伺服器比較所述第二加密資料與所述第一加密資料,在比較結果符合記錄要求時記錄所述計量資料。 一種資料讀取方法,所述方法包括: 接收信標資訊,所述信標資訊包括計量資料、第一加密資料以及識別標識,所述第一加密資料基於所述計量資料、識別標識以及第一時間戳產生,所述第一時間戳包括計量設備獲取所述計量資料時所對應的時間; 基於所述識別標識、所述計量資料以及接收到所述信標資訊時對應的第二時間戳產生第二加密資料; 比較所述第二加密資料與所述第一加密資料,在比較結果符合記錄要求時記錄所述計量資料。 一種資料讀取方法,所述方法包括: 獲取計量資料,基於所述計量資料、識別標識以及第一時間戳產生第一加密資料,所述第一時間戳包括計量設備獲取所述計量資料時所對應的時間; 發送信標資訊至伺服器,所述信標資訊包括所述計量資料、所述第一加密資料以及所述識別標識,以使所述伺服器基於所述識別標識、所述計量資料以及接收到所述信標資訊時對應的第二時間戳產生第二加密資料,並在確定所述第二加密資料與所述第一加密資料的比較結果符合記錄要求時記錄所述計量資料。 一種資料讀取裝置,所述裝置包括: 接收模組,用於接收信標資訊,所述信標資訊包括計量資料、第一加密資料以及識別標識,所述第一加密資料基於所述計量資料、識別標識以及第一時間戳產生,所述第一時間戳包括計量設備獲取所述計量資料時所對應的時間; 第一產生模組,用於基於所述識別標識、所述計量資料以及接收到所述信標資訊時對應的第二時間戳產生第二加密資料; 比較模組,用於比較所述第二加密資料與所述第一加密資料,在比較結果符合記錄要求時記錄所述計量資料。 一種資料讀取裝置,所述裝置包括: 第二產生模組,用於獲取計量資料,基於所述計量資料、識別標識以及第一時間戳產生第一加密資料,所述第一時間戳包括計量設備獲取所述計量資料時所對應的時間; 發送模組,用於發送信標資訊至伺服器,所述信標資訊包括所述計量資料、所述第一加密資料以及所述識別標識,以使所述伺服器基於所述識別標識、所述計量資料以及接收到所述信標資訊時對應的第二時間戳產生第二加密資料,並在確定所述第二加密資料與所述第一加密資料的比較結果符合記錄要求時記錄所述計量資料。 一種伺服器,包括處理器以及用於儲存處理器可執行指令的記憶體,所述處理器執行所述指令時實現: 接收信標資訊,所述信標資訊包括計量資料、第一加密資料以及識別標識,所述第一加密資料基於所述計量資料、識別標識以及第一時間戳產生,所述第一時間戳包括計量設備獲取所述計量資料時所對應的時間; 基於所述識別標識、所述計量資料以及接收到所述信標資訊時對應的第二時間戳產生第二加密資料; 比較所述第二加密資料與所述第一加密資料,在比較結果符合記錄要求時記錄所述計量資料。 一種計量設備,包括處理器以及用於儲存處理器可執行指令的記憶體,所述處理器執行所述指令時實現: 獲取計量資料,基於所述計量資料、識別標識以及第一時間戳產生第一加密資料,所述第一時間戳包括計量設備獲取所述計量資料時所對應的時間; 發送信標資訊至伺服器,所述信標資訊包括所述計量資料、所述第一加密資料以及所述識別標識,以使所述伺服器基於所述識別標識、所述計量資料以及接收到所述信標資訊時對應的第二時間戳產生第二加密資料,並在確定所述第二加密資料與所述第一加密資料的比較結果符合記錄要求時記錄所述計量資料。 一種資料讀取系統,包括計量設備和伺服器, 所述計量設備獲取計量資料,基於所述計量資料、識別標識以及第一時間戳產生第一加密資料,發送信標資訊至伺服器,所述第一時間戳包括計量設備獲取所述計量資料時所對應的時間,所述信標資訊包括所述計量資料、所述第一加密資料以及所述識別標識; 所述伺服器接收所述信標資訊,並基於所述識別標識、所述計量資料以及接收到所述信標資訊時對應的第二時間戳產生第二加密資料,比較所述第二加密資料與所述第一加密資料,在比較結果符合記錄要求時記錄所述計量資料。 一種資料讀取方法,所述方法包括: 獲取計量設備上的計量資料,基於所述計量資料、識別標識以及第一時間戳產生第一加密資料,所述第一時間戳包括計量設備獲取所述計量資料時所對應的時間; 所述計量設備發送信標資訊至伺服器,所述信標資訊包括所述計量資料、所述第一加密資料以及所述識別標識; 所述伺服器基於所述識別標識、所述計量資料以及接收到所述信標資訊時對應的第二時間戳產生第二加密資料; 所述伺服器比較所述第二加密資料與所述第一加密資料,在比較結果符合記錄要求時記錄所述計量資料。 本說明書實施例提供的一種資料讀取方法、裝置、計量設備和伺服器。一些實施例中計量設備把自身的計量資料加密後進行廣播,伺服器在收到資訊後,基於對應的資訊進行加密,並將加密資料與接收到的加密資料進行比較。這樣,無需抄表人員肉眼觀測或上門觀測,便可以獲取各個計量設備的計量資料,從而可以保證伺服器記錄資料真實性的同時,也可以有效解決資料傳輸過程中被惡意篡改的問題,提高資料讀取的安全性。The embodiments of the present specification provide a data reading method, device, metering device and server, which can complete device data reading with low power consumption, low cost, high efficiency and high security. A data reading method, device, measuring device, and server provided by the embodiments of this specification are implemented in the following ways: A data reading method, the method comprises: Acquiring measurement data on the measurement device, and generating first encrypted data based on the measurement data, the identification identifier and a first time stamp, where the first time stamp includes the time corresponding to when the measurement device acquired the measurement data; The metering device sends beacon information to the terminal device, and the beacon information includes the metering data, the first encrypted data and the identification; The terminal device sends the beacon information to the server; generating, by the server, second encrypted data based on the identification identifier, the metering data, and a second timestamp corresponding to when the beacon information is received; The server compares the second encrypted data with the first encrypted data, and records the measurement data when the comparison result meets the recording requirement. A data reading method, the method comprises: Receive beacon information, where the beacon information includes measurement data, first encrypted data, and an identification, the first encrypted data is generated based on the measurement data, the identification, and a first timestamp, and the first timestamp includes The time corresponding to when the metering device obtains the metering data; generating second encrypted data based on the identification identifier, the metering data, and a second timestamp corresponding to when the beacon information is received; Comparing the second encrypted data with the first encrypted data, and recording the measurement data when the comparison result meets the recording requirements. A data reading method, the method comprises: Acquiring measurement data, and generating first encrypted data based on the measurement data, the identification identifier, and a first time stamp, where the first time stamp includes the time corresponding to when the measurement device acquired the measurement data; Sending beacon information to a server, the beacon information including the metering data, the first encrypted data, and the identifier, so that the server can base the server on the identifier, the metering data, and the received The second time stamp corresponding to the beacon information generates second encrypted data, and the measurement data is recorded when it is determined that the comparison result between the second encrypted data and the first encrypted data meets the recording requirements. A data reading device, the device includes: The receiving module is used for receiving beacon information, the beacon information includes measurement data, first encrypted data and an identification mark, the first encrypted data is generated based on the measurement data, the identification mark and the first time stamp, so The first time stamp includes the time corresponding to when the metering device acquires the metering data; a first generating module, configured to generate second encrypted data based on the identification, the measurement data, and a second timestamp corresponding to the beacon information when the beacon information is received; The comparison module is used for comparing the second encrypted data with the first encrypted data, and recording the measurement data when the comparison result meets the recording requirements. A data reading device, the device includes: The second generation module is used for acquiring measurement data, and generating first encrypted data based on the measurement data, the identification identifier and the first time stamp, where the first time stamp includes the time corresponding to when the measurement device acquired the measurement data ; The sending module is used for sending beacon information to the server, the beacon information includes the measurement data, the first encrypted data and the identification mark, so that the server is based on the identification mark, the identification mark The measurement data and the corresponding second timestamp when the beacon information is received generate second encrypted data, and when it is determined that the comparison result between the second encrypted data and the first encrypted data meets the recording requirements, record the measurement data. A server, comprising a processor and a memory for storing processor-executable instructions, when the processor executes the instructions, it realizes: Receive beacon information, where the beacon information includes measurement data, first encrypted data, and an identification, the first encrypted data is generated based on the measurement data, the identification, and a first timestamp, and the first timestamp includes The time corresponding to when the metering device obtains the metering data; generating second encrypted data based on the identification identifier, the metering data, and a second timestamp corresponding to when the beacon information is received; Comparing the second encrypted data with the first encrypted data, and recording the measurement data when the comparison result meets the recording requirements. A metering device, comprising a processor and a memory for storing processor-executable instructions, when the processor executes the instructions, it realizes: Acquiring measurement data, and generating first encrypted data based on the measurement data, the identification identifier, and a first time stamp, where the first time stamp includes the time corresponding to when the measurement device acquired the measurement data; Sending beacon information to a server, the beacon information including the metering data, the first encrypted data, and the identifier, so that the server can base the server on the identifier, the metering data, and the received The second time stamp corresponding to the beacon information generates second encrypted data, and the measurement data is recorded when it is determined that the comparison result between the second encrypted data and the first encrypted data meets the recording requirements. A data reading system, including measuring equipment and a server, The metering device acquires the metering data, generates the first encrypted data based on the metering data, the identification identifier and the first timestamp, and sends the beacon information to the server, the first timestamp includes the time when the metering device acquires the metering data At the corresponding time, the beacon information includes the measurement data, the first encrypted data and the identification identifier; The server receives the beacon information, and generates second encrypted data based on the identification identifier, the measurement data, and a second timestamp corresponding to when the beacon information is received, and compares the second encrypted data The measurement data is recorded when the comparison result meets the recording requirement with the first encrypted data. A data reading method, the method comprises: Acquiring measurement data on the measurement device, and generating first encrypted data based on the measurement data, the identification identifier and a first time stamp, where the first time stamp includes the time corresponding to when the measurement device acquired the measurement data; The metering device sends beacon information to the server, and the beacon information includes the metering data, the first encrypted data and the identification; generating, by the server, second encrypted data based on the identification identifier, the metering data, and a second timestamp corresponding to when the beacon information is received; The server compares the second encrypted data with the first encrypted data, and records the measurement data when the comparison result meets the recording requirement. Embodiments of this specification provide a data reading method, device, measuring device, and server. In some embodiments, the metering device encrypts its own metering data and broadcasts it. After receiving the information, the server encrypts the data based on the corresponding information, and compares the encrypted data with the received encrypted data. In this way, the measurement data of each metering device can be obtained without the need for the meter reader to observe with the naked eye or door-to-door observation, thereby ensuring the authenticity of the data recorded by the server, and also effectively solving the problem of malicious tampering during the data transmission process. Read security.

為了使本技術領域的人員更好地理解本說明書中的技術方案,下面將結合本說明書實施例中的圖式,對本說明書實施例中的技術方案進行清楚、完整地描述,顯然,所描述的實施例僅僅是本說明書中的一部分實施例,而不是全部的實施例。基於本說明書中的一個實施例或多個實施例,本發明所屬技術領域中具有通常知識者在沒有做出創造性勞動前提下所獲得的所有其他實施例,都應當屬於本說明書實施例保護的範圍。 本說明書提供的一種實施方案可以應用到計量設備/終端設備/伺服器的系統構架中。所述計量設備可以包括需要讀取自身資料的設備,如水錶、電錶或者燃氣表等。所述計量設備可以包括通訊模組,可以與終端設備透過藍牙或WiFi進行連接和資料傳輸,也可以與遠端的伺服器進行通訊連接,實現與所述伺服器的資料傳輸。所述終端設備可以包括通訊模組,可以與計量設備透過藍牙或WiFi進行連接和資料傳輸,也可以與遠端的伺服器進行通訊連接,實現與所述伺服器的資料傳輸。所述終端設備可以包括行動終端,如智慧型手機或平板電腦等。所述伺服器可以包括單台電腦設備,也可以包括多個伺服器組成的伺服器集群,或者分散式系統的伺服器結構。本說明書實施例中所述的伺服器、計量設備、終端設備包括從邏輯上劃分的不同資訊處理方。 如圖1所示,圖1是本說明書提供的一種資料讀取方法的一個場景示意圖。其中,水錶、電錶或者燃氣表等計量設備以及智慧型手機或平板電腦等終端設備包括藍牙模組,計量設備與終端設備之間可以透過藍牙進行連接和資料傳輸,且該計量設備處於從模式,用來廣播信標資訊。終端設備可以與遠端的伺服器進行通訊連接,從而實現與伺服器的資料傳輸。一些實施場景中,當需要獲取計量設備中的資料時,計量設備可以將自身的計量資料加密後透過藍牙的方式進行廣播,終端設備可以在預設距離範圍內且觸發了指定應用的匹配指令時,建立與計量設備的通訊連接,然後將接收到的信標資訊進行匯總後發送至伺服器,伺服器在接收到匯總資訊後,進行對應的驗證,驗證透過後記錄計量資料。這樣,無需抄表人員肉眼觀測或上門觀測,便可以獲取各個計量設備的計量資料,從而可以保證伺服器記錄的資料的真實性的同時,可以有效解決資料傳輸過程中被惡意篡改的問題,提高資料讀取的安全性。 下面以一個具體的應用場景為例對本說明書實施方案進行說明。具體地,圖2是本說明書提供的所述一種資料讀取方法實施例的流程示意圖。雖然本說明書提供了如下述實施例或圖式所示的方法操作步驟或裝置結構,但基於常規或者無需創造性的勞動在所述方法或裝置中可以包括更多或者部分功能合併後更少的操作步驟或模組單元。在邏輯性上不存在必要因果關係的步驟或結構中,這些步驟的執行順序或裝置的模組結構不限於本說明書實施例或圖式所示的執行順序或模組結構。所述的方法或模組結構的在實際中的裝置、伺服器或終端產品應用時,可以按照實施例或者圖式所示的方法或模組結構進行循序執行或者並存執行(例如並行處理器或者多執行緒處理的環境、甚至包括分散式處理、伺服器集群的實施環境)。 需要說明的是,下述計量設備/終端設備/伺服器交互的實施例描述並不對基於本說明書的其他可擴展到的應用場景中的技術方案構成限制。具體的一種實施例如圖2所示,本說明書提供的一種資料讀取方法的一種實施例中,所述方法可以包括: S10:獲取計量設備上的計量資料,基於所述計量資料、識別標識以及第一時間戳產生第一加密資料,所述第一時間戳包括計量設備獲取所述計量資料時所對應的時間。 所述計量設備可以包括需要讀取自身資料的設備,如水錶、電錶或者燃氣表等。所述計量設備可以包括通訊模組,可以與終端設備透過藍牙或WiFi進行連接和資料傳輸,也可以與遠端的伺服器進行通訊連接,實現與所述伺服器的資料傳輸。所述計量資料包括所述計量設備上需要讀取的資料,如用水量、用電度數、所用燃氣量等。所述識別標識可以包括用來區分不同設備的標識(以下可以簡稱為“設備唯一標識”)、設備編號等。時間戳可以唯一標識某一刻的時間。所述第一時間戳可以包括計量設備獲取計量資料時所對應的時間。需要說明的是,同一設備的設備唯一標識可以保持不變,設備編號可以更改。 本說明書一個實施例中,所述計量設備可以包括廣播韌體、加密模組以及資料讀取模組。其中,所述資料讀取模組可以用來獲取計量設備當前資料(如,計量資料、時間戳等)。所述加密模組可以用來對所述資料模組讀取的資料進行加密處理。所述廣播韌體可以用來對所述加密模組處理後的資料進行廣播,所述廣播韌體可以是BLE (Bluetooth Low Energy,藍牙低能耗)廣播韌體或者WiFi韌體等。所述加密處理演算法可以包括一次性密碼(One-time Password,OTP)演算法、基於散列消息身分驗證碼(Hashed Message Authentication Code,HMAC)演算法加密的一次性密碼(HMAC-based One-Time Password,HOTP)演算法等。一些實施場景中,OTP、HOTP等演算法可以根據專門的演算法每隔一段時間產生一個與時間相關的、不可預測的亂數字組合,每個口令只能使用一次。一些實施場景中,OTP、HOTP可以包括時間視窗機制,透過OTP、HOTP進行加密後的資訊,在預設時間段內有效,超過預設時間段失效。 需要說明的是,一些實施場景中,計量資料可以透過計量設備包括的資料讀取模組獲取,還可以透過智能晶片獲取,也可以透過安裝有智能晶片的計量設備獲取,還可以透過其他方式獲取。本說明書實施例以及圖式中以計量設備獲取自身計量資料為例進行示意性說明,其它方式類似,對此不作贅述。 本說明書實施例中,為了安全有效地將計量設備的計量資料提供給上述伺服器,以便伺服器準確地記錄計量資料,並根據記錄的計量資料準確統計各戶業主家的用度情況,每個計量設備可以分別讀取自身的計量資料,然後根據自身的識別標識中包括的設備唯一標識、計量資料和讀取計量資料時所對應的時間,產生對應的加密資料。 一些實施場景中,所述計量設備可以為電錶。例如,在一個社區的某棟樓裡有多戶業主,每戶業主家分別對應一個電錶,該電錶包括BLE廣播韌體、OTP加密模組以及資料讀取模組。當工作人員需要獲取當前電錶資料時,工作人員可以在計量設備預設距離範圍內觸發行動終端上指定應用的匹配指令向電錶發送獲取當前電錶資料的請求,電錶收到該請求後,可以透過資料讀取模組獲取當前電錶讀數和對應時間,然後透過OTP加密模組將電錶讀數、電錶的唯一標識以及對應時間產生第一加密資料。由於在產生對應的第一加密資料時,所依據的電錶資料是直接讀取的,所以可以保證該電錶資料是真實的。 需要說明的是,由於所述信標資訊的識別標識中不僅可以包括用來區分不同設備的唯一標識,而且也可以包括設備編號。所以一些實施例中,為了防止傳輸資料被惡意篡改、保證傳輸資料的安全性,計量設備對獲取的資料進行加密處理時,可以使用識別標識中包括的設備的唯一標識。一些實施場景中,計量設備、終端設備、伺服器之間可以進行即時通訊,這樣,在計量設備獲取計量資料時,終端設備和伺服器可以獲取對應的時間並保存。需要說明的是,終端設備和伺服器獲取對應時間可以透過本領域人員知曉的任意一種方式,本說明書對此不作限定。 S12:所述計量設備發送信標資訊至終端設備,所述信標資訊包括所述計量資料、所述第一加密資料以及所述識別標識。 所述識別標識可以包括設備唯一標識、設備編號等。 本說明書一個實施例中,所述計量設備在產生各自對應的第一加密資料之後,可以透過自帶的藍牙或者WiFi網路將計量資料、加密資料以及識別標識廣播出去。 本說明書一個實施例中,所述計量設備發送信標資訊至終端設備可以包括:所述終端設備在計量設備預設距離範圍內和/或基於觸發終端上指定應用的匹配指令時,建立所述計量設備與所述終端設備的通訊連接;所述計量設備將所述信標資訊發送至所述終端設備。所述計量設備與所述終端設備建立通訊連接的條件可以包括終端設備在計量設備預設距離範圍內或觸發了終端設備上指定應用的匹配指令或終端設備在計量設備預設距離範圍內且觸發了終端上指定應用的匹配指令等。需要說明的是,建立通訊連接的條件還可以包括其他條件,本說明書對此不作限定。 例如一個實施場景中,抄表工作人員可以啟動所使用的智慧型手機上的計量應用程式(Application,app),然後透過點擊該計量app上的“資料接收”控制項與計量設備建立通訊連接,從而可以接收計量設備廣播的資訊。另一個實施場景中,抄表工作人員可以在計量設備預設距離範圍內啟動所使用的智慧型手機上的計量app,然後點擊該計量app上的“資料接收”控制項與計量設備建立通訊連接,從而可以接收計量設備廣播的資訊。 一些實施例中,終端設備在接收到計量資料、加密資料以及識別標識後,可以對接收到的資訊進行匯總。例如,抄表工作人員啟動所使用的智慧型手機上的計量app,並點擊該計量app上的“資料接收”控制項與計量設備建立通訊連接並接收到各個計量設備廣播的資訊後,可以將接收到的資訊進行匯總。例如一些實施場景中,終端設備在接收到計量資料、加密資料以及識別標識後,可以按照時間區間進行匯總,也可以按照計量設備對應的位置資訊進行匯總,還可以按照數量進行匯總等。例如,終端設備在接收到計量資料、加密資料以及識別標識後,可以將屬於同一個社區的資訊進行匯總,也可以當接收到的資訊滿100個時匯總一次,還可以將一周內接收到的資訊進行匯總等。 需要說明的是,由於所述信標資訊的識別標識中不僅可以包括用來區分不同設備的唯一標識,而且也可以包括設備編號等。所以一些實施例中,為了防止傳輸資料被惡意篡改、保證傳輸資料的安全性,計量設備在進行廣播時,所述信標資訊中包括的識別標識是設備編號。此外,上述計量設備進行廣播的資訊包括計量資料、第一加密資料以及設備編號只是進行示例性說明,所述計量設備進行廣播的資訊還可以包括其他資訊,本說明書對此不做限定。 S20:所述終端設備將所述信標資訊發送至伺服器。 本說明書一個實施例中,計量設備發送信標資訊至終端設備後,所述終端設備可以將所述信標資訊進行匯總後發送至伺服器。一些實施例中,終端設備可以在達到預設的發送要求時,將所述信標資訊發送至伺服器。所述預設的發送要求可以包括終端設備接收到的信標資訊的數量達到預設數量,或者終端設備接收到一個向伺服器發送一個,或者終端設備對所有信標資訊校驗通過後才發送,或者是定時發送,如一個小時發一次等。 本說明書一個實施例中,所述終端設備可以為行動終端,對應地,所述將所述信標資訊發送至終端設備,所述終端設備將所述信標資訊發送至伺服器可以包括:所述行動終端在計量設備預設距離範圍內和/或基於觸發行動終端上指定應用的匹配指令時,建立所述計量設備與所述行動終端的通訊連接;所述計量設備將所述信標資訊發送至所述行動終端;所述行動終端在達到預設的發送要求時,將所述信標資訊發送至伺服器。 一些實施例中,當所述終端設備接收到的資訊包括計量資料、第一加密資料以及識別標識中的設備編號時,所述終端設備可以將接收到的資訊按照設備編號進行匯總後發送至伺服器。 本說明書提供的另一個實施例中,所述終端設備可以預先儲存上述各個計量設備的相關資訊,如識別標識,其中預先儲存的識別標識中的設備編號與設備唯一標識可以預先設置為相互關聯。所述終端設備在接收到所述信標資訊後,還可以包括: S200:基於所述計量資料、識別標識以及接收到所述信標資訊時對應的第三時間戳產生第三加密資料; S202:比較所述第三加密資料與所述第一加密資料,在比較結果符合記錄要求時記錄所述計量資料。 一些實施例中,所述信標資訊可以包括所述計量資料、所述第一加密資料以及所述識別標識。另一些實施例中,所述信標資訊中除了可以包括計量資料、第一加密資料以及識別標識外,還可以包括其他資訊,如第三加密資料。一些實施例中,符合記錄要求可以包括比較結果在預設誤差範圍內,或者比較結果相同,或者其它等。 為了提高資料傳輸的安全性,在一些實施例中,當所述終端設備接收到的資訊包括計量資料、第一加密資料以及識別標識中的設備編號時,所述終端設備可以在預先儲存的資訊中查找與所述設備編號對應的設備,並獲取該設備的唯一標識,透過加密方法對計量資料、設備的唯一標識以及接收到所述信標資訊時對應的第三時間戳進行加密,獲得第三加密資訊,然後終端設備將第三加密資料與第一加密資料進行比較,在比較結果符合記錄要求時,表明接收到的該計量設備的計量資料與產生第一加密資料時所依據的計量資料相同,從而可以表明接收到的該計量設備的計量資料是真實的,最後可以將計量資料、識別標識、第一加密資料發送至伺服器,從而提高資料傳輸的安全性。 另一些實施例中,當所述終端設備接收到的資訊包括計量資料、第一加密資料以及識別標識中的設備編號時,所述終端設備可以在預先儲存的資訊中查找與所述設備編號對應的設備,並獲取該設備的唯一標識,透過加密方法對計量資料、設備的唯一標識以及接收到所述信標資訊時對應的第三時間戳進行加密,獲得第三加密資訊,然後終端設備將第三加密資料與第一加密資料進行比較,在比較結果不符合記錄要求時,表明接收到的該計量設備的計量資料與產生第一加密資料時所依據的計量資料不相同,從而可以表明接收到的該計量設備的計量資料是不真實的,此時可以將不真實情況回饋至相關技術人員,以加強資料傳輸過程安全性。 在另一些實施例中,當所述終端設備接收到的資訊包括計量資料、第一加密資料以及識別標識中的設備編號時,所述終端設備可以在預先儲存的資訊中查找與所述設備編號對應的設備,並獲取該設備的唯一標識,透過加密方法對計量資料、設備的唯一標識以及接收到所述信標資訊時對應的第三時間戳進行加密,獲得第三加密資訊,然後將計量資料、識別標識、第一加密資料以及第三加密資料發送至伺服器,以便伺服器進行進一步的驗證,從而提高資料傳輸的安全性。 需要說明的是,一些實施例中,第三時間戳可以為終端設備接收到信標資訊時對應的時間。第三時間戳與產生第一加密資料時所用的第一時間戳可以在同一時間視窗或者預設的時間視窗期。例如,預先設置的時間視窗為60秒,產生第一加密資料時所用的時間為16時12分24秒,則第三時間戳可以在16時12分24秒到16時13分24秒之間。 需要說明的是,上述加密方法可以與計量設備採用的加密方法相同,也可以是與計量設備所採用的加密方法不同的方法,本說明書對此不作限定。 S30:所述伺服器基於所述識別標識、所述計量資料以及接收到所述信標資訊時對應的第二時間戳產生第二加密資料。 一些實施例中,所述第二時間戳與所述第一時間戳可以在同一時間視窗或預設的時間視窗內。 本說明書一個實施例中,所述伺服器可以預先儲存各個計量設備的識別標識。所述識別標識可以包括設備唯一標識、設備編號等。其中,設備編號與設備唯一標識可以預先相互關聯。第二時間戳可以包括伺服器接收到信標資訊時對應的時間。時間視窗可以表示一個預設時間段。所述第二時間戳與所述第一時間戳在同一時間視窗可以理解為:以第一時間戳為起始時間,起始時間與預設時間段之和為終止時間,第二時間戳可以在起始時間與終止時間之間。一些實施例中,所述第二時間戳與所述第一時間戳在同一時間視窗,可以防止資料被篡改。 本說明書一個實施例中,由於在資訊廣播和資料傳輸過程中,可能會存在計量資料被惡意虛構或篡改的情況,所以,伺服器在接收到信標信息之後,可以透過加密演算法對計量資料、識別標識中的設備唯一標識以及對應時間進行加密,獲得加密資料。 一些實施例中,由於所述伺服器接收到的識別標識中包括設備編號,所以為了保證資料的安全,可以獲得與設備編號對應的設備唯一標識。例如一些實施場景中,所述伺服器可以預先儲存各個計量設備的識別標識,且識別標識中包括的設備編號與設備唯一標識相互關聯,伺服器接收到的識別標識中包括設備編號時,可以根據所述信標資訊中包括的設備編號在伺服器中查找對應的設備唯一標識,然後透過加密演算法對計量資料、查找到的設備唯一標識以及對應時間進行加密,獲得第二加密資料。 另一些實施例中,為了保證資料的安全,伺服器在接收到所述信標資訊之後,可以先根據所述識別標識中的設備編號在伺服器中查找對應的設備唯一標識,然後將查找到的設備唯一標識與接收到的信標資訊中包括的設備唯一標識進行比較,若二者相同,再透過加密演算法對計量資料、識別標識中的設備唯一標識以及對應時間進行加密,獲得第二加密資料。一些實施例中,若查找到的設備唯一標識與接收到的信標資訊中包括的設備唯一標識不相同,則可以回饋至相關技術人員,以加強資料傳輸過程安全性。 需要說明的是,所述加密方法可以是計量設備採用的加密方法,也可以是與計量設備所採用的加密方法不同的方法,本說明書對此不作限定。 S32:所述伺服器比較所述第二加密資料與所述第一加密資料,在比較結果符合記錄要求時記錄所述計量資料。 一些實施例中,所述伺服器在產生第二加密資料後,會將其與之前接收到的加密資料進行比較,以確定所接收到的計量資料是否被篡改,從而提高資料傳輸的安全性。其中,符合記錄要求可以包括比較結果在預設誤差範圍內,或者比較結果相同,或者其它要求等。 本說明書一個實施例中,當伺服器接收到信標資訊並基於相關資訊產生第二加密資料後,可以將所述第二加密資料與接收到的信標資訊中包括的第一加密資料進行比較。若比較結果符合記錄要求,表明接收到的該計量設備的計量資料與產生第一加密資料時所依據的計量資料相同,從而可以表明接收到的該計量設備的計量資料是真實的,伺服器可以記錄該計量設備的計量資料。否則,表明接收到的計量設備的計量資料與產生第一加密資料時所依據的計量資料並不相同,從而可以表明接收到的該計量設備的計量資料可能在前期的資料傳輸過程中被惡意虛構或篡改了,是不真實的。 一些實施例中,當伺服器接收到計量資料、識別標識、第一加密資料以及第三加密資料時,可以將所述第二加密資料與接收到的第一加密資料、第三加密資料進行比較。當第二加密資料、第一加密資料、第三加密資料的比較結果符合記錄要求時,表明接收到的該計量設備的計量資料與產生第一加密資料時所依據的計量資料相同,從而可以表明接收到的該計量設備的計量資料是真實的,伺服器可以記錄該計量設備的計量資料。 需要說明的是,當出現接收到的該計量設備的計量資料可能在前期的資料傳輸過程中被惡意虛構或篡改的情況時,伺服器可以將該不真實的情況回饋至相關技術人員,以加強資料傳輸過程安全性。這樣,無需抄表人員肉眼觀測,便可以獲取各個計量設備的計量資料,還可以保證伺服器記錄的資料的真實性。 本說明書還提供另一種場景示例。例如,實際應用過程中,在一個社區的某棟樓裡有多戶業主,每戶業主家分別對應一個計量設備,在該棟樓可以設置一個智能總表。各個計量設備在讀取各自的計量資料並產生對應的第一加密資料之後可以透過藍牙的方式進行廣播,智能總表透過掃描並接收該計量設備廣播的資訊後可以進行匯總,然後透過與伺服器建立的通訊連接將匯總資訊發送至伺服器,伺服器透過對接收到的資訊進行驗證,從而可以獲得計量設備的真實資料。這樣,無需抄表人員肉眼觀測或上門觀測,便可以獲取各個計量設備的計量資料,保證伺服器記錄的資料的真實性。其中,計量設備以及智能總表可以包括藍牙模組和/或WiFi模組,計量設備與智能總表之間可以透過藍牙或者WiFi網路進行連接和資料傳輸,且計量設備處於從模式用來廣播資訊。此外,智能總表還可以包括遠端通訊模組,可以與遠端的伺服器進行通訊連接,實現與伺服器的資料傳輸。 本說明書實施例提供的一種資料讀取方法,計量設備可以將自身的計量資料加密後透過藍牙的方式進行廣播,伺服器在收到資訊後,基於對應的資訊進行加密,並將加密資料與接收到的加密資料進行比較。這樣,無需抄表人員肉眼觀測或上門觀測,便可以獲取各個計量設備的計量資料,從而可以保證伺服器記錄的資料的真實性的同時,可以有效解決資料傳輸過程中被惡意篡改的問題,提高資料讀取的安全性。 上述實施例從計量設備/終端設備/伺服器交互的角度描述的資料讀取方法的實施方案。基於上述實施例描述,本說明書還提供一種可以適用於計量設備/伺服器交互的角度描述的資料讀取方法。圖3是本說明書提供的所述一種資料讀取方法另一實施例的流程示意圖。具體地,一種實施例中,所述方法可以包括: S40:獲取計量設備上的計量資料,基於所述計量資料、識別標識以及第一時間戳產生第一加密資料,所述第一時間戳包括計量設備獲取所述計量資料時所對應的時間; S42:所述計量設備發送信標資訊至伺服器,所述信標資訊包括所述計量資料、所述第一加密資料以及所述識別標識; S50:所述伺服器基於所述識別標識、所述計量資料以及接收到所述信標資訊時對應的第二時間戳產生第二加密資料; S52:所述伺服器比較所述第二加密資料與所述第一加密資料,在比較結果符合記錄要求時記錄所述計量資料。 其中,計量設備可以包括藍牙模組、WiFi模組,且處於從模式用來廣播資訊。此外,計量設備還可以包括遠端通訊模組,可以與遠端的伺服器進行通訊連接,實現與伺服器的資料傳輸。 本說明書一個實施例中,各個計量設備在讀取各自的計量資料並產生對應的第一加密資料之後可以透過藍牙或者WiFi網路的方式進行廣播,伺服器掃描並接收該計量設備廣播的資訊後,可以透過對接收到的資訊進行驗證,從而獲得計量設備的真實資料。這樣,不僅無需抄表人員肉眼觀測或上門觀測,而且也無需終端設備進行對應的處理,便可以獲取各個計量設備的計量資料,保證伺服器記錄的資料的真實性,提高資料讀取的安全性。 本說明書中上述方法的各個實施例均採用遞進的方式描述,各個實施例之間相同相似的部分互相參見即可,每個實施例重點說明的都是與其他實施例的不同之處。相關之處參見方法實施例的部分說明即可。 上述實施例從計量設備/終端設備/伺服器交互的角度描述的資料讀取方法的實施方案。基於上述實施例描述,本說明書還提供一種可以適用於計量設備一側的資料讀取方法。圖4是本說明書提供的可以用於計量設備一側方法一種實施例的流程示意圖。具體地,一種實施例中,所述方法可以包括: S60:獲取計量資料,基於所述計量資料、識別標識以及第一時間戳產生第一加密資料,所述第一時間戳包括計量設備獲取所述計量資料時所對應的時間; S62:發送信標資訊至伺服器,所述信標資訊包括所述計量資料、所述第一加密資料以及所述識別標識,以使所述伺服器基於所述識別標識、所述計量資料以及接收到所述信標資訊時對應的第二時間戳產生第二加密資料,並在確定所述第二加密資料與所述第一加密資料的比較結果符合記錄要求時記錄所述計量資料。 一些實施例中,所述將所述信標資訊發送至終端設備可以採用藍牙或者WiFi網路的方式。 一些實施例中,所述發送信標資訊至伺服器,可以包括:將所述信標資訊發送至終端設備,所述終端設備將所述信標資訊發送至伺服器。另一些實施例中,所述終端設備可以為行動終端,對應地,所述將所述信標資訊發送至終端設備,所述終端設備將所述信標資訊發送至伺服器可以包括:所述行動終端在計量設備預設距離範圍內和/或基於觸發行動終端上指定應用的匹配指令時,建立所述計量設備與所述行動終端的通訊連接;所述計量設備將所述信標資訊發送至所述行動終端;所述行動終端在達到預設的發送要求時,將所述信標資訊發送至伺服器。 對於計量設備一側,當使用者或工作人員觸發對應的指令時,計量設備可以基於該指令開始獲取對應的計量資料,並基於計量資料、識別標識以及時間戳產生第一加密資料,然後廣播對應資訊,以便伺服器基於接收到的資訊產生第二加密資料並進行比較,確定接收到的計量資料是否是所述計量設備獲得的真實資料,從而可以防止資料傳輸過程中被惡意篡改或虛構。 本說明書中上述方法的各個實施例均採用遞進的方式描述,各個實施例之間相同相似的部分互相參見即可,每個實施例重點說明的都是與其他實施例的不同之處。相關之處參見方法實施例的部分說明即可。 上述實施例從計量設備/終端設備/伺服器交互的角度描述的資料讀取方法的實施方案。基於上述實施例描述,本說明書還提供一種可以適用於伺服器一側的資料讀取方法。圖5是本說明書提供的可以用於伺服器一側方法一種實施例的流程示意圖。具體地,一種實施例中,所述方法可以包括: S70:接收信標資訊,所述信標資訊包括計量資料、第一加密資料以及識別標識,所述第一加密資料基於所述計量資料、識別標識以及第一時間戳產生,所述第一時間戳包括計量設備獲取所述計量資料時所對應的時間; S72:基於所述識別標識、所述計量資料以及接收到所述信標資訊時對應的第二時間戳產生第二加密資料; S74:比較所述第二加密資料與所述第一加密資料,在比較結果符合記錄要求時記錄所述計量資料。 本說明書一個實施例中,所述伺服器接收的信標資訊可以是計量設備直接發送的,也可以是透過其它終端設備轉發的。 本說明書實施例提供的一種資料讀取方法,計量設備將自身的計量資料加密後透過藍牙的方式進行廣播,伺服器在收到資訊後,基於對應的資訊進行加密,並將加密資料與接收到的加密資料進行比較。這樣,無需抄表人員肉眼觀測或上門觀測,便可以獲取各個計量設備的計量資料,從而可以保證伺服器記錄的資料的真實性的同時,可以有效解決資料傳輸過程中被惡意篡改的問題,提高資料讀取的安全性。 本申請實施例所提供的方法實施例可以在行動終端、電腦終端、伺服器或者類似的運算裝置中執行。以運行在伺服器上為例,圖6是本說明書實施例中一種資料讀取的伺服器的硬體結構方塊圖。如圖6所示,伺服器10可以包括一個或多個(圖中僅示出一個)處理器102(處理器102可以包括但不限於微處理器MCU或可程式設計邏輯裝置FPGA等的處理裝置)、用於儲存資料的記憶體104、以及用於通訊功能的傳輸模組106。本發明所屬技術領域中具有通常知識者可以理解,圖6所示的結構僅為示意,其並不對上述電子裝置的結構造成限定。例如,伺服器10還可包括比圖6中所示更多或者更少的元件,例如還可以包括其他的處理硬體,如GPU(Graphics Processing Unit,圖形處理器),或者具有與圖6所示不同的配置。 記憶體104可用於儲存應用軟體的軟體程式以及模組,如本發明實施例中的資料讀取方法對應的程式指令/模組,處理器102透過運行儲存在記憶體104內的軟體程式以及模組,從而執行各種功能應用以及資料處理,即實現上述資料讀取方法。記憶體104可包括高速隨機記憶體,還可包括非易失性記憶體,如一個或者多個磁性儲存裝置、快閃記憶體、或者其他非易失性固態記憶體。在一些實例中,記憶體104可進一步包括相對於處理器102遠端設置的記憶體,這些遠端存放器可以透過網路連接至電腦終端10。上述網路的實例包括但不限於網際網路、企業內部網、區域網路、行動通訊網及其組合。 傳輸模組106用於經由一個網路接收或者發送資料。上述的網路具體實例可包括電腦終端10的通訊供應商提供的無線網路。在一個實例中,傳輸模組106包括一個網路介面卡(Network Interface Controller,NIC),其可透過基站與其他網路設備相連從而可與互聯網進行通訊。在一個實例中,傳輸模組106可以為射頻(Radio Frequency,RF)模組,其用於透過無線方式與網際網路進行通訊。 基於上述所述的資料讀取方法,本說明書還提供一種資料讀取裝置。所述的裝置可以包括使用了本說明書實施例所述方法的系統(包括分散式系統)、軟體(應用)、模組、元件、伺服器、計量設備等並結合必要的實施硬體的設備裝置。基於同一創新構思,本說明書提供的一種實施例中的處理裝置如下面的實施例所述。由於裝置解決問題的實現方案與方法相似,因此本說明書實施例具體的處理裝置的實施可以參見前述方法的實施,重複之處不再贅述。儘管以下實施例所描述的裝置較佳地以軟體來實現,但是硬體,或者軟體和硬體的組合的實現也是可能並被構想的。具體地,如圖7所示,圖7是本說明書提供的可以用於伺服器一側的一種資料讀取裝置實施例的模組結構示意圖,具體的可以包括: 接收模組120,可以用於接收信標資訊,所述信標資訊包括計量資料、第一加密資料以及識別標識,所述第一加密資料基於所述計量資料、識別標識以及第一時間戳產生,所述第一時間戳包括計量設備獲取所述計量資料時所對應的時間; 第一產生模組122,可以用於基於所述識別標識、所述計量資料以及接收到所述信標資訊時對應的第二時間戳產生第二加密資料; 比較模組124,可以用於比較所述第二加密資料與所述第一加密資料,在比較結果符合記錄要求時記錄所述計量資料。 上述實施例所述的裝置具體的實施可以參照相關方法實施例的描述,在此不做贅述。 基於上述所述的資料讀取方法,本說明書還提供一種可以用於計量設備一側的資料讀取裝置。圖8是本說明書提供的可以用於計量設備一側的一種資料讀取裝置實施例的模組結構示意圖,具體的可以包括: 第二產生模組210,用於獲取計量資料,基於所述計量資料、識別標識以及第一時間戳產生第一加密資料,所述第一時間戳包括計量設備獲取所述計量資料時所對應的時間; 發送模組212,可以用於發送信標資訊至伺服器,所述信標資訊包括所述計量資料、所述第一加密資料以及所述識別標識,以使所述伺服器基於所述識別標識、所述計量資料以及接收到所述信標資訊時對應的第二時間戳產生第二加密資料,並在確定所述第二加密資料與所述第一加密資料的比較結果符合記錄要求時記錄所述計量資料。 所述裝置的另一個實施例中,所述發送模組212,可以包括: 第一發送單元2120,可以用於將所述信標資訊發送至終端設備,所述終端設備將所述信標資訊發送至伺服器。 所述裝置的另一個實施例中,所述終端設備為行動終端,對應地,所述將所述信標資訊發送至終端設備,所述終端設備將所述信標資訊發送至伺服器包括: 建立連接單元,用於所述行動終端在計量設備預設距離範圍內和/或基於觸發行動終端上指定應用的匹配指令時,建立所述計量設備與所述行動終端的通訊連接; 第二發送單元,用於所述計量設備將所述信標資訊發送至所述行動終端; 第三發送單元,用於所述行動終端在達到預設的發送要求時,將所述信標資訊發送至伺服器。 上述實施例所述的裝置具體的實施可以參照相關方法實施例的描述,在此不做贅述。 本說明書實施例提供的資料讀取方法可以在電腦中由處理器執行對應的程式指令來實現,如使用windows作業系統的c++語言在PC端實現,或其他例如Linux、android、iOS系統相對應的應用設計語言集合必要的硬體實現,或者基於量子電腦的處理邏輯實現等。具體地,本說明書提供的一種伺服器實現上述方法的實施例中,所述伺服器可以包括處理器以及用於儲存處理器可執行指令的記憶體,所述處理器執行所述指令時實現: 接收信標資訊,所述信標資訊包括計量資料、第一加密資料以及識別標識,所述第一加密資料基於所述計量資料、識別標識以及第一時間戳產生,所述第一時間戳包括計量設備獲取所述計量資料時所對應的時間; 基於所述識別標識、所述計量資料以及接收到所述信標資訊時對應的第二時間戳產生第二加密資料; 比較所述第二加密資料與所述第一加密資料,在比較結果符合記錄要求時記錄所述計量資料。 對應地,本說明書提供的一種計量設備實現上述方法的實施例,所述計量設備可以處理器以及用於儲存處理器可執行指令的記憶體,所述處理器執行所述指令時實現: 獲取計量資料,基於所述計量資料、識別標識以及第一時間戳產生第一加密資料,所述第一時間戳包括計量設備獲取所述計量資料時所對應的時間; 發送信標資訊至伺服器,所述信標資訊包括所述計量資料、所述第一加密資料以及所述識別標識,以使所述伺服器基於所述識別標識、所述計量資料以及接收到所述信標資訊時對應的第二時間戳產生第二加密資料,並在確定所述第二加密資料與所述第一加密資料的比較結果符合記錄要求時記錄所述計量資料。 上述的指令可以儲存在多種電腦可讀儲存媒體中。所述電腦可讀儲存媒體可以包括用於儲存資訊的物理裝置,可以將資訊數位化後再以利用電、磁或者光學等方式的媒體加以儲存。本實施例所述的電腦可讀儲存媒體有可以包括:利用電能方式儲存資訊的裝置如,各式記憶體,如RAM、ROM等;利用磁能方式儲存資訊的裝置如,硬碟、軟碟、磁帶、磁芯記憶體、磁泡記憶體、U盤;利用光學方式儲存資訊的裝置如,CD或DVD。當然,還有其他方式的可讀儲存媒體,例如量子記憶體、石墨烯記憶體等等。下述所述的裝置或伺服器或計量設備或系統中的指令同上描述。 基於前述描述,本說明書還提供一種資料讀取系統,所述系統的一個實施例中,可以包括計量設備和伺服器, 所述計量設備獲取計量資料,基於所述計量資料、識別標識以及第一時間戳產生第一加密資料,發送信標資訊至伺服器,所述第一時間戳包括計量設備獲取所述計量資料時所對應的時間,所述信標資訊包括所述計量資料、所述第一加密資料以及所述識別標識; 所述伺服器接收所述信標資訊,並基於所述識別標識、所述計量資料以及接收到所述信標資訊時對應的第二時間戳產生第二加密資料,比較所述第二加密資料與所述第一加密資料,在比較結果符合記錄要求時記錄所述計量資料。 需要說明的是,本說明書實施例上述所述的裝置、計量設備、伺服器、系統,根據相關方法實施例的描述還可以包括其他的實施方式。具體的實現方式可以參照方法實施例的描述,在此不作一一贅述。 本說明書中的各個實施例均採用遞進的方式描述,各個實施例之間相同相似的部分互相參見即可,每個實施例重點說明的都是與其他實施例的不同之處。尤其,對於硬體+程式類實施例而言,由於其基本相似於方法實施例,所以描述的比較簡單,相關之處參見方法實施例的部分說明即可。 上述對本說明書特定實施例進行了描述。其它實施例在所附請求項的範圍內。在一些情況下,在權利要求書中記載的動作或步驟可以按照不同於實施例中的順序來執行並且仍然可以實現期望的結果。另外,在圖式中描繪的過程不一定要求示出的特定順序或者連續順序才能實現期望的結果。在某些實施方式中,多工處理和並行處理也是可以的或者可能是有利的。 本說明書實施例提供的一種資料讀取的計量設備或伺服器,計量設備可以將自身的計量資料加密後透過藍牙的方式進行廣播,伺服器在收到資訊後,基於對應的資訊進行加密,並將加密資料與接收到的加密資料進行比較。這樣,無需抄表人員肉眼觀測或上門觀測,便可以獲取各個計量設備的計量資料,從而可以保證伺服器記錄的資料的真實性的同時,可以有效解決資料傳輸過程中被惡意篡改的問題,提高資料讀取的安全性。 當然,上述實施例的實施方案還可以用於其它需要獲取自身資料的應用場景中。 雖然本申請提供了如實施例或流程圖所述的方法操作步驟,但基於常規或者無創造性的勞動可以包括更多或者更少的操作步驟。實施例中列舉的步驟順序僅僅為眾多步驟執行順序中的一種方式,不代表唯一的執行順序。在實際中的裝置或計量設備產品執行時,可以按照實施例或者圖式所示的方法循序執行或者並存執行(例如並行處理器或者多執行緒處理的環境)。 儘管本說明書實施例內容中提到計量設備/終端設備/伺服器的對話模式、計量設備/伺服器的對話模式、加密演算法、資訊廣播等之類的資料獲取、交互、處理、比較等操作和資料描述,但是,本說明書實施例並不局限於必須是符合行業通訊標準、標準圖像資料處理協定、通訊協定和標準資料模型/範本或本說明書實施例所描述的情況。某些行業標準或者使用自訂方式或實施例描述的實施基礎上略加修改後的實施方案也可以實現上述實施例相同、等同或相近、或變形後可預料的實施效果。應用這些修改或變形後的資料獲取、儲存、判斷、處理方式等獲取的實施例,仍然可以屬於本說明書的可選實施方案範圍之內。 在20世紀90年代,對於一個技術的改進可以很明顯地區分是硬體上的改進(例如,對二極體、電晶體、開關等電路結構的改進)還是軟體上的改進(對於方法流程的改進)。然而,隨著技術的發展,當今的很多方法流程的改進已經可以視為硬體電路結構的直接改進。設計人員幾乎都透過將改進的方法流程程式設計到硬體電路中來得到對應的硬體電路結構。因此,不能說一個方法流程的改進就不能用硬體實體模組來實現。例如,可程式設計邏輯裝置(Programmable Logic Device, PLD)(例如現場可程式設計閘陣列(Field Programmable Gate Array,FPGA))就是這樣一種積體電路,其邏輯功能由使用者對裝置程式設計來確定。由設計人員自行程式設計來把一個數位系統“整合”在一片PLD上,而不需要請晶片製造廠商來設計和製作專用的積體電路晶片。而且,如今,取代手工地製作積體電路晶片,這種程式設計也多半改用“邏輯編譯器(logic compiler)”軟體來實現,它與程式開發撰寫時所用的軟體編譯器相類似,而要編譯之前的原始碼也得用特定的程式設計語言來撰寫,此稱之為硬體描述語言(Hardware Description Language,HDL),而HDL也並非僅有一種,而是有許多種,如ABEL(Advanced Boolean Expression Language)、AHDL(Altera Hardware Description Language)、Confluence、CUPL(Cornell University Programming Language)、HDCal、JHDL(Java Hardware Description Language)、Lava、Lola、MyHDL、PALASM、RHDL (Ruby Hardware Description Language)等,目前最普遍使用的是VHDL(Very-High-Speed Integrated Circuit Hardware Description Language)與Verilog。本領域技術人員也應該清楚,只需要將方法流程用上述幾種硬體描述語言稍作邏輯程式設計並程式設計到積體電路中,就可以很容易得到實現該邏輯方法流程的硬體電路。 控制器可以按任何適當的方式實現,例如,控制器可以採取例如微處理器或處理器以及儲存可由該(微)處理器執行的電腦可讀程式碼(例如軟體或韌體)的電腦可讀媒體、邏輯閘、開關、特殊應用積體電路(Application Specific Integrated Circuit,ASIC)、可程式設計邏輯控制器和嵌入微控制器的形式,控制器的例子包括但不限於以下微控制器:ARC 625D、Atmel AT91SAM、Microchip PIC18F26K20 以及Silicone Labs C8051F320,記憶體控制器還可以被實現為記憶體的控制邏輯的一部分。本領域技術人員也知道,除了以純電腦可讀程式碼方式實現控制器以外,完全可以透過將方法步驟進行邏輯程式設計來使得控制器以邏輯閘、開關、特殊應用積體電路、可程式設計邏輯控制器和嵌入微控制器等的形式來實現相同功能。因此這種控制器可以被認為是一種硬體部件,而對其內包括的用於實現各種功能的裝置也可以視為硬體部件內的結構。或者甚至,可以將用於實現各種功能的裝置視為既可以是實現方法的軟體模組又可以是硬體部件內的結構。 上述實施例闡明的系統、裝置、模組或單元,具體可以由電腦晶片或實體實現,或者由具有某種功能的產品來實現。一種典型的實現設備為電腦。具體地,電腦例如可以為個人電腦、膝上型電腦、車載人機交互設備、蜂巢式電話、相機電話、智慧型電話、個人數位助理、媒體播放機、導航設備、電子郵件設備、遊戲控制台、平板電腦、穿戴式設備或者這些設備中的任何設備的組合。 雖然本說明書實施例提供了如實施例或流程圖所述的方法操作步驟,但基於習知或者無創造性的手段可以包括更多或者更少的操作步驟。實施例中列舉的步驟順序僅僅為眾多步驟執行順序中的一種方式,不代表唯一的執行順序。在實際中的裝置或終端產品執行時,可以按照實施例或者圖式所示的方法循序執行或者並存執行(例如並行處理器或者多執行緒處理的環境,甚至為分散式資料處理環境)。術語“包括”、“包含”或者其任何其他變體意在涵蓋非排他性的包含,從而使得包括一系列要素的過程、方法、產品或者設備不僅包括那些要素,而且還包括沒有明確列出的其他要素,或者是還包括為這種過程、方法、產品或者設備所固有的要素。在沒有更多限制的情況下,並不排除在包括所述要素的過程、方法、產品或者設備中還存在另外的相同或等同要素。 為了描述的方便,描述以上裝置時以功能分為各種模組分別描述。當然,在實施本說明書實施例時可以把各模組的功能在同一個或多個軟體和/或硬體中實現,也可以將實現同一功能的模組由多個子模組或子單元的組合實現等。以上所描述的裝置實施例僅僅是示意性的,例如,所述單元的劃分,僅僅為一種邏輯功能劃分,實際實現時可以有另外的劃分方式,例如多個單元或元件可以結合或者可以整合到另一個系統,或一些特徵可以忽略,或不執行。另一點,所顯示或討論的相互之間的耦合或直接耦合或通訊連接可以是透過一些介面,裝置或單元的間接耦合或通訊連接,可以是電性,機械或其它的形式。 本領域技術人員也知道,除了以純電腦可讀程式碼方式實現控制器以外,完全可以透過將方法步驟進行邏輯程式設計來使得控制器以邏輯閘、開關、專用積體電路、可程式設計邏輯控制器和嵌入微控制器等的形式來實現相同功能。因此這種控制器可以被認為是一種硬體部件,而對其內部包括的用於實現各種功能的裝置也可以視為硬體部件內的結構。或者甚至,可以將用於實現各種功能的裝置視為既可以是實現方法的軟體模組又可以是硬體部件內的結構。 本發明是參照根據本發明實施例的方法、設備(系統)、和電腦程式產品的流程圖和/或方塊圖來描述的。應理解可由電腦程式指令實現流程圖和/或方塊圖中的每一流程和/或方塊、以及流程圖和/或方塊圖中的流程和/或方塊的結合。可提供這些電腦程式指令到通用電腦、專用電腦、嵌入式處理機或其他可程式設計資料處理設備的處理器以產生一個機器,使得透過電腦或其他可程式設計資料處理設備的處理器執行的指令產生用於實現在流程圖一個流程或多個流程和/或方塊圖一個方塊或多個方塊中指定的功能的裝置。 這些電腦程式指令也可儲存在能引導電腦或其他可程式設計資料處理設備以特定方式工作的電腦可讀記憶體中,使得儲存在該電腦可讀記憶體中的指令產生包括指令裝置的製造品,該指令裝置實現在流程圖一個流程或多個流程和/或方塊圖一個方塊或多個方塊中指定的功能。 這些電腦程式指令也可裝載到電腦或其他可程式設計資料處理設備上,使得在電腦或其他可程式設計設備上執行一系列操作步驟以產生電腦實現的處理,從而在電腦或其他可程式設計設備上執行的指令提供用於實現在流程圖一個流程或多個流程和/或方塊圖一個方塊或多個方塊中指定的功能的步驟。 在一個典型的配置中,計算設備包括一個或多個處理器(CPU)、輸入/輸出介面、網路介面和記憶體。 記憶體可能包括電腦可讀媒體中的非永久性記憶體,隨機存取記憶體(RAM)和/或非易失性記憶體等形式,如唯讀記憶體(ROM)或快閃記憶體(flash RAM)。記憶體是電腦可讀媒體的示例。 電腦可讀媒體包括永久性和非永久性、可移動和非可移動媒體可以由任何方法或技術來實現資訊儲存。資訊可以是電腦可讀指令、資料結構、程式的模組或其他資料。電腦的儲存媒體的例子包括,但不限於相變記憶體(PRAM)、靜態隨機存取記憶體(SRAM)、動態隨機存取記憶體(DRAM)、其他類型的隨機存取記憶體(RAM)、唯讀記憶體(ROM)、電可抹除可程式設計唯讀記憶體(EEPROM)、快閃記憶體或其他記憶體技術、唯讀光碟唯讀記憶體(CD-ROM)、數位多功能光碟(DVD)或其他光學儲存、磁盒式磁帶,磁帶磁磁片儲存或其他磁性存放裝置或任何其他非傳輸媒體,可用於儲存可以被計算設備訪問的資訊。按照本文中的界定,電腦可讀媒體不包括暫態性電腦可讀媒體(transitory media),如調變的資料信號和載波。 本領域技術人員應明白,本說明書的實施例可提供為方法、系統或電腦程式產品。因此,本說明書實施例可採用完全硬體實施例、完全軟體實施例或結合軟體和硬體方面的實施例的形式。而且,本說明書實施例可採用在一個或多個其中包含有電腦可用程式碼的電腦可用儲存媒體(包括但不限於磁碟記憶體、CD-ROM、光學記憶體等)上實施的電腦程式產品的形式。 本說明書實施例可以在由電腦執行的電腦可執行指令的一般上下文中描述,例如程式模組。一般地,程式模組包括執行特定任務或實現特定抽象資料類型的常式、程式、物件、元件、資料結構等等。也可以在分散式運算環境中實踐本說明書實施例,在這些分散式運算環境中,由透過通訊網路而被連接的遠端處理設備來執行任務。在分散式運算環境中,程式模組可以位於包括存放裝置在內的本地和遠端電腦儲存媒體中。 本說明書中的各個實施例均採用遞進的方式描述,各個實施例之間相同相似的部分互相參見即可,每個實施例重點說明的都是與其他實施例的不同之處。尤其,對於系統實施例而言,由於其基本相似於方法實施例,所以描述的比較簡單,相關之處參見方法實施例的部分說明即可。在本說明書的描述中,參考術語“一個實施例”、“一些實施例”、“示例”、“具體示例”、或“一些示例”等的描述意指結合該實施例或示例描述的具體特徵、結構、材料或者特點包含於本說明書實施例的至少一個實施例或示例中。在本說明書中,對上述術語的示意性表述不必須針對的是相同的實施例或示例。而且,描述的具體特徵、結構、材料或者特點可以在任一個或多個實施例或示例中以合適的方式結合。此外,在不相互矛盾的情況下,本領域的技術人員可以將本說明書中描述的不同實施例或示例以及不同實施例或示例的特徵進行結合和組合。 以上所述僅為本說明書實施例的實施例而已,並不用於限制本說明書實施例。對於本領域技術人員來說,本說明書實施例可以有各種更改和變化。凡在本說明書實施例的精神和原理之內所作的任何修改、等同替換、改進等,均應包含在本說明書實施例的請求項範圍之內。 In order to make those skilled in the art better understand the technical solutions in this specification, the technical solutions in the embodiments of this specification will be clearly and completely described below with reference to the drawings in the embodiments of this specification. Obviously, the described The embodiments are only some of the embodiments in this specification, but not all of the embodiments. Based on one embodiment or multiple embodiments in this specification, all other embodiments obtained by those with ordinary knowledge in the technical field of the present invention without creative work shall fall within the protection scope of the embodiments of this specification . An implementation provided in this specification can be applied to the system architecture of metering equipment/terminal equipment/server. The metering device may include a device that needs to read its own data, such as a water meter, an electricity meter, or a gas meter. The metering device may include a communication module, which can be connected to the terminal device and transmit data through Bluetooth or WiFi, and can also be connected to a remote server through communication to realize data transmission with the server. The terminal device can include a communication module, which can be connected to the metering device and transmit data through Bluetooth or WiFi, or can be connected to a remote server through communication to realize data transmission with the server. The terminal device may include a mobile terminal, such as a smart phone or a tablet computer. The server may include a single computer device, a server cluster composed of multiple servers, or a server structure of a distributed system. The server, the metering device, and the terminal device described in the embodiments of this specification include different information processors that are logically divided. As shown in FIG. 1 , FIG. 1 is a schematic diagram of a scene of a data reading method provided in this specification. Among them, metering devices such as water meters, electricity meters or gas meters, and terminal devices such as smart phones or tablet computers include Bluetooth modules. The metering device and the terminal device can be connected and transmitted through Bluetooth, and the metering device is in slave mode. , used to broadcast beacon information. The terminal device can communicate with the remote server, so as to realize the data transmission with the server. In some implementation scenarios, when the data in the metering device needs to be obtained, the metering device can encrypt its own metering data and broadcast it through Bluetooth, and the terminal device can be within a preset distance range and trigger the matching command of the specified application. , establish a communication connection with the metering device, and then aggregate the received beacon information and send it to the server. After receiving the aggregated information, the server performs corresponding verification, and records the measurement data after the verification is passed. In this way, the meter reading personnel can obtain the measurement data of each metering device without the need for the naked eye or door-to-door observation of the meter reader, thus ensuring the authenticity of the data recorded by the server, and effectively solving the problem of malicious tampering during the data transmission process. Data reading security. The following describes the implementation of the present specification by taking a specific application scenario as an example. Specifically, FIG. 2 is a schematic flowchart of an embodiment of the data reading method provided in this specification. Although the present specification provides method operation steps or device structures as shown in the following embodiments or drawings, the method or device may include more or less operations after some functions are combined based on routine or no creative effort. Step or modular unit. In the steps or structures that logically do not have a necessary causal relationship, the execution sequence of these steps or the module structure of the device are not limited to the execution sequence or module structure shown in the embodiments or drawings of this specification. When the described method or module structure is applied to an actual device, server or terminal product, it can be executed sequentially or concurrently according to the method or module structure shown in the embodiments or drawings (for example, a parallel processor or Multi-threaded processing environment, even including distributed processing, server cluster implementation environment). It should be noted that the following embodiment descriptions of metering device/terminal device/server interaction do not limit the technical solutions in other applicable scenarios based on this specification. A specific embodiment is shown in FIG. 2. In an embodiment of a data reading method provided in this specification, the method may include: S10: Acquire the measurement data on the measurement device, based on the measurement data, the identification and the The first time stamp generates the first encrypted data, and the first time stamp includes the time corresponding to when the metering device acquires the metering data. The metering device may include a device that needs to read its own data, such as a water meter, an electricity meter, or a gas meter. The metering device may include a communication module, which can be connected to the terminal device and transmit data through Bluetooth or WiFi, and can also be connected to a remote server through communication to realize data transmission with the server. The metering data includes data to be read on the metering device, such as water consumption, electricity consumption, gas consumption, and the like. The identification identifiers may include identifiers used to distinguish different devices (hereinafter may simply be referred to as "equipment unique identifiers"), device numbers, and the like. Timestamps can uniquely identify the time of a moment. The first time stamp may include a time corresponding to when the metering device acquires the metering data. It should be noted that the unique device identifier of the same device can remain unchanged, and the device number can be changed. In one embodiment of this specification, the metering device may include broadcast firmware, an encryption module, and a data reading module. Wherein, the data reading module can be used to obtain current data (eg, measurement data, time stamp, etc.) of the metering device. The encryption module can be used to encrypt the data read by the data module. The broadcast firmware may be used to broadcast the data processed by the encryption module, and the broadcast firmware may be BLE (Bluetooth Low Energy, Bluetooth Low Energy) broadcast firmware or WiFi firmware. The encryption processing algorithm may include a one-time password (One-time Password, OTP) algorithm, a hash message authentication code (Hashed Message Authentication Code, HMAC) algorithm-based encryption one-time password (HMAC-based One-time password) algorithm. Time Password, HOTP) algorithm, etc. In some implementation scenarios, algorithms such as OTP and HOTP can generate a time-related and unpredictable random number combination at regular intervals according to a special algorithm, and each password can only be used once. In some implementation scenarios, OTP and HOTP may include a time window mechanism, and information encrypted through OTP and HOTP is valid within a preset time period, and expires beyond the preset time period. It should be noted that, in some implementation scenarios, the measurement data can be obtained through the data reading module included in the measurement device, through the smart chip, through the measurement device installed with the smart chip, or through other methods. . In the embodiments and drawings of the present specification, the measurement device obtains its own measurement data as an example for schematic illustration, and other methods are similar, and will not be repeated here. In the embodiment of this specification, in order to safely and effectively provide the measurement data of the measurement equipment to the above-mentioned server, so that the server can accurately record the measurement data, and accurately count the consumption of each household according to the recorded measurement data, each The metering device can read its own metering data respectively, and then generate corresponding encrypted data according to the unique device identifier, the metering data and the time corresponding to reading the metering data included in its own identification. In some implementation scenarios, the metering device may be an electricity meter. For example, there are multiple owners in a building in a community, and each owner's home corresponds to an electric meter, which includes BLE broadcast firmware, OTP encryption module, and data reading module. When the staff needs to obtain the current meter data, the staff can trigger the matching instruction of the specified application on the mobile terminal within the preset distance of the metering device to send a request to the meter to obtain the current meter data. After the meter receives the request, it can pass the data The reading module obtains the current meter reading and the corresponding time, and then generates the first encrypted data from the meter reading, the unique identifier of the meter and the corresponding time through the OTP encryption module. When the corresponding first encrypted data is generated, the data of the electricity meter is read directly, so the data of the electricity meter can be guaranteed to be authentic. It should be noted that, because the identification of the beacon information may include not only a unique identification for distinguishing different devices, but also a device number. Therefore, in some embodiments, in order to prevent the transmission data from being maliciously tampered with and ensure the security of the transmission data, when the metering device encrypts the acquired data, the unique identification of the device included in the identification identification may be used. In some implementation scenarios, instant communication can be performed between the metering device, the terminal device, and the server, so that when the metering device acquires the metering data, the terminal device and the server can acquire and save the corresponding time. It should be noted that the terminal device and the server can obtain the corresponding time in any manner known to those in the art, which is not limited in this specification. S12: The metering device sends beacon information to the terminal device, where the beacon information includes the metering data, the first encrypted data, and the identification identifier. The identification identifier may include a unique device identifier, a device number, and the like. In an embodiment of this specification, after the metering device generates the corresponding first encrypted data, the metering device can broadcast the metering data, the encrypted data and the identification through the built-in Bluetooth or WiFi network. In an embodiment of the present specification, the sending of the beacon information by the metering device to the terminal device may include: the terminal device establishing the The communication connection between the metering device and the terminal device; the metering device sends the beacon information to the terminal device. The conditions for establishing a communication connection between the metering device and the terminal device may include that the terminal device is within a preset distance range of the metering device, or triggers a matching instruction of a specified application on the terminal device, or the terminal device is within a preset distance range of the metering device and triggers a matching instruction. Matching instructions for the specified application on the terminal, etc. It should be noted that the conditions for establishing the communication connection may also include other conditions, which are not limited in this specification. For example, in an implementation scenario, the meter reading staff can start the metering application (Application, app) on the smartphone they are using, and then establish a communication connection with the metering device by clicking the "Data Receive" control on the metering app. Thus, the information broadcast by the metering device can be received. In another implementation scenario, the meter reading staff can start the metering app on the smartphone they are using within the preset distance of the metering device, and then click the "Data Receive" control item on the metering app to establish a communication connection with the metering device. , so that the information broadcast by the metering device can be received. In some embodiments, after receiving the metering data, encrypted data, and identification, the terminal device may summarize the received information. For example, after the meter reading staff starts the metering app on the smartphone they are using, and clicks the "data reception" control item on the metering app to establish a communication connection with the metering device and receive the information broadcast by each metering device, they can The information received is aggregated. For example, in some implementation scenarios, after receiving the metering data, encrypted data, and identification identifiers, the terminal device may aggregate by time interval, aggregate by location information corresponding to the metering device, or aggregate by quantity. For example, after receiving the metering data, encrypted data and identification mark, the terminal device can aggregate the information belonging to the same community, or it can aggregate it once when the received information reaches 100, or it can also aggregate the information received within a week. Aggregate information, etc. It should be noted that, because the identification of the beacon information may include not only a unique identification for distinguishing different devices, but also a device number and the like. Therefore, in some embodiments, in order to prevent the transmission data from being maliciously tampered with and ensure the security of the transmission data, when the metering device broadcasts, the identification included in the beacon information is the device number. In addition, the information broadcasted by the above-mentioned metering device including the metering data, the first encrypted data, and the device number is only illustrative, and the information broadcasted by the metering device may also include other information, which is not limited in this specification. S20: The terminal device sends the beacon information to the server. In one embodiment of this specification, after the metering device sends the beacon information to the terminal device, the terminal device may aggregate the beacon information and send it to the server. In some embodiments, the terminal device may send the beacon information to the server when a preset sending requirement is met. The preset sending requirements may include that the number of beacon information received by the terminal device reaches a preset number, or the terminal device receives one and sends one to the server, or the terminal device sends all the beacon information after passing the verification. , or send it regularly, such as once an hour, etc. In an embodiment of this specification, the terminal device may be a mobile terminal. Correspondingly, the sending the beacon information to the terminal device, and the terminal device sending the beacon information to the server may include: The mobile terminal establishes a communication connection between the metering device and the mobile terminal within the preset distance range of the metering device and/or based on a matching instruction that triggers a specified application on the mobile terminal; the metering device transmits the beacon information to the mobile terminal. sending the beacon information to the mobile terminal; the mobile terminal sends the beacon information to the server when a preset sending requirement is met. In some embodiments, when the information received by the terminal device includes the metering data, the first encrypted data, and the device number in the identification, the terminal device may aggregate the received information according to the device number and send it to the server. device. In another embodiment provided in this specification, the terminal device may pre-store relevant information of each of the above-mentioned metering devices, such as identification identifiers, wherein the device number and the unique device identifier in the pre-stored identification identifiers may be preset to be associated with each other. After receiving the beacon information, the terminal device may further include: S200: Generate third encrypted data based on the measurement data, the identification identifier, and the third timestamp corresponding to when the beacon information is received; S202 : Compare the third encrypted data with the first encrypted data, and record the measurement data when the comparison result meets the recording requirements. In some embodiments, the beacon information may include the metering data, the first encrypted data, and the identification. In other embodiments, the beacon information may include other information, such as third encrypted data, in addition to the measurement data, the first encrypted data and the identification identifier. In some embodiments, meeting the recording requirement may include that the comparison result is within a preset error range, or the comparison result is the same, or others. In order to improve the security of data transmission, in some embodiments, when the information received by the terminal device includes the metering data, the first encrypted data and the device number in the identification, the terminal device can Find the device corresponding to the device number in the , and obtain the unique identifier of the device, encrypt the metering data, the unique identifier of the device, and the third time stamp corresponding to the beacon information received through the encryption method, and obtain the first Three encrypted information, and then the terminal device compares the third encrypted data with the first encrypted data, and when the comparison result meets the recording requirements, it indicates that the received measurement data of the metering device is the same as the measurement data based on which the first encrypted data was generated. Therefore, it can be shown that the received measurement data of the measurement device is true, and finally the measurement data, identification mark, and first encrypted data can be sent to the server, thereby improving the security of data transmission. In other embodiments, when the information received by the terminal device includes the metering data, the first encrypted data, and the device number in the identification, the terminal device may search the pre-stored information for the device number corresponding to the device number. and obtain the unique identifier of the device, encrypt the metering data, the unique identifier of the device, and the third timestamp corresponding to the received beacon information through the encryption method to obtain the third encrypted information, and then the terminal device will The third encrypted data is compared with the first encrypted data, and when the comparison result does not meet the recording requirements, it indicates that the received measurement data of the metering device is not the same as the measurement data based on which the first encrypted data was generated. The received measurement data of the metering device is untrue, and the untrue situation can be fed back to the relevant technical personnel to enhance the security of the data transmission process. In other embodiments, when the information received by the terminal device includes metering data, the first encrypted data, and the device number in the identification, the terminal device can search for the device number in the pre-stored information The corresponding device, obtain the unique identifier of the device, encrypt the measurement data, the unique identifier of the device, and the third time stamp corresponding to receiving the beacon information through the encryption method, obtain the third encrypted information, and then encrypt the metering data. The data, the identification mark, the first encrypted data and the third encrypted data are sent to the server for further verification by the server, thereby improving the security of data transmission. It should be noted that, in some embodiments, the third timestamp may be the time corresponding to when the terminal device receives the beacon information. The third time stamp and the first time stamp used when generating the first encrypted data may be in the same time window or a preset time window. For example, if the preset time window is 60 seconds, and the time used to generate the first encrypted data is 16:12:24, the third timestamp can be between 16:12:24 and 16:13:24 . It should be noted that the above encryption method may be the same as the encryption method adopted by the metering device, or may be a method different from the encryption method adopted by the metering device, which is not limited in this specification. S30: The server generates second encrypted data based on the identification identifier, the measurement data, and the corresponding second timestamp when the beacon information is received. In some embodiments, the second time stamp and the first time stamp may be in the same time window or within a preset time window. In one embodiment of the present specification, the server may pre-store the identification identifiers of each metering device. The identification identifier may include a unique device identifier, a device number, and the like. The device number and the device unique identifier may be associated with each other in advance. The second timestamp may include the time corresponding to when the server receives the beacon information. A time window may represent a preset time period. The second time stamp and the first time stamp in the same time window can be understood as: the first time stamp is used as the start time, the sum of the start time and the preset time period is the end time, and the second time stamp can be between the start time and the end time. In some embodiments, the second time stamp and the first time stamp are in the same time window, which can prevent data from being tampered with. In an embodiment of this specification, since the measurement data may be maliciously fabricated or tampered with during the information broadcasting and data transmission process, after receiving the beacon information, the server can encrypt the measurement data through an encryption algorithm. , The unique device identifier and the corresponding time in the identification identifier are encrypted to obtain encrypted data. In some embodiments, since the identification identifier received by the server includes the device number, in order to ensure the security of the data, a unique device identifier corresponding to the device number can be obtained. For example, in some implementation scenarios, the server may pre-store the identification of each metering device, and the device number included in the identification is associated with the unique device identifier. When the identification received by the server includes the device number, it can be based on The device number included in the beacon information searches the server for the corresponding device unique identifier, and then encrypts the measurement data, the found device unique identifier and the corresponding time through an encryption algorithm to obtain second encrypted data. In other embodiments, in order to ensure the security of data, after receiving the beacon information, the server may first search the server for the corresponding unique device identifier according to the device number in the identification identifier, and then find the unique identifier of the device in the server. The unique device ID of the device is compared with the device unique ID included in the received beacon information. If the two are the same, the metering data, the device unique ID in the identification ID and the corresponding time are encrypted through an encryption algorithm to obtain the second encrypted data. In some embodiments, if the found device unique identifier is different from the device unique identifier included in the received beacon information, it can be fed back to the relevant technical personnel to enhance the security of the data transmission process. It should be noted that the encryption method may be the encryption method adopted by the metering device, or may be a method different from the encryption method adopted by the metering device, which is not limited in this specification. S32: The server compares the second encrypted data with the first encrypted data, and records the measurement data when the comparison result meets the recording requirement. In some embodiments, after generating the second encrypted data, the server compares the second encrypted data with the previously received encrypted data to determine whether the received measurement data has been tampered with, thereby improving the security of data transmission. Wherein, meeting the recording requirement may include that the comparison result is within a preset error range, or the comparison result is the same, or other requirements. In one embodiment of this specification, after the server receives the beacon information and generates the second encrypted data based on the relevant information, the second encrypted data can be compared with the first encrypted data included in the received beacon information . If the comparison result meets the recording requirements, it indicates that the received measurement data of the metering device is the same as the measurement data based on which the first encrypted data was generated, so it can be shown that the received measurement data of the metering device is true, and the server can Record the measurement data of the measurement equipment. Otherwise, it indicates that the received measurement data of the metering device is not the same as the measurement data based on which the first encrypted data was generated, so it can be shown that the received measurement data of the metering device may have been maliciously fabricated during the previous data transmission process. or tampered with, is not true. In some embodiments, when the server receives the measurement data, the identification, the first encrypted data and the third encrypted data, the second encrypted data can be compared with the received first encrypted data and the third encrypted data. . When the comparison results of the second encrypted data, the first encrypted data, and the third encrypted data meet the recording requirements, it indicates that the received measurement data of the metering device is the same as the measurement data based on which the first encrypted data was generated, so it can be shown that The received measurement data of the measurement device is real, and the server can record the measurement data of the measurement device. It should be noted that, when the received measurement data of the metering device may be maliciously fabricated or tampered with during the previous data transmission process, the server can feed back the untrue situation to the relevant technical personnel to strengthen the Data transmission process security. In this way, the meter reading personnel can obtain the measurement data of each metering device without visual observation by the meter reader, and can also ensure the authenticity of the data recorded by the server. This manual also provides another scenario example. For example, in the actual application process, there are multiple owners in a certain building in a community, each owner's house corresponds to a metering device, and a smart master meter can be set in the building. After each metering device reads its own metering data and generates the corresponding first encrypted data, it can broadcast it through Bluetooth. The smart meter can collect the information broadcasted by the metering device by scanning and receiving it, and then communicate with the server through communication. The established communication connection sends the aggregated information to the server, and the server can obtain the real data of the metering device by verifying the received information. In this way, the meter reading personnel can obtain the measurement data of each metering device without the need for visual observation or door-to-door observation by the meter reader, ensuring the authenticity of the data recorded by the server. The metering device and the smart meter may include a Bluetooth module and/or a WiFi module, the metering device and the smart meter may be connected and data transmitted through a Bluetooth or WiFi network, and the metering device is in slave mode for broadcasting News. In addition, the smart master meter can also include a remote communication module, which can communicate with a remote server to realize data transmission with the server. According to a data reading method provided by the embodiments of this specification, the metering device can encrypt its own metering data and broadcast it through Bluetooth. compared to encrypted data. In this way, the meter reading personnel can obtain the measurement data of each metering device without the need for the naked eye or door-to-door observation of the meter reader, thus ensuring the authenticity of the data recorded by the server, and effectively solving the problem of malicious tampering during the data transmission process. Data reading security. The above embodiments describe the implementation of the data reading method from the perspective of metering device/terminal device/server interaction. Based on the description of the above-mentioned embodiments, this specification also provides a data reading method that can be described from the perspective of interaction between a metering device/server. FIG. 3 is a schematic flowchart of another embodiment of the data reading method provided in this specification. Specifically, in one embodiment, the method may include: S40: Acquire measurement data on a metering device, and generate first encrypted data based on the measurement data, the identification identifier, and a first time stamp, where the first time stamp includes The time corresponding to when the metering device acquires the metering data; S42: The metering device sends beacon information to the server, where the beacon information includes the metering data, the first encrypted data, and the identification identifier; S50: The server generates second encrypted data based on the identification, the measurement data and the second timestamp corresponding to the beacon information received; S52: The server compares the second encrypted data The measurement data is recorded when the comparison result meets the recording requirement with the first encrypted data. The metering device may include a Bluetooth module and a WiFi module, and is in a slave mode for broadcasting information. In addition, the metering device can also include a remote communication module, which can communicate with a remote server to realize data transmission with the server. In an embodiment of this specification, after each metering device reads its own metering data and generates the corresponding first encrypted data, it can broadcast through a Bluetooth or WiFi network, and the server scans and receives the information broadcasted by the metering device. , the real data of the metering equipment can be obtained by verifying the received information. In this way, the metering data of each metering device can be obtained not only without the need for the meter reading personnel to observe with the naked eye or door-to-door observation, but also without corresponding processing by the terminal equipment, ensuring the authenticity of the data recorded by the server and improving the safety of data reading. . Each embodiment of the above method in this specification is described in a progressive manner, and the same and similar parts between the various embodiments may be referred to each other, and each embodiment focuses on the differences from other embodiments. For related parts, please refer to the partial descriptions of the method embodiments. The above embodiments describe the implementation of the data reading method from the perspective of metering device/terminal device/server interaction. Based on the description of the above embodiments, this specification also provides a data reading method that can be applied to the side of the metering device. FIG. 4 is a schematic flowchart of an embodiment of a method provided in this specification that can be used on one side of a metering device. Specifically, in one embodiment, the method may include: S60: Acquire measurement data, and generate first encrypted data based on the measurement data, the identification identifier, and a first time stamp, where the first time stamp includes the measurement device acquiring all the data. The time corresponding to the measurement data; S62: Send beacon information to the server, where the beacon information includes the measurement data, the first encrypted data and the identification, so that the server is based on the The identification identifier, the measurement data, and the corresponding second timestamp when the beacon information is received are generated to generate second encrypted data, and the comparison result between the second encrypted data and the first encrypted data is determined to be consistent with the record Record the measurement data when required. In some embodiments, the sending of the beacon information to the terminal device may use a Bluetooth or WiFi network. In some embodiments, the sending the beacon information to the server may include: sending the beacon information to a terminal device, and the terminal device sends the beacon information to the server. In other embodiments, the terminal device may be a mobile terminal. Correspondingly, the sending the beacon information to the terminal device, and the terminal device sending the beacon information to the server may include: the The mobile terminal establishes a communication connection between the metering device and the mobile terminal within the preset distance range of the metering device and/or based on a matching instruction that triggers a specified application on the mobile terminal; the metering device sends the beacon information to the mobile terminal; the mobile terminal sends the beacon information to the server when a preset sending requirement is met. For the metering device, when the user or staff triggers the corresponding instruction, the metering device can start to acquire the corresponding metering data based on the instruction, and generate the first encrypted data based on the metering data, identification and time stamp, and then broadcast the corresponding information, so that the server generates second encrypted data based on the received information and compares it to determine whether the received measurement data is the real data obtained by the measurement device, thereby preventing malicious tampering or falsification during data transmission. Each embodiment of the above method in this specification is described in a progressive manner, and the same and similar parts between the various embodiments may be referred to each other, and each embodiment focuses on the differences from other embodiments. For related parts, please refer to the partial descriptions of the method embodiments. The above embodiments describe the implementation of the data reading method from the perspective of metering device/terminal device/server interaction. Based on the description of the above embodiments, this specification also provides a data reading method that can be applied to the server side. FIG. 5 is a schematic flowchart of an embodiment of the method provided in this specification that can be used on the server side. Specifically, in one embodiment, the method may include: S70: Receive beacon information, where the beacon information includes metering data, first encrypted data, and an identification, the first encrypted data is based on the metering data, An identification identifier and a first timestamp are generated, and the first timestamp includes the time corresponding to when the metering device acquires the metering data; S72: Based on the identification identifier, the metering data, and when the beacon information is received The corresponding second time stamp generates second encrypted data; S74: Compare the second encrypted data with the first encrypted data, and record the measurement data when the comparison result meets the recording requirement. In an embodiment of this specification, the beacon information received by the server may be directly sent by the metering device, or may be forwarded through other terminal devices. In a data reading method provided by the embodiments of this specification, the metering device encrypts its own metering data and broadcasts it through Bluetooth. After receiving the information, the server encrypts the data based on the corresponding information, and combines the encrypted data with the received data. encrypted data for comparison. In this way, the meter reading personnel can obtain the measurement data of each metering device without the need for the naked eye or door-to-door observation of the meter reader, thus ensuring the authenticity of the data recorded by the server, and effectively solving the problem of malicious tampering during the data transmission process. Data reading security. The method embodiments provided by the embodiments of the present application may be executed in a mobile terminal, a computer terminal, a server, or a similar computing device. Taking running on a server as an example, FIG. 6 is a block diagram of the hardware structure of a server for reading data in an embodiment of this specification. As shown in FIG. 6 , the server 10 may include one or more (only one is shown in the figure) processor 102 (the processor 102 may include, but is not limited to, a processing device such as a microprocessor MCU or a programmable logic device FPGA, etc. ), a memory 104 for storing data, and a transmission module 106 for communication functions. Those skilled in the art to which the present invention pertains can understand that the structure shown in FIG. 6 is only a schematic diagram, which does not limit the structure of the above-mentioned electronic device. For example, the server 10 may further include more or less elements than those shown in FIG. 6 , for example, may also include other processing hardware, such as a GPU (Graphics Processing Unit, graphics processor), or a show different configurations. The memory 104 can be used to store software programs and modules of the application software, such as program instructions/modules corresponding to the data reading method in the embodiment of the present invention. The processor 102 runs the software programs and modules stored in the memory 104. group, so as to perform various functional applications and data processing, that is, to realize the above-mentioned data reading method. Memory 104 may include high-speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some examples, the memory 104 may further include memory disposed remotely relative to the processor 102, and these remote storages may be connected to the computer terminal 10 through a network. Examples of such networks include, but are not limited to, the Internet, an intranet, a local area network, a cellular network, and combinations thereof. The transmission module 106 is used to receive or transmit data via a network. The specific example of the above-mentioned network may include the wireless network provided by the communication provider of the computer terminal 10 . In one example, the transmission module 106 includes a network interface controller (NIC), which can be connected to other network devices through a base station to communicate with the Internet. In one example, the transmission module 106 may be a radio frequency (RF) module, which is used for wirelessly communicating with the Internet. Based on the data reading method described above, this specification also provides a data reading device. The apparatus may include systems (including distributed systems), software (applications), modules, components, servers, metering equipment, etc. that use the methods described in the embodiments of this specification, in combination with necessary hardware implementations. . Based on the same innovative idea, the processing device in an embodiment provided in this specification is described in the following embodiment. Since the implementation solution of the device to solve the problem is similar to the method, the implementation of the specific processing device in the embodiment of the present specification may refer to the implementation of the foregoing method, and repeated details will not be repeated. Although the apparatus described in the following embodiments is preferably implemented in software, implementations in hardware, or a combination of software and hardware, are also possible and contemplated. Specifically, as shown in FIG. 7, FIG. 7 is a schematic structural diagram of a module according to an embodiment of a data reading device provided in this specification that can be used on the server side. Specifically, it can include: a receiving module 120, which can be used for Receive beacon information, where the beacon information includes measurement data, first encrypted data, and an identification, the first encrypted data is generated based on the measurement data, the identification, and a first timestamp, and the first timestamp includes the time corresponding to when the metering device obtains the metering data; the first generating module 122 can be configured to generate the first generation module 122 based on the identification mark, the metering data and the second timestamp corresponding to the time when the beacon information is received Two encrypted data; the comparison module 124 can be used to compare the second encrypted data with the first encrypted data, and record the measurement data when the comparison result meets the recording requirements. For the specific implementation of the apparatuses in the foregoing embodiments, reference may be made to the descriptions of the related method embodiments, which are not repeated here. Based on the above-mentioned data reading method, this specification also provides a data reading device that can be used on the side of a metering device. FIG. 8 is a schematic structural diagram of a module according to an embodiment of a data reading device provided in this specification that can be used on one side of a metering device. Specifically, it may include: a second generation module 210 for acquiring measurement data, based on the measurement The data, the identification and the first time stamp generate the first encrypted data, and the first time stamp includes the time corresponding to when the measurement device obtains the measurement data; the sending module 212 can be used to send the beacon information to the server , the beacon information includes the measurement data, the first encrypted data, and the identification mark, so that the server corresponds to the identification mark, the measurement data, and the beacon information when it receives the beacon information. The second time stamp of the second encrypted data is generated, and the measurement data is recorded when it is determined that the comparison result between the second encrypted data and the first encrypted data meets the recording requirements. In another embodiment of the apparatus, the sending module 212 may include: a first sending unit 2120, which may be configured to send the beacon information to a terminal device, and the terminal device sends the beacon information sent to the server. In another embodiment of the apparatus, the terminal device is a mobile terminal. Correspondingly, the sending the beacon information to the terminal device, and the terminal device sending the beacon information to the server includes: establishing a connection unit for establishing a communication connection between the metering device and the mobile terminal when the mobile terminal is within a preset distance range of the metering device and/or based on a matching instruction that triggers a specified application on the mobile terminal; the second sending a unit for the metering device to send the beacon information to the mobile terminal; a third sending unit for the mobile terminal to send the beacon information to the server when the mobile terminal meets a preset sending requirement device. For the specific implementation of the apparatuses in the foregoing embodiments, reference may be made to the descriptions of the related method embodiments, which are not repeated here. The data reading method provided by the embodiments of this specification can be implemented by a processor executing corresponding program instructions in a computer, such as using the C++ language of the windows operating system to implement on the PC side, or other systems such as Linux, android, and iOS corresponding to the system. The application design language sets the necessary hardware implementation, or the processing logic implementation based on quantum computer, etc. Specifically, in an embodiment in which a server provided in this specification implements the above method, the server may include a processor and a memory for storing processor-executable instructions, and when the processor executes the instructions, it implements: Receive beacon information, where the beacon information includes measurement data, first encrypted data, and an identification, the first encrypted data is generated based on the measurement data, the identification, and a first timestamp, and the first timestamp includes the time corresponding to when the metering device obtains the metering data; generating the second encrypted data based on the identification identifier, the metering data and the second timestamp corresponding to the time when the beacon information is received; comparing the second encryption The data is compared with the first encrypted data, and the measurement data is recorded when the comparison result meets the recording requirements. Correspondingly, a metering device provided in this specification implements an embodiment of the above method. The metering device may include a processor and a memory for storing processor-executable instructions, and when the processor executes the instructions, it implements: obtaining metering data, and generate first encrypted data based on the measurement data, identification and a first time stamp, where the first time stamp includes the time corresponding to when the measurement device acquired the measurement data; send the beacon information to the server, the The beacon information includes the measurement data, the first encrypted data, and the identification, so that the server can base on the identification, the measurement data, and the corresponding first data when the beacon information is received. The second time stamp generates second encrypted data, and the measurement data is recorded when it is determined that the comparison result between the second encrypted data and the first encrypted data meets the recording requirements. The above-described instructions may be stored in a variety of computer-readable storage media. The computer-readable storage medium may include a physical device for storing information, and the information may be digitized and then stored in an electrical, magnetic or optical medium. The computer-readable storage medium described in this embodiment may include: devices that use electrical energy to store information, such as various types of memory, such as RAM, ROM, etc.; devices that use magnetic energy to store information, such as hard disks, floppy disks, Magnetic tape, magnetic core memory, magnetic bubble memory, U disk; devices that use optical means to store information such as CD or DVD. Of course, there are other readable storage media, such as quantum memory, graphene memory, and so on. The instructions in the device or server or metering device or system described below are as described above. Based on the foregoing description, this specification also provides a data reading system. In one embodiment of the system, a metering device and a server may be included. The metering device acquires the metering data, and based on the The time stamp generates first encrypted data, and sends beacon information to the server, the first time stamp includes the time corresponding to when the metering device obtains the measurement data, and the beacon information includes the measurement data, the first time stamp an encrypted data and the identification identifier; the server receives the beacon information, and generates a second encryption based on the identification identifier, the metering data, and a second timestamp corresponding to when the beacon information is received data, compare the second encrypted data with the first encrypted data, and record the measurement data when the comparison result meets the recording requirements. It should be noted that, the apparatuses, measuring devices, servers, and systems described above in the embodiments of this specification may also include other implementations according to the descriptions of the related method embodiments. For a specific implementation manner, reference may be made to the description of the method embodiment, which will not be repeated here. Each embodiment in this specification is described in a progressive manner, and the same and similar parts between the various embodiments may be referred to each other, and each embodiment focuses on the differences from other embodiments. In particular, for the hardware+program embodiment, since it is basically similar to the method embodiment, the description is relatively simple, and for related parts, please refer to the partial description of the method embodiment. The foregoing describes specific embodiments of the present specification. Other embodiments are within the scope of the appended claims. In some cases, the actions or steps recited in the claims can be performed in an order different from that in the embodiments and still achieve desirable results. Additionally, the processes depicted in the figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multiplexing and parallel processing are also possible or may be advantageous. The embodiment of this specification provides a metering device or server for reading data. The metering device can encrypt its own metering data and broadcast it through Bluetooth. After receiving the information, the server encrypts it based on the corresponding Compare the encrypted data with the received encrypted data. In this way, the meter reading personnel can obtain the measurement data of each metering device without the need for the naked eye or door-to-door observation of the meter reader, thus ensuring the authenticity of the data recorded by the server, and effectively solving the problem of malicious tampering during the data transmission process. Data reading security. Of course, the implementation of the above embodiments can also be used in other application scenarios that need to acquire self-data. Although the present application provides method operation steps as described in the embodiments or flow charts, more or less operation steps may be included based on routine or non-creative work. The sequence of steps enumerated in the embodiments is only one of the execution sequences of many steps, and does not represent the only execution sequence. When an actual device or metering device product is executed, it can be executed sequentially or concurrently (eg, in a parallel processor or multi-threaded processing environment) according to the methods shown in the embodiments or drawings. Although the content of the embodiments of this specification mentions data acquisition, interaction, processing, comparison and other operations such as the dialog mode of the metering device/terminal device/server, the dialog mode of the metering device/server, encryption algorithm, information broadcasting, etc. and data description, however, the embodiments of this specification are not limited to conforming to industry communication standards, standard image data processing protocols, communication protocols and standard data models/templates or the situations described in the embodiments of this specification. Some industry standards or implementations using custom methods or implementations described in the examples with slight modifications can also achieve the same, equivalent or similar implementation effects of the above-mentioned examples, or the expected implementation effects after deformation. Embodiments obtained by applying these modified or deformed data acquisition, storage, judgment, processing methods, etc., can still fall within the scope of the optional embodiments of this specification. In the 1990s, an improvement in a technology could be clearly distinguished as a hardware improvement (for example, improvements to circuit structures such as diodes, transistors, switches, etc.) or software improvements (for methods and procedures) Improve). However, with the development of technology, the improvement of many methods and processes today can be regarded as a direct improvement of the hardware circuit structure. Designers almost get the corresponding hardware circuit structure by programming the improved method flow into the hardware circuit. Therefore, it cannot be said that the improvement of a method process cannot be achieved by hardware entity modules. For example, a Programmable Logic Device (PLD) (such as a Field Programmable Gate Array (FPGA)) is an integrated circuit whose logic function is determined by user programming of the device . A digital system is "integrated" on a PLD by the designer's own programming, without the need for a chip manufacturer to design and fabricate a dedicated integrated circuit chip. Moreover, instead of hand-making integrated circuit chips, this kind of programming is now mostly implemented using "logic compiler" software, which is similar to the software compiler used in programming, but requires The source code before compilation must also be written in a specific programming language, which is called Hardware Description Language (HDL). Boolean Expression Language), AHDL (Altera Hardware Description Language), Confluence, CUPL (Cornell University Programming Language), HDCal, JHDL (Java Hardware Description Language), Lava, Lola, MyHDL, PALASM, RHDL (Ruby Hardware Description Language), etc., The most commonly used are VHDL (Very-High-Speed Integrated Circuit Hardware Description Language) and Verilog. It should also be clear to those skilled in the art that a hardware circuit for implementing the logic method flow can be easily obtained by simply programming the method flow in the above-mentioned several hardware description languages and programming it into an integrated circuit. The controller may be implemented in any suitable manner, for example, the controller may take the form of, for example, a microprocessor or processor and a computer readable code (eg software or firmware) storing computer readable program code (eg software or firmware) executable by the (micro)processor Forms of media, logic gates, switches, Application Specific Integrated Circuits (ASICs), programmable logic controllers and embedded microcontrollers, examples of controllers include but are not limited to the following microcontrollers: ARC 625D , Atmel AT91SAM, Microchip PIC18F26K20 and Silicon Labs C8051F320, the memory controller can also be implemented as part of the memory control logic. Those skilled in the art also know that, in addition to implementing the controller in the form of pure computer readable code, it is possible to make the controller use logic gates, switches, special application integrated circuits, programmable logic through logic programming of method steps. The same function can be realized in the form of a controller and an embedded microcontroller, etc. Therefore, the controller can be regarded as a hardware component, and the devices for realizing various functions included in the controller can also be regarded as a structure in the hardware component. Or even, the means for implementing various functions can be regarded as both a software module for implementing the method and a structure within a hardware component. The systems, devices, modules or units described in the above embodiments may be specifically implemented by computer chips or entities, or by products with certain functions. A typical implementation device is a computer. Specifically, the computer can be, for example, a personal computer, a laptop computer, a vehicle-mounted human-computer interaction device, a cellular phone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email device, a game console , tablet, wearable, or any combination of these devices. Although the embodiments of the present specification provide method operation steps as described in the embodiments or flow charts, more or less operation steps may be included based on conventional or non-inventive means. The sequence of steps enumerated in the embodiments is only one of the execution sequences of many steps, and does not represent the only execution sequence. When an actual device or terminal product is executed, it can be executed sequentially or concurrently according to the methods shown in the embodiments or drawings (for example, a parallel processor or a multi-threaded processing environment, or even a distributed data processing environment). The terms "comprising", "comprising" or any other variation thereof are intended to encompass a non-exclusive inclusion such that a process, method, product or device comprising a list of elements includes not only those elements, but also others not expressly listed elements, or also include elements inherent to such a process, method, product or device. Without further limitation, it does not preclude the presence of additional identical or equivalent elements in a process, method, product or apparatus comprising the stated elements. For the convenience of description, when describing the above device, the functions are divided into various modules and described respectively. Of course, when implementing the embodiments of this specification, the functions of each module may be implemented in the same one or more software and/or hardware, or the modules that implement the same function may be composed of multiple sub-modules or combinations of sub-units. realization etc. The apparatus embodiments described above are only illustrative. For example, the division of the units is only a logical function division. In actual implementation, there may be other division methods. For example, multiple units or elements may be combined or integrated into Another system, or some features can be ignored, or not implemented. On the other hand, the shown or discussed mutual coupling or direct coupling or communication connection may be through some interfaces, indirect coupling or communication connection of devices or units, and may be electrical, mechanical or other forms. Those skilled in the art also know that, in addition to implementing the controller in the form of pure computer readable code, the controller can be controlled by logic gates, switches, dedicated integrated circuits, programmable logic control by logically programming the method steps. The same function can be realized in the form of a device and an embedded microcontroller. Therefore, the controller can be regarded as a hardware component, and the devices included therein for realizing various functions can also be regarded as a structure in the hardware component. Or even, the means for implementing various functions can be regarded as both a software module for implementing the method and a structure within a hardware component. The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each process and/or block in the flowchart illustrations and/or block diagrams, and combinations of processes and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to the processor of a general purpose computer, special purpose computer, embedded processor or other programmable data processing device to produce a machine for execution of the instructions by the processor of the computer or other programmable data processing device Means are created for implementing the functions specified in the flow or flows of the flowcharts and/or the blocks or blocks of the block diagrams. These computer program instructions may also be stored in computer readable memory capable of directing a computer or other programmable data processing device to operate in a particular manner, such that the instructions stored in the computer readable memory result in an article of manufacture comprising the instruction means , the instruction means implement the functions specified in the flow or flow of the flowchart and/or the block or blocks of the block diagram. These computer program instructions can also be loaded onto a computer or other programmable data processing device, such that a series of operational steps are performed on the computer or other programmable device to produce a computer-implemented process that can be executed on the computer or other programmable device. The instructions executed on the above provide steps for implementing the functions specified in the flow diagram flow or flow diagrams and/or the block diagram flow diagram block or blocks. In a typical configuration, a computing device includes one or more processors (CPUs), an input/output interface, a network interface, and memory. Memory may include forms of non-persistent memory, random access memory (RAM) and/or non-volatile memory in computer readable media, such as read only memory (ROM) or flash memory ( flash RAM). Memory is an example of a computer-readable medium. Computer-readable media includes both permanent and non-permanent, removable and non-removable media, and can be implemented by any method or technology for storage of information. Information can be computer readable instructions, data structures, modules of programs, or other data. Examples of computer storage media include, but are not limited to, phase-change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM) , Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), Flash Memory or Other Memory Technologies, CD-ROM Read Only Memory (CD-ROM), Digital Versatile A compact disc (DVD) or other optical storage, magnetic cassette, magnetic tape storage or other magnetic storage device or any other non-transmission medium may be used to store information that can be accessed by a computing device. As defined herein, computer-readable media does not include transitory computer-readable media, such as modulated data signals and carrier waves. It will be apparent to those skilled in the art that the embodiments of this specification may be provided as a method, a system or a computer program product. Accordingly, embodiments of this specification may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, embodiments of the present specification may employ computer program products implemented on one or more computer-usable storage media (including, but not limited to, disk memory, CD-ROM, optical memory, etc.) having computer-usable code contained therein form. Embodiments of this specification may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. Embodiments of the present specification may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may reside in local and remote computer storage media, including storage devices. Each embodiment in this specification is described in a progressive manner, and the same and similar parts between the various embodiments may be referred to each other, and each embodiment focuses on the differences from other embodiments. In particular, for the system embodiments, since they are basically similar to the method embodiments, the description is relatively simple, and reference may be made to some descriptions of the method embodiments for related parts. In the description of this specification, description with reference to the terms "one embodiment," "some embodiments," "example," "specific example," or "some examples", etc., mean specific features described in connection with the embodiment or example , structures, materials, or features are included in at least one example or example of embodiments of this specification. In this specification, schematic representations of the above terms are not necessarily directed to the same embodiment or example. Furthermore, the particular features, structures, materials or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, those skilled in the art may combine and combine the different embodiments or examples described in this specification, as well as the features of the different embodiments or examples, without conflicting each other. The above descriptions are merely examples of the embodiments of the present specification, and are not intended to limit the embodiments of the present specification. For those skilled in the art, various modifications and variations can be made to the embodiments of the present specification. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the embodiments of the present specification should be included within the scope of the claims of the embodiments of the present specification.

S10:步驟 S12:步驟 S20:步驟 S30:步驟 S32:步驟 S40:步驟 S42:步驟 S50:步驟 S52:步驟 S60:步驟 S62:步驟 S70:步驟 S72:步驟 S74:步驟 10:伺服器 102:處理器 104:非易失性記憶體/記憶體 106:傳輸模組 120:接收模組 122:第一產生模組 124:比較模組S10: Steps S12: Steps S20: Steps S30: Step S32: Step S40: Steps S42: Step S50: Steps S52: Step S60: Steps S62: Step S70: Steps S72: Step S74: Step 10: Server 102: Processor 104: Non-Volatile Memory/Memory 106: Transmission module 120: Receive module 122: The first generation module 124: Compare Mods

為了更清楚地說明本說明書實施例或現有技術中的技術方案,下面將對實施例或現有技術描述中所需要使用的圖式作簡單地介紹,顯而易見地,下面描述中的圖式僅僅是本說明書中記載的一些實施例,對於本發明所屬技術領域中具有通常知識者來講,在不付出創造性勞動性的前提下,還可以根據這些圖式獲得其他的圖式。 [圖1]是本說明書提供的一種資料讀取方法的一個場景示意圖; [圖2]是本說明書提供的所述一種資料讀取方法實施例的流程示意圖; [圖3]是本說明書提供的所述一種資料讀取方法另一實施例的流程示意圖; [圖4]是本說明書提供的可以用於計量設備一側方法一種實施例的流程示意圖; [圖5]是本說明書提供的可以用於伺服器一側方法一種實施例的流程示意圖; [圖6]是本說明書實施例中一種資料讀取的伺服器的硬體結構方塊圖; [圖7]是本說明書提供的可以用於伺服器一側的一種資料讀取裝置實施例的模組結構示意圖; [圖8]是本說明書提供的可以用於計量設備一側的一種資料讀取裝置實施例的模組結構示意圖。In order to more clearly illustrate the technical solutions in the embodiments of the present specification or the prior art, the following briefly introduces the drawings required in the description of the embodiments or the prior art. Obviously, the drawings in the following description are only the For some embodiments described in the specification, for those with ordinary knowledge in the technical field to which the present invention pertains, other drawings can also be obtained from these drawings without any creative effort. [Fig. 1] is a schematic diagram of a scene of a data reading method provided in this specification; [Fig. 2] is a schematic flowchart of an embodiment of the data reading method provided in this specification; [FIG. 3] is a schematic flowchart of another embodiment of the data reading method provided in this specification; [Fig. 4] is a schematic flowchart of an embodiment of a method provided by this specification that can be used for one side of a metering device; [ Fig. 5 ] is a schematic flowchart of an embodiment of the method provided in this specification that can be used on the server side; [FIG. 6] is a block diagram of the hardware structure of a server for reading data in an embodiment of this specification; [ Fig. 7 ] is a schematic structural diagram of a module according to an embodiment of a data reading device provided in this specification that can be used on the server side; [ Fig. 8 ] is a schematic structural diagram of a module according to an embodiment of a data reading device provided in this specification that can be used on one side of a metering device.

Claims (14)

一種資料讀取方法,該方法包括:獲取計量設備上的計量資料,基於該計量資料、識別標識中的設備唯一標識以及第一時間戳產生第一加密資料,該第一時間戳包括計量設備獲取該計量資料時所對應的時間;該計量設備發送信標資訊至終端設備,該信標資訊包括該計量資料、該第一加密資料以及該識別標識中的設備編號;該終端設備將該信標資訊發送至伺服器;該伺服器基於該識別標識中的該設備唯一標識、該計量資料以及接收到該信標資訊時對應的第二時間戳產生第二加密資料,其中,該第一時間戳與該第二時間戳在預設的時間視窗內,該伺服器預先儲存有各個計量設備的識別標識,且該識別標識中包括的該設備偏號與該設備唯一標識相互關聯;以及該伺服器比較該第二加密資料與該第一加密資料,在比較結果符合記錄要求時記錄該計量資料。 A method for reading data, the method comprising: acquiring measurement data on a metering device, and generating first encrypted data based on the metering data, a device unique identifier in an identification, and a first time stamp, the first time stamp comprising the measurement device acquiring The time corresponding to the metering data; the metering device sends beacon information to the terminal device, and the beacon information includes the metering data, the first encrypted data and the device number in the identification; the terminal device sends the beacon to the device number; The information is sent to the server; the server generates second encrypted data based on the unique identification of the device in the identification, the measurement data and the corresponding second timestamp when the beacon information is received, wherein the first timestamp Within a preset time window with the second time stamp, the server pre-stores the identification of each metering device, and the device partial number included in the identification is associated with the unique identification of the device; and the server Comparing the second encrypted data with the first encrypted data, and recording the measurement data when the comparison result meets the recording requirement. 一種資料讀取方法,該方法包括:接收信標資訊,該信標資訊包括計量資料、第一加密資料以及識別標識中的設備編號,該第一加密資料基於該計量資料、識別標識中的設備唯一標識以及第一時間戳產生,該第一時間戳包括計量設備獲取該計量資料時所對應的時間; 基於該識別標識中的該設備唯一標識、該計量資料以及接收到該信標資訊時對應的第二時間戳產生第二加密資料,其中,該第一時間戳與該第二時間戳在預設的時間視窗內,預先儲存有各個計量設備的識別標識,該識別標識中包括的該設備偏號與該設備唯一標識相互關聯;以及比較該第二加密資料與該第一加密資料,在比較結果符合記錄要求時記錄該計量資料。 A data reading method, the method comprises: receiving beacon information, the beacon information includes measurement data, first encrypted data and a device number in an identification mark, the first encrypted data is based on the measurement data, identification of the equipment in the identification mark A unique identifier and a first timestamp are generated, and the first timestamp includes the time corresponding to when the metering device acquires the metering data; The second encrypted data is generated based on the unique identification of the device in the identification, the measurement data and the second time stamp corresponding to the beacon information when the beacon information is received, wherein the first time stamp and the second time stamp are in a preset In the time window of , the identification of each metering device is pre-stored, and the device partial number included in the identification is correlated with the unique identification of the device; and compare the second encrypted data and the first encrypted data, in the comparison result Record the measurement data when the recording requirements are met. 一種資料讀取方法,該方法包括:獲取計量資料,基於該計量資料、識別標識中的設備唯一標識以及第一時間戳產生第一加密資料,該第一時間戳包括計量設備獲取該計量資料時所對應的時間;以及發送信標資訊至伺服器,該信標資訊包括該計量資料、該第一加密資料以及該識別標識中的設備編號,以使該伺服器基於該識別標識中的該設備唯一標識、該計量資料以及接收到該信標資訊時對應的第二時間戳產生第二加密資料,並在確定該第二加密資料與該第一加密資料的比較結果符合記錄要求時記錄該計量資料,其中,該第一時間戳與該第二時間戳在預設的時間視窗內,該伺服器預先儲存有各個計量設備的識別標識,且該識別標識中包括的該設備偏號與該設備唯一標識相互關聯。 A method for reading data, the method comprising: acquiring measurement data, and generating first encrypted data based on the measurement data, a device unique identifier in an identification, and a first time stamp, the first time stamp including when the measurement device acquires the measurement data the corresponding time; and send beacon information to the server, the beacon information includes the metering data, the first encrypted data and the device number in the identification, so that the server is based on the device in the identification The unique identifier, the measurement data, and the second timestamp corresponding to the beacon information are generated to generate second encrypted data, and the measurement is recorded when it is determined that the comparison result between the second encrypted data and the first encrypted data meets the recording requirements data, wherein the first time stamp and the second time stamp are within a preset time window, the server pre-stores the identification of each metering device, and the device offset included in the identification and the device Unique identifiers are associated with each other. 如請求項3之方法,該發送信標資訊至伺服器,包括:將該信標資訊發送至終端設備,該終端設備將該信標資訊發送至伺服器。 According to the method of claim 3, the sending the beacon information to the server includes: sending the beacon information to the terminal device, and the terminal device sends the beacon information to the server. 如請求項4之方法,該將該信標資訊發送至終端設備包括採用下述中的至少一種通訊方式實現:藍牙;以及WiFi網路。 According to the method of claim 4, the sending the beacon information to the terminal device includes implementing at least one of the following communication methods: Bluetooth; and WiFi network. 如請求項4之方法,該終端設備為行動終端,對應地,該將該信標資訊發送至終端設備,該終端設備將該信標資訊發送至伺服器包括:該行動終端在計量設備預設距離範圍內和/或基於觸發行動終端上指定應用的匹配指令時,建立該計量設備與該行動終端的通訊連接;該計量設備將該信標資訊發送至該行動終端;以及該行動終端在達到預設的發送要求時,將該信標資訊發送至伺服器。 According to the method of claim 4, the terminal device is a mobile terminal, correspondingly, sending the beacon information to the terminal device, and the terminal device sending the beacon information to the server includes: the mobile terminal is preset in the metering device Within a distance range and/or based on a matching instruction that triggers a specified application on the mobile terminal, establish a communication connection between the metering device and the mobile terminal; the metering device sends the beacon information to the mobile terminal; and the mobile terminal reaches the When the default sending request is made, the beacon information is sent to the server. 一種資料讀取裝置,該裝置包括:接收模組,用於接收信標資訊,該信標資訊包括計量資料、第一加密資料以及識別標識中的設備編號,該第一加密資料基於該計量資料、識別標識中的設備唯一標識以及第一時間戳產生,該第一時間戳包括計量設備獲取該計量資料時所對應的時間;第一產生模組,用於基於該識別標識、該計量資料以及接收到該信標資訊時對應的第二時間戳產生第二加密資料,其中,該第一時間戳與該第二時間戳在預設的時間視窗內,預先儲存有各個計量設備的識別標識,該識別標識中包括的該設備偏號與該設備唯一標識相互關聯;以及 比較模組,用於比較該第二加密資料與該第一加密資料,在比較結果符合記錄要求時記錄該計量資料。 A data reading device, the device comprises: a receiving module for receiving beacon information, the beacon information includes measurement data, first encrypted data and a device number in an identification, the first encrypted data is based on the measurement data , the device unique identification in the identification mark and the first time stamp are generated, and the first time stamp includes the corresponding time when the metering device obtains the metering data; the first generation module is used for the identification based on the identification, the metering data and The second time stamp corresponding to the beacon information is received to generate second encrypted data, wherein the first time stamp and the second time stamp are pre-stored in a preset time window with the identification of each metering device, The device partial number included in the identification is associated with the device unique identification; and The comparison module is used to compare the second encrypted data with the first encrypted data, and record the measurement data when the comparison result meets the recording requirement. 一種資料讀取裝置,該裝置包括:第二產生模組,用於獲取計量資料,基於該計量資料、識別標識中的設備唯一標識以及第一時間戳產生第一加密資料,該第一時間戳包括計量設備獲取該計量資料時所對應的時間;以及發送模組,用於發送信標資訊至伺服器,該信標資訊包括該計量資料、該第一加密資料以及該識別標識中的設備編號,以使該伺服器基於該識別標識中的該設備唯一標識、該計量資料以及接收到該信標資訊時對應的第二時間戳產生第二加密資料,並在確定該第二加密資料與該第一加密資料的比較結果符合記錄要求時記錄該計量資料,其中,該第一時間戳與該第二時間戳在預設的時間視窗內,該伺服器預先儲存有各個計量設備的識別標識,且該識別標識中包括的該設備偏號與該設備唯一標識相互關聯。 A data reading device, the device comprises: a second generating module for acquiring metering data, and generating first encrypted data based on the metering data, a device unique identifier in an identification, and a first time stamp, the first time stamp Including the corresponding time when the metering device obtains the metering data; and a sending module for sending beacon information to the server, where the beacon information includes the metering data, the first encrypted data and the device number in the identification , so that the server generates second encrypted data based on the unique device identifier in the identification, the measurement data and the corresponding second timestamp when the beacon information is received, and determines the second encrypted data and the The measurement data is recorded when the comparison result of the first encrypted data meets the recording requirements, wherein the first time stamp and the second time stamp are within a preset time window, and the server pre-stores the identification of each measurement device, And the device partial number included in the identification identifier is associated with the unique identifier of the device. 如請求項8之裝置,該發送模組,包括:第一發送單元,用於將該信標資訊發送至終端設備,該終端設備將該信標資訊發送至伺服器。 According to the device of claim 8, the sending module includes: a first sending unit for sending the beacon information to the terminal device, and the terminal device sends the beacon information to the server. 如請求項9之裝置,該終端設備為行動終端,對應地,該將該信標資訊發送至終端設備,該終端設備將該信標資訊發送至伺服器包括:建立連接單元,用於該行動終端在計量設備預設距離範圍內和/或基於觸發行動終端上指定應用的匹配指令 時,建立該計量設備與該行動終端的通訊連接;第二發送單元,用於該計量設備將該信標資訊發送至該行動終端;以及第三發送單元,用於該行動終端在達到預設的發送要求時,將該信標資訊發送至伺服器。 According to the device of claim 9, the terminal device is a mobile terminal, correspondingly, the sending the beacon information to the terminal device, and the terminal device sending the beacon information to the server includes: establishing a connection unit for the action The terminal is within a preset distance of the metering device and/or based on matching instructions that trigger the specified application on the mobile terminal When the communication connection between the measuring device and the mobile terminal is established; the second sending unit is used for the measuring device to send the beacon information to the mobile terminal; and the third sending unit is used for the mobile terminal when the preset value is reached. , send the beacon information to the server. 一種伺服器,包括處理器以及用於儲存處理器可執行指令的記憶體,該處理器執行該指令時實現:接收信標資訊,該信標資訊包括計量資料、第一加密資料以及識別標識中的設備編號,該第一加密資料基於該計量資料、識別標識中的設備唯一標識以及第一時間戳產生,該第一時間戳包括計量設備獲取該計量資料時所對應的時間;基於該識別標識、該計量資料以及接收到該信標資訊時對應的第二時間戳產生第二加密資料,其中,該第一時間戳與該第二時間戳在預設的時間視窗內,預先儲存有各個計量設備的識別標識,該識別標識中包括的該設備偏號與該設備唯一標識相互關聯;以及比較該第二加密資料與該第一加密資料,在比較結果符合記錄要求時記錄該計量資料。 A server includes a processor and a memory for storing instructions executable by the processor. When the processor executes the instructions, the processor realizes: receiving beacon information, the beacon information including metering data, first encrypted data, and an identification tag. The device number, the first encrypted data is generated based on the measurement data, the unique device identifier in the identification, and the first time stamp, and the first time stamp includes the time corresponding to when the measurement device acquired the measurement data; based on the identification , the measurement data and the corresponding second time stamp when the beacon information is received to generate second encrypted data, wherein the first time stamp and the second time stamp are pre-stored with each measurement in a preset time window The identification of the device, the device partial number included in the identification is correlated with the unique identification of the device; and the second encrypted data is compared with the first encrypted data, and the measurement data is recorded when the comparison result meets the recording requirements. 一種計量設備,包括處理器以及用於儲存處理器可執行指令的記憶體,該處理器執行該指令時實現:獲取計量資料,基於該計量資料、識別標識中的設備 唯一標識以及第一時間戳產生第一加密資料,該第一時間戳包括計量設備獲取該計量資料時所對應的時間;以及發送信標資訊至伺服器,該信標資訊包括該計量資料、該第一加密資料以及該識別標識中的設備編號,以使該伺服器基於該識別標識中的該設備唯一標識、該計量資料以及接收到該信標資訊時對應的第二時間戳產生第二加密資料,並在確定該第二加密資料與該第一加密資料的比較結果符合記錄要求時記錄該計量資料,其中,該第一時間戳與該第二時間戳在預設的時間視窗內,該伺服器預先儲存有各個計量設備的識別標識,且該識別標識中包括的該設備偏號與該設備唯一標識相互關聯。 A metering device, comprising a processor and a memory for storing processor-executable instructions, when the processor executes the instructions, it realizes: acquiring metering data, and identifying the device in the identification based on the metering data The unique identifier and the first time stamp generate first encrypted data, and the first time stamp includes the time corresponding to the measurement device acquiring the measurement data; and send beacon information to the server, the beacon information includes the measurement data, the The first encrypted data and the device number in the identification, so that the server generates a second encryption based on the unique identification of the device in the identification, the metering data, and the second timestamp corresponding to when the beacon information is received data, and record the measurement data when it is determined that the comparison result between the second encrypted data and the first encrypted data meets the recording requirements, wherein the first time stamp and the second time stamp are within a preset time window, the The server pre-stores the identifications of each metering device, and the device partial number included in the identifications is associated with the unique identification of the device. 一種資料讀取系統,包括計量設備和伺服器,該計量設備獲取計量資料,基於該計量資料、識別標識中的設備唯一標識以及第一時間戳產生第一加密資料,發送信標資訊至伺服器,該第一時間戳包括計量設備獲取該計量資料時所對應的時間,該信標資訊包括該計量資料、該第一加密資料以及該識別標識中的設備編號;以及該伺服器接收該信標資訊,並基於該識別標識中的該設備唯一標識、該計量資料以及接收到該信標資訊時對應的第二時間戳產生第二加密資料,比較該第二加密資料與該第一加密資料,在比較結果符合記錄要求時記錄該計量資料,其中,該第一時間戳與該第二時間戳在預設的時間視窗內,該伺服器預先儲存有各個計量設備的識別標識, 且該識別標識中包括的該設備偏號與該設備唯一標識相互關聯。 A data reading system includes a metering device and a server, the metering device acquires metering data, generates first encrypted data based on the metering data, a device unique identifier in an identification identifier and a first timestamp, and sends beacon information to the server , the first time stamp includes the time corresponding to when the metering device obtains the metering data, the beacon information includes the metering data, the first encrypted data and the device number in the identification; and the server receives the beacon information, and generate second encrypted data based on the unique identification of the device in the identification, the measurement data and the corresponding second timestamp when the beacon information is received, and compare the second encrypted data with the first encrypted data, Record the measurement data when the comparison result meets the recording requirements, wherein the first time stamp and the second time stamp are within a preset time window, and the server pre-stores the identification of each measurement device, And the device partial number included in the identification identifier is associated with the unique identifier of the device. 一種資料讀取方法,該方法包括:獲取計量設備上的計量資料,基於該計量資料、識別標識中的設備唯一標識以及第一時間戳產生第一加密資料,該第一時間戳包括計量設備獲取該計量資料時所對應的時間;該計量設備發送信標資訊至伺服器,該信標資訊包括該計量資料、該第一加密資料以及該識別標識中的設備編號;該伺服器基於該識別標識中的該設備唯一標識、該計量資料以及接收到該信標資訊時對應的第二時間戳產生第二加密資料,其中,該第一時間戳與該第二時間戳在預設的時間視窗內,該伺服器預先儲存有各個計量設備的識別標識,且該識別標識中包括的該設備偏號與該設備唯一標識相互關聯;以及該伺服器比較該第二加密資料與該第一加密資料,在比較結果符合記錄要求時記錄該計量資料。 A method for reading data, the method comprising: acquiring measurement data on a metering device, and generating first encrypted data based on the metering data, a device unique identifier in an identification, and a first time stamp, the first time stamp comprising the measurement device acquiring The time corresponding to the measurement data; the measurement device sends beacon information to the server, the beacon information includes the measurement data, the first encrypted data and the device number in the identification; the server is based on the identification The unique identification of the device, the measurement data, and the second timestamp corresponding to the beacon information in the generated second encrypted data, wherein the first timestamp and the second timestamp are within a preset time window. , the server pre-stores the identification of each metering device, and the device partial number included in the identification is associated with the unique identification of the device; and the server compares the second encrypted data and the first encrypted data, Record the measurement data when the comparison results meet the recording requirements.
TW109115222A 2019-11-20 2020-05-07 Data reading method, device, measuring device and server TWI764146B (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201911139709.9 2019-11-20
CN201911139709.9A CN111131156A (en) 2019-11-20 2019-11-20 Data reading method and device, metering equipment and server

Publications (2)

Publication Number Publication Date
TW202121186A TW202121186A (en) 2021-06-01
TWI764146B true TWI764146B (en) 2022-05-11

Family

ID=70495936

Family Applications (1)

Application Number Title Priority Date Filing Date
TW109115222A TWI764146B (en) 2019-11-20 2020-05-07 Data reading method, device, measuring device and server

Country Status (3)

Country Link
CN (1) CN111131156A (en)
TW (1) TWI764146B (en)
WO (1) WO2021098272A1 (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111131156A (en) * 2019-11-20 2020-05-08 支付宝(杭州)信息技术有限公司 Data reading method and device, metering equipment and server
CN114257385A (en) * 2020-09-10 2022-03-29 西交利物浦大学 Secure communication method and device, electronic equipment and storage medium
CN114417416A (en) * 2022-01-24 2022-04-29 成都秦川物联网科技股份有限公司 Synchronous energy metering device embedded with information security module and Internet of things system
CN114422551B (en) * 2022-01-24 2023-06-20 成都秦川物联网科技股份有限公司 Centralized operation type energy metering device with built-in gateway and Internet of things system
CN117294535B (en) * 2023-11-24 2024-04-02 北京邮电大学 Method and system for verifying security of data packet explicit information expression instruction
CN117577283B (en) * 2024-01-16 2024-03-19 四川互慧软件有限公司 Internet-based door-to-door nursing management method

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102571984A (en) * 2012-02-23 2012-07-11 山东大学 Remote transmission and management system of thermal power measuring data
US20140258718A1 (en) * 2013-03-07 2014-09-11 Asymptote Security Llc Method and system for secure transmission of biometric data
CN105978972A (en) * 2016-05-13 2016-09-28 新智数字科技有限公司 Data processing method, device and system and related equipment
TWI571086B (en) * 2012-12-11 2017-02-11 財團法人資訊工業策進會 Advanced metering infrastructure network system and message broadcasting method
CN107231353A (en) * 2017-06-01 2017-10-03 成都信息工程大学 Batch authentication method based on binary tree in a kind of intelligent grid
CN107809434A (en) * 2017-11-08 2018-03-16 济南大陆机电股份有限公司 A kind of continuous data validation verification system and method

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1932865A (en) * 2006-10-10 2007-03-21 潘铁军 Payment method for precharging meter
CN100589385C (en) * 2007-08-28 2010-02-10 浙江大学 Measurement authentication method based on digital signature
CN101738516B (en) * 2008-11-25 2012-11-14 深圳市宝利达实业有限公司 Electronic electric energy meter and data secure transmission method thereof
CN102624740B (en) * 2012-03-30 2016-05-11 北京奇虎科技有限公司 A kind of data interactive method and client, server
CN103632526A (en) * 2013-12-17 2014-03-12 浙江正泰仪器仪表有限责任公司 Meter reading system of wireless intelligent meter
CN111131156A (en) * 2019-11-20 2020-05-08 支付宝(杭州)信息技术有限公司 Data reading method and device, metering equipment and server

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102571984A (en) * 2012-02-23 2012-07-11 山东大学 Remote transmission and management system of thermal power measuring data
TWI571086B (en) * 2012-12-11 2017-02-11 財團法人資訊工業策進會 Advanced metering infrastructure network system and message broadcasting method
US20140258718A1 (en) * 2013-03-07 2014-09-11 Asymptote Security Llc Method and system for secure transmission of biometric data
CN105978972A (en) * 2016-05-13 2016-09-28 新智数字科技有限公司 Data processing method, device and system and related equipment
CN107231353A (en) * 2017-06-01 2017-10-03 成都信息工程大学 Batch authentication method based on binary tree in a kind of intelligent grid
CN107809434A (en) * 2017-11-08 2018-03-16 济南大陆机电股份有限公司 A kind of continuous data validation verification system and method

Also Published As

Publication number Publication date
TW202121186A (en) 2021-06-01
WO2021098272A1 (en) 2021-05-27
CN111131156A (en) 2020-05-08

Similar Documents

Publication Publication Date Title
TWI764146B (en) Data reading method, device, measuring device and server
KR102579275B1 (en) Locating electronic devices and associated wireless accessories
US20230283471A1 (en) Data offload and time synchronization for ubiquitous visual computing witness
JP6577485B2 (en) Beacon message transmission
TWI692990B (en) Smart device binding method, device and system, communication system
US9762567B2 (en) Wireless communication of a user identifier and encrypted time-sensitive data
WO2019052532A1 (en) Information interaction method, apparatus and device for internet of things device
US20130259230A1 (en) Bluetooth Low Energy Privacy
US20220200789A1 (en) Sharing keys for a wireless accessory
JP6756009B2 (en) Data transmission
CN103235906A (en) Method and device for encrypting and decrypting application program
US11563730B2 (en) Method and electronic device for managing digital keys
WO2022174790A1 (en) Test frame generation
US20230180007A1 (en) Electronic device and method for electronic device to provide ranging-based service
CN103957580A (en) Rapid WIFI networking matching method and module for smart hardware
TW201937425A (en) Transaction processing method, server, client, and system
KR20240004874A (en) Pairing of groups of accessories
US20210400492A1 (en) Secure pairing and pairing lock for accessory devices
CN113452515B (en) Communication method, key configuration method and device
WO2022105739A1 (en) Terminal positioning method, terminal positioning system, storage medium and electronic device
US20220358830A1 (en) Separation Alerts for Notification While Traveling
CN117851516A (en) Data synchronization method, device, equipment and storage medium
CN114257385A (en) Secure communication method and device, electronic equipment and storage medium
TW201724808A (en) Network sharing method and system thereof a first user charging a second user with a sharing fee on a shared mobile network