WO2012164666A1 - Information collection system and external access device - Google Patents

Information collection system and external access device Download PDF

Info

Publication number
WO2012164666A1
WO2012164666A1 PCT/JP2011/062406 JP2011062406W WO2012164666A1 WO 2012164666 A1 WO2012164666 A1 WO 2012164666A1 JP 2011062406 W JP2011062406 W JP 2011062406W WO 2012164666 A1 WO2012164666 A1 WO 2012164666A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
access device
company
external access
power line
Prior art date
Application number
PCT/JP2011/062406
Other languages
French (fr)
Japanese (ja)
Inventor
本岡 茂哲
昌也 藤本
Original Assignee
株式会社メガチップス
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 株式会社メガチップス filed Critical 株式会社メガチップス
Priority to PCT/JP2011/062406 priority Critical patent/WO2012164666A1/en
Publication of WO2012164666A1 publication Critical patent/WO2012164666A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics

Definitions

  • the present invention relates to an information collection system using a power line communication network.
  • Collecting and analyzing the usage of each house, such as electricity, gas, and water, is beneficial for forecasting demand for these resources and ensuring a stable supply of resources. Alternatively, it is possible to contribute to environmental protection by adjusting and suppressing the usage of these resources.
  • Information on the amount of electricity, gas, water, etc. used can be analyzed to some extent through monthly meter reading work.
  • the work of the person in charge going around each house and checking the meter is very laborious and costly.
  • the acquired usage information is an aggregate value for each month, it is not possible to grasp the transition of the usage in real time, and it is impossible to perform demand prediction and adjustment of the usage in real time.
  • Patent Document 1 discloses a system that collects gas usage information using the Internet.
  • the information terminal installed in the house is authenticated by the first server that is the equipment of the information providing company, and accesses the second server that is the equipment of the gas company via the first server.
  • Patent Document 1 as described above, by constructing a mechanism for accessing each supplier company's server via the first server, the first server collectively performs an authentication process for accessing each supplier company's server. Can be executed. However, the information of each supplier company flows between the information terminal installed in each house and the first server, but the confidentiality of the information is not considered.
  • An information collection system of the present invention includes a power line communication network, an information collection terminal connected to the power line communication network, and an external access device connected to the power line communication network.
  • the information collection terminal is decoded by the external access device.
  • a transmission unit that transmits a communication packet including notification information encrypted by the first encryption method impossible and access information encrypted by the second encryption method that can be decrypted by the external access device, to the external access device;
  • the external access device includes a transfer unit that decrypts the access information included in the received communication packet and transfers the notification information encrypted by the first encryption method to the outside according to the decrypted access information.
  • the present invention also relates to an external access device connected to a power line communication network.
  • the external access device of the present invention includes: notification information encrypted by the first encryption method that cannot be decrypted by the external access device; and access information encrypted by the second encryption method that can be decrypted by the external access device.
  • a receiving unit that receives a communication packet from an information collection terminal connected to the power line communication network, and an access that decrypts the access information included in the received communication packet and decrypts the notification information encrypted by the first encryption method.
  • a transfer unit that transfers the information to the outside according to the information.
  • the external access device discards the decrypted access information after transferring the notification information to the outside.
  • the information collection terminal collects information measured by the measurement terminal, including information on the power consumption in the facility where the power line communication network is constructed.
  • various measurement information in the facility can be grasped in real time, including information on the power consumption in the facility. It is also possible to make use of the power consumption information for power demand prediction and usage adjustment planning from the viewpoint of environmental protection.
  • An object of the present invention is to provide a technique for maintaining the confidentiality of information in a system in which information held by various companies and collected information flow in the same communication network and are processed in a common device. It is.
  • 1 is an overall view of an information collection system including a power line communication network. It is a functional block diagram of a master terminal. It is a functional block diagram of a measurement terminal. It is a functional block diagram of an external access device. It is a block diagram of a communication packet. It is a figure which shows the production
  • FIG. 1 is a diagram showing an information collection system according to the present embodiment.
  • This information collection system includes a power line communication network 20 provided in the house 10, an Internet 50, an A company server 60A, a B company server 60B, and a C company server 60C connected to the Internet 50.
  • the company A server 60A, the company B server 60B, and the company C server 60C are collectively referred to as the server 60.
  • the power line communication network 20 is a network that performs power line communication (PLC: Power Line Communications) using the power line 21 provided in the house 10.
  • PLC Power Line Communications
  • a company A master terminal 31A, a company B master terminal 31B, and a company C master terminal 31C are connected to the power line 21.
  • the company A master terminal 31 ⁇ / b> A is a terminal installed by a power company that supplies power to the house 10.
  • the B company master terminal 31 ⁇ / b> B is a terminal installed by a gas company that supplies gas to the house 10.
  • the company C master terminal 31 ⁇ / b> C is a terminal installed by a water company that supplies water to the house 10.
  • the functions and configurations common to the A company master terminal 31A, the B company master terminal 31B, and the C company master terminal 31C will be collectively referred to as the master terminal 31.
  • the company A measuring terminal 32A, the company B measuring terminal 32B, and the company C measuring terminal 32C are connected to the power line 21.
  • the company A measurement terminal 32A is a terminal installed by the company A, and acquires information on the power consumption of home appliances in the house 10.
  • the B company measurement terminal 32B is a terminal installed by the B company, and acquires information such as the amount of gas used in the house 10.
  • the company C measurement terminal 32C is a terminal installed by the company C, and acquires information on the amount of water used in the house 10.
  • the functions and configurations common to the A company measuring terminal 32A, the B company measuring terminal 32B, and the C company measuring terminal 32C will be collectively referred to as the measuring terminal 32.
  • FIG. 1 two A company measuring terminals 32A and 32A in the house 10 are shown.
  • One company A measuring terminal 32A is connected to the television 41-1, and measures the power consumption of the television 41-1.
  • Another A company measuring terminal 32A is connected to the refrigerator 41-2 and measures the power consumption of the refrigerator 41-2.
  • two home appliances, the television 41-1 and the refrigerator 41-2, are illustrated, but in practice, the measurement terminal 32 is connected to all home appliances in the house 10 or all home appliances with high power consumption. By doing so, it becomes possible to grasp
  • the figure also shows two B company measuring terminals 32B and 32B in the house 10.
  • One company B measuring terminal 32B is connected to the gas leak sensor 41-3 and acquires output information of the gas leak sensor 41-3.
  • Another B company measuring terminal 32B is connected to the gas meter 41-4 and acquires information on the amount of gas used.
  • the figure shows one C company measuring terminal 32C in the house 10.
  • the company C measuring terminal 32C is connected to the water flow meter 41-5 and acquires information on the amount of water used.
  • the C company measurement terminal 32C may be connected to the water leak sensor.
  • the TV 41-1, the refrigerator 41-2, the gas leak sensor 41-3, the gas meter 41-4, and the water flow meter 41-5 are collectively referred to as the device 41.
  • an external access device 35 is connected to the power line 21.
  • the external access device 35 is connected to the Internet 50.
  • Each company's master terminals 31 A to 31 C can be connected to the Internet 50 via the external access device 35.
  • the external access device 35 is directly connected to the Internet 50. That is, although the external access device 35 has a built-in router function and is connected to the Internet via an optical cable, an ADSL line, a dedicated line, etc., other forms may be used. For example, a mode in which a modem is connected to the external access device 35 and connected to the Internet 50 via a telephone line may be employed. Alternatively, the external access device 35 may be connected to the Ethernet (registered trademark) provided in the house 10 and connected to the Internet 50 via a router connected to the Ethernet (registered trademark).
  • Ethernet registered trademark
  • the company A acquires information on the power consumption in the house 10 and aggregates the acquired information at the company A master terminal 31A.
  • the company A master terminal 31 ⁇ / b> A can notify the company A server 60 ⁇ / b> A of the total information via the external access device 35.
  • the company B acquires information on the amount of gas used in the house 10 and gas leakage information, and totals the acquired information at the company B master terminal 31B. Then, the B company master terminal 31B can notify the B company server 60B of the total information via the external access device 35.
  • the company C acquires information on the amount of water used in the house 10 and totals the acquired information at the company C master terminal 31C. Then, the C company master terminal 31C can notify the total information to the C company server 60C via the external access device 35.
  • FIG. 2 is a functional block diagram of the master terminal 31.
  • the master terminal 31 is a terminal having a power line carrier communication function.
  • the master terminal 31 includes a control unit 311 and a power line communication unit 312.
  • the control unit 311 includes a CPU, a memory, and the like, and performs overall control of the master terminal 31.
  • the control unit 311 executes processing for generating a communication packet 70 described later from information collected from the measurement terminal 32, processing for transmitting the communication packet 70 to the external access device 35, and the like.
  • the power line communication unit 312 is connected to the power line 21 and performs power line carrier communication.
  • the power line communication unit 312 communicates with the measurement terminal 32 and the external access device 35.
  • the power line communication unit 312 also supplies the power supplied from the power line 21 to the master terminal 31.
  • FIG. 3 is a functional block diagram of the measurement terminal 32.
  • the measurement terminal 32 has a power line carrier communication function and an information collection function for the device 41.
  • the measurement terminal 32 includes a control unit 321, a power line communication unit 322, and an information acquisition unit 323.
  • the control unit 321 includes a CPU, a memory, and the like, and performs overall control of the measurement terminal 32.
  • the control unit 321 executes processing for transmitting the information on the device 41 collected by the information acquisition unit 323 to the master terminal 31.
  • the power line communication unit 322 is connected to the power line 21 and performs power line carrier communication.
  • the power line communication unit 322 communicates with the master terminal 31 and the external access device 35.
  • the power line communication unit 322 also supplies power supplied from the power line 21 to the measurement terminal 32.
  • the information acquisition unit 323 is connected to the device 41 and acquires various information from the device 41.
  • the information acquisition unit 323 is also connected to the power line 21 via the power line communication unit 322, and can supply the power supplied from the power line 21 to the device 41.
  • the information acquisition unit 323 supplies power to the television 41-1 or the refrigerator 41-2, and the television 41-1 or the refrigerator 41-2. Measure power consumption. The information acquisition unit 323 notifies the control unit 321 of information on the measured power consumption.
  • the information acquisition unit 323 acquires the sensing information of the gas leak sensor 41-3.
  • the information acquisition unit 323 acquires information on the amount of gas used from the gas meter 41-4.
  • the information acquisition unit 323 notifies the control unit 321 of the acquired information.
  • the information acquisition unit 323 acquires water usage information.
  • the information acquisition unit 323 notifies the control unit 321 of the acquired information.
  • the measurement terminal 32 has a power line carrier communication function and a function of acquiring information of the device 41. Furthermore, the measurement terminal 32 has a function of supplying power to the device 41. However, when the device 41 is the gas leak sensor 41-3, the gas meter 41-4, and the water flow meter 41-5, the measurement terminal 32 may not have the power supply function.
  • the information acquisition unit 323 has been described as being connected to the device 41, the connection form between the information acquisition unit 323 and the device 41 can take various forms.
  • the information acquisition unit 323 and the device 41 are connected by a power line in order to supply power to the device 41 and measure the power consumption.
  • the information acquisition unit 323 has a wired or wireless communication function to acquire sensing information and measurement information of the devices 41-3, 41-4, and 41-5. It may be a form to do.
  • FIG. 4 is a functional block diagram of the external access device 35.
  • the external access device 35 includes a control unit 351, a power line communication unit 352, a unique key storage unit 353, an individual key storage unit 354, and an external communication unit 355.
  • the control unit 351 includes a CPU, a memory, and the like, and performs overall control of the external access device 35.
  • the control unit 351 executes processing for receiving the communication packet 70 from the master terminal 31, processing for decrypting the encrypted communication packet 70, processing for transferring external notification information to the server 60, and the like. Further, the control unit 351 executes processing for generating individual keys for each company, which will be described later.
  • the power line communication unit 352 is connected to the power line 21 and performs power line carrier communication.
  • the power line communication unit 352 communicates with the master terminal 31.
  • the power line communication unit 352 also supplies power supplied from the power line 21 to the external access device 35.
  • the external communication unit 355 has a function of connecting to the Internet 50.
  • the power line communication network 20 includes terminals 31 and 32 of different companies A, B, and C in a mixed manner.
  • the terminals 31 and 32 of these different companies use the power line 21 as a common communication medium.
  • the measurement terminal 32 of each company measures and acquires the information regarding the supply resource of each company.
  • the information measured and acquired by the measurement terminals 32 of each company is aggregated at the master terminal 31 of each company and notified to the server 60 of each company via the common external access device 35.
  • Each company's server 60 aggregates information such as the amount of power, gas, and water usage for each customer and manages them in a database. Thereby, each company can grasp
  • the master terminal 31 of the house 10 includes a monitor (not shown), and the usage status of power, gas, water, etc. can be displayed on the monitor.
  • the master terminal 31 has a function of calculating an electricity charge, a gas charge, a water charge, and the like from the usage amount of electric power, gas, water, etc., and displaying each charge in real time. Thereby, the user can grasp
  • FIG. By providing such a mechanism, each household can make a use plan from the viewpoint of resource saving and environmental protection.
  • FIG. 5 is a diagram showing a packet configuration of a communication packet 70 generated in the master terminal 31 and transmitted to the external access device 35.
  • the communication packet 70 includes a header 71, an external access information unit 72, and an external notification information unit 73.
  • the header 71 includes each company identification number. That is, the numbers for uniquely identifying the A company, the B company, and the C company are described. This information does not need to be kept confidential. For example, an identification number such as “1” is assigned to company A, “2” to company B, and “3” to company C.
  • the external access information section 72 includes information for connecting to the server 60.
  • the IP address and telephone number of the company A server 60A are described.
  • the external notification information section 73 describes information that is aggregated by the master terminal 31 and notified to the server 60. For example, if it is the communication packet 70 produced
  • the header 71 is not encrypted. Therefore, the external access device 35 can acquire each company identification number without decrypting the received communication packet 70.
  • the communication packets 70 of the respective companies flow through the common power line 21, but since the identification numbers of the respective companies are not particularly required to be confidential, information is not encrypted.
  • the external notification information unit 73 is encrypted by a proprietary encryption method of each company.
  • This encryption method an encryption method that can be independently selected by Company A, Company B, and Company C can be used. Of course, a private encryption method is used by others.
  • company A, company B, and company C encrypt the external notification information unit 73 using their own encryption keys KA, KB, and KC, respectively.
  • the external access device 35 cannot decrypt the external notification information unit 73 encrypted using the encryption key KX.
  • the individual key CX of each company is a private key to other companies. For this reason, the external access information of each company is not referred to by other companies. Thereby, the confidentiality of the access information to each company server 60 is ensured.
  • the individual key CX of each company can be decrypted in the external access device 35.
  • the external access device 35 can acquire the external access information and transfer the external notification information of each company to the server 60 of each company.
  • FIG. 6 and 7 are diagrams showing a process for generating the individual key CX.
  • the external access device unique key P is generated using the master key and the MAC address of the external access device 35 as input information.
  • AES Advanced Encryption Standard
  • AES Advanced Encryption Standard having a key length of 128 bits is used as an encryption method.
  • the master key is a key that is secretly managed by the manufacturer of the external access device 35.
  • a unique key P uniquely determined for each external access device is generated.
  • This unique key P is stored in the unique key storage unit 353 of the external access device 35. That is, the external access device unique key P is stored in the unique key storage unit 353 at the manufacturing stage of the external access device 35. Since the master key is secretly managed, this unique key P cannot be generated by an outsider.
  • each company individual key CX is generated using the unique key P and “each company identification number and time information” as input information.
  • AES having a key length of 128 bits is used as an encryption method.
  • the individual key CX is generated in the external access device 35 in response to a generation request from the master terminal 31.
  • the generated individual key CX is transferred to the master terminal 31 via the power line communication network 20.
  • the master terminal 31 stores the received individual key CX in the memory.
  • the external access device 35 stores the generated individual key CX in the individual key storage unit 354.
  • time information is further used as input information.
  • the time information is date information when the individual key CX is generated.
  • the individual key CX cannot be duplicated substantially.
  • the communication packet 70 of each company flows on the common power line 21 and the communication packet 70 of each company is processed in the common external access device 35, but each company cannot refer to the external access information of other companies. Further, since the external notification information is encrypted with the individual key CX together with the encryption key KX unique to each company, the confidentiality of the measurement and acquisition information of each company is strictly maintained.
  • home appliances such as the television 41-1 and the refrigerator 41-2 are used in the house 10. Electric power is supplied to these home appliances via the company A measuring terminal 32A, and the information acquisition unit 323 measures the power consumption.
  • the company A measuring terminals 32A and 32A transmit information on the measured power consumption to the company A master terminal 31A.
  • the company A master terminal 31A aggregates the power consumption in the house 10 based on the measurement information received from the company A measurement terminals 32A and 32A, and generates information to be reported to the company A server 60A.
  • the generated information is embedded in the communication packet 70 as the external notification information unit 73.
  • the external notification information unit 73 is encrypted with the encryption key KA unique to the company A.
  • the access information of the company A server 60A is embedded in the communication packet 70 as the external access information unit 72.
  • the external access information unit 72 and the external notification information unit 73 are encrypted with the individual key CA of the company A.
  • a communication packet 70 is transmitted to the external access device 35 as shown in FIG.
  • the external access device 35 refers to the header 71 to recognize that the communication packet 70 is the communication packet 70 of company A. Therefore, the external access device 35 decrypts the external access information unit 72 and the external notification information unit 73 using the individual key CA of company A, and acquires external access information.
  • the external access device 35 uses the acquired external access information to access the A company server 60A via the Internet 50 and transfers the external notification information section 73 to the A company server 60A.
  • the external notification information unit 73 is encrypted with the encryption key KA unique to the company A, so the confidentiality of the information is maintained.
  • the external access device 35 discards it without saving it in the memory. As a result, there is no room for the possibility of unauthorized use of external access information.
  • the information collection system of the present embodiment can reduce system construction costs by sharing a common power line communication network 20 among a plurality of different companies. Moreover, the network system constructed in the house 10 can be simplified.
  • the format of the communication packet 70 is made common as shown in FIG. 5, so that the communication process and protocol can be made common, and the information collection system Reduction of construction cost and high expandability can be maintained.
  • this information collection system may be used by a security company to collect security system information.
  • the measurement terminal 32 can communicate with various sensors, acquire sensing information, and transfer the information to a security company server. This eliminates the need for security companies to lay dedicated lines in each house. Since the power line 21 is stretched everywhere in the house 10, it is convenient for collecting information from sensors installed in various places in the house 10. Further, by making it possible to refer to the security information in the house 10 with a terminal such as a mobile phone via the Internet 50, it is possible to provide a more convenient system.

Abstract

The problem addressed by the present invention is to provide a technology for maintaining the confidentiality of information in a system in which information owned and collected by various companies flow through the same communication network. The master terminals (31A-31C) and measurement terminals (32A-32C) of companies A-C are connected to a power line communication network (20). The measurement terminal (32) of each company transmits information collected from an apparatus (41) to the master terminal (31) of each company. The master terminals (31) transmit communication packets containing the collected information to an external access device (35). Access information contained in the communication packets is encrypted with a separate key (CX) for each company, and external notification information is encrypted with a key (KX) unique to each company and then encrypted using the separate key (CX) for each company. An external access device (35) that has received a communication packet decrypts the access information using the key (CX), and forwards the external notification information encrypted with the key (KX) of each company in accordance with the access information.

Description

情報収集システムおよび外部アクセス装置Information collection system and external access device
 本発明は、電力線通信網を利用した情報収集システムに関する。 The present invention relates to an information collection system using a power line communication network.
 電力、ガス、水道などの家屋毎の使用量を収集、解析することは、それら資源の需要予測を行い、資源の安定供給を確保するために有益である。あるいはそれら資源の使用量の調整、抑制を行うことで環境保護に貢献することもできる。 Collecting and analyzing the usage of each house, such as electricity, gas, and water, is beneficial for forecasting demand for these resources and ensuring a stable supply of resources. Alternatively, it is possible to contribute to environmental protection by adjusting and suppressing the usage of these resources.
 電力、ガス、水道などの使用量については、毎月実施される検針作業により、ある程度の情報分析を行うことはできる。しかし、担当者が各家屋を回り、メータをチェックする作業は、非常に手間とコストの掛かる作業である。また、取得される使用量の情報は、1ヶ月ごとの集計値であるため、リアルタイムで使用量の推移を把握することはできず、リアルタイムで需要予測、使用量の調整を行うことはできない。 Information on the amount of electricity, gas, water, etc. used can be analyzed to some extent through monthly meter reading work. However, the work of the person in charge going around each house and checking the meter is very laborious and costly. Moreover, since the acquired usage information is an aggregate value for each month, it is not possible to grasp the transition of the usage in real time, and it is impossible to perform demand prediction and adjustment of the usage in real time.
特開2006-119807号公報JP 2006-119807 A
 上述したように、担当者が検針作業を行う形態はコストが掛かる上、情報のリアルタイム性が低い。そこで、通信ネットワークを利用した情報収集の形態が考えられる。 As described above, the form in which the person in charge performs the meter reading work is costly and the real time property of the information is low. Therefore, a form of information collection using a communication network can be considered.
 上記特許文献1では、インターネットを利用してガス使用量の情報を収集するシステムが開示されている。家屋に設置される情報端末は、情報提供会社の設備である第1のサーバにおいて認証され、第1のサーバを経由してガス会社の設備である第2のサーバにアクセスするようにしている。 Patent Document 1 discloses a system that collects gas usage information using the Internet. The information terminal installed in the house is authenticated by the first server that is the equipment of the information providing company, and accesses the second server that is the equipment of the gas company via the first server.
 通信ネットワークを利用して電気、ガス、水道などの使用量の情報を収集するシステムを、電力会社、ガス会社、水道会社ごとに準備するとすれば、コストの面でも、設備の面でも無駄が多い。それら全ての供給資源の情報収集システムを共通のシステムで実現できれば有益である。しかし、電気、ガス、水道を供給する会社は別の会社であり、それぞれが保有する情報、収集する情報は個人情報であり、高いセキュリティが要求される。したがって、異なる会社が保有する情報、収集する情報が同じ通信ネットワーク内を流れるシステムを構築するためには、情報の機密性を維持するための仕組みが必要である。 If a system that collects usage information for electricity, gas, water, etc. using a communication network is prepared for each electric power company, gas company, and water company, it is wasteful in terms of both cost and equipment. . It would be beneficial if the information gathering system for all these supply resources could be realized by a common system. However, companies that supply electricity, gas, and water are different companies, and the information they hold and the information they collect is personal information, and high security is required. Therefore, in order to construct a system in which information held by different companies and information to be collected flow in the same communication network, a mechanism for maintaining the confidentiality of the information is necessary.
 上記特許文献1では、上述したように第1のサーバを経由して各供給会社のサーバにアクセスする仕組みを構築することで、各供給会社のサーバへアクセスする認証プロセスを第1のサーバが一括して実行できる。しかし、各家屋に設置される情報端末と第1のサーバとの間では、各供給会社の情報が流れることになるが、それら情報の機密性に関しては考慮されていない。 In Patent Document 1, as described above, by constructing a mechanism for accessing each supplier company's server via the first server, the first server collectively performs an authentication process for accessing each supplier company's server. Can be executed. However, the information of each supplier company flows between the information terminal installed in each house and the first server, but the confidentiality of the information is not considered.
 本発明の情報収集システムは、電力線通信網と、電力線通信網に接続された情報収集端末と、電力線通信網に接続された外部アクセス装置と、を備え、情報収集端末は、外部アクセス装置によって復号不可能な第1暗号方式により暗号化された通知情報と、外部アクセス装置によって復号可能な第2暗号方式により暗号化されたアクセス情報と、を含む通信パケットを外部アクセス装置に送信する送信部、を含み、外部アクセス装置は、受信した通信パケットに含まれるアクセス情報を復号し、第1暗号方式で暗号化された通知情報を、復号したアクセス情報に従って外部へ転送する転送部、を含む。 An information collection system of the present invention includes a power line communication network, an information collection terminal connected to the power line communication network, and an external access device connected to the power line communication network. The information collection terminal is decoded by the external access device. A transmission unit that transmits a communication packet including notification information encrypted by the first encryption method impossible and access information encrypted by the second encryption method that can be decrypted by the external access device, to the external access device; The external access device includes a transfer unit that decrypts the access information included in the received communication packet and transfers the notification information encrypted by the first encryption method to the outside according to the decrypted access information.
 本発明は、また、電力線通信網に接続された外部アクセス装置に関する。本発明の外部アクセス装置は、外部アクセス装置によって復号不可能な第1暗号方式により暗号化された通知情報と、外部アクセス装置によって復号可能な第2暗号方式により暗号化されたアクセス情報と、を含む通信パケットを電力線通信網に接続された情報収集端末から受信する受信部と、受信した通信パケットに含まれるアクセス情報を復号し、第1暗号方式で暗号化された通知情報を、復号したアクセス情報に従って外部へ転送する転送部と、を備える。 The present invention also relates to an external access device connected to a power line communication network. The external access device of the present invention includes: notification information encrypted by the first encryption method that cannot be decrypted by the external access device; and access information encrypted by the second encryption method that can be decrypted by the external access device. A receiving unit that receives a communication packet from an information collection terminal connected to the power line communication network, and an access that decrypts the access information included in the received communication packet and decrypts the notification information encrypted by the first encryption method. And a transfer unit that transfers the information to the outside according to the information.
 複数の会社の情報収集端末から送信される情報の機密性を維持することが可能である。複数の会社が共通の通信網を利用し、共通の外部アクセス装置を利用する形態であっても、各社は、安心して情報収集システムを利用することができる。 It is possible to maintain the confidentiality of information transmitted from information collection terminals of multiple companies. Even if a plurality of companies use a common communication network and use a common external access device, each company can use the information collection system with peace of mind.
 本発明の好ましい実施例によれば、外部アクセス装置は、通知情報を外部へ転送した後、復号したアクセス情報を破棄する。 According to a preferred embodiment of the present invention, the external access device discards the decrypted access information after transferring the notification information to the outside.
 情報収集端末を設置する会社のアクセス情報の秘匿性も維持することが可能である。情報収集システム内の共通のハードウェア、ネットワーク内には、各社の機密情報が参照可能状態で保持されることはなく、各社は安心してシステムを利用可能である。 It is possible to maintain the confidentiality of the access information of the company where the information collection terminal is installed. In the common hardware and network in the information collection system, the confidential information of each company is not held in a referenceable state, and each company can use the system with confidence.
 本発明の好ましい実施例によれば、情報収集端末は、電力線通信網が構築されている施設内の消費電力量の情報を含め、計測端末が計測した情報を収集する。これにより、施設内の消費電力量の情報を含め、施設内の様々な計測情報をリアルタイムで把握可能である。消費電力量の情報から、電力需要予測や環境保護観点からの使用量調整計画に役立てることも可能である。 According to a preferred embodiment of the present invention, the information collection terminal collects information measured by the measurement terminal, including information on the power consumption in the facility where the power line communication network is constructed. Thereby, various measurement information in the facility can be grasped in real time, including information on the power consumption in the facility. It is also possible to make use of the power consumption information for power demand prediction and usage adjustment planning from the viewpoint of environmental protection.
 本発明の目的は、様々な会社が保有する情報、収集した情報が同じ通信ネットワーク内を流れ、共通の装置内で処理されるシステムにおいて、情報の機密性を維持するための技術を提供することである。 An object of the present invention is to provide a technique for maintaining the confidentiality of information in a system in which information held by various companies and collected information flow in the same communication network and are processed in a common device. It is.
 この発明の目的、特徴、局面および利点は、以下の詳細な説明と添付図面によって、明白となる。 The objects, features, aspects and advantages of the present invention will become apparent from the following detailed description and the accompanying drawings.
電力線通信ネットワークを含む情報収集システムの全体図である。1 is an overall view of an information collection system including a power line communication network. マスタ端末の機能ブロック図である。It is a functional block diagram of a master terminal. 計測端末の機能ブロック図である。It is a functional block diagram of a measurement terminal. 外部アクセス装置の機能ブロック図である。It is a functional block diagram of an external access device. 通信パケットの構成図である。It is a block diagram of a communication packet. 個別鍵の第1段階の生成プロセスを示す図である。It is a figure which shows the production | generation process of the 1st step of an individual key. 個別鍵の第2段階の生成プロセスを示す図である。It is a figure which shows the production | generation process of the 2nd step of an individual key. 情報収集プロセスの処理の流れを示す図である。It is a figure which shows the flow of a process of an information collection process.
 {1.電力線通信ネットワークの構成}
 以下、図面を参照しつつ本発明の実施の形態について説明する。図1は、本実施の形態に係る情報収集システムを示す図である。この情報収集システムは、家屋10内に設けられた電力線通信ネットワーク20と、インターネット50と、インターネット50に接続されたA社サーバ60A、B社サーバ60B、C社サーバ60Cなどを備えて構成される。なお、以下の説明において、A社サーバ60A、B社サーバ60B、C社サーバ60Cをサーバ60と総称することにする。
{1. Configuration of power line communication network}
Hereinafter, embodiments of the present invention will be described with reference to the drawings. FIG. 1 is a diagram showing an information collection system according to the present embodiment. This information collection system includes a power line communication network 20 provided in the house 10, an Internet 50, an A company server 60A, a B company server 60B, and a C company server 60C connected to the Internet 50. . In the following description, the company A server 60A, the company B server 60B, and the company C server 60C are collectively referred to as the server 60.
 電力線通信ネットワーク20は、家屋10に設けられている電力線21を利用して電力線搬送通信(PLC:Power Line Communications)を行うネットワークである。 The power line communication network 20 is a network that performs power line communication (PLC: Power Line Communications) using the power line 21 provided in the house 10.
 電力線21には、A社マスタ端末31A、B社マスタ端末31B、C社マスタ端末31Cが接続されている。A社マスタ端末31Aは、家屋10に電力を供給する電力会社により設置される端末である。B社マスタ端末31Bは、家屋10にガスを供給するガス会社により設置される端末である。C社マスタ端末31Cは、家屋10に水道を供給する水道会社により設置される端末である。 A company A master terminal 31A, a company B master terminal 31B, and a company C master terminal 31C are connected to the power line 21. The company A master terminal 31 </ b> A is a terminal installed by a power company that supplies power to the house 10. The B company master terminal 31 </ b> B is a terminal installed by a gas company that supplies gas to the house 10. The company C master terminal 31 </ b> C is a terminal installed by a water company that supplies water to the house 10.
 以下の説明において、A社マスタ端末31A、B社マスタ端末31B、C社マスタ端末31Cに共通の機能、構成を説明する場合には、マスタ端末31と総称することにする。 In the following description, the functions and configurations common to the A company master terminal 31A, the B company master terminal 31B, and the C company master terminal 31C will be collectively referred to as the master terminal 31.
 また、電力線21には、A社計測端末32A、B社計測端末32B、C社計測端末32Cが接続されている。A社計測端末32Aは、A社により設置される端末であり、家屋10内の家電の消費電力量の情報を取得する。B社計測端末32Bは、B社により設置される端末であり、家屋10内のガス使用量等の情報を取得する。C社計測端末32Cは、C社により設置される端末であり、家屋10内の水道使用量の情報を取得する。 The company A measuring terminal 32A, the company B measuring terminal 32B, and the company C measuring terminal 32C are connected to the power line 21. The company A measurement terminal 32A is a terminal installed by the company A, and acquires information on the power consumption of home appliances in the house 10. The B company measurement terminal 32B is a terminal installed by the B company, and acquires information such as the amount of gas used in the house 10. The company C measurement terminal 32C is a terminal installed by the company C, and acquires information on the amount of water used in the house 10.
 以下の説明において、A社計測端末32A、B社計測端末32B、C社計測端末32Cに共通の機能、構成を説明する場合には、計測端末32と総称することにする。 In the following description, the functions and configurations common to the A company measuring terminal 32A, the B company measuring terminal 32B, and the C company measuring terminal 32C will be collectively referred to as the measuring terminal 32.
 図に、家屋10内の2台のA社計測端末32A、32Aを示している。1台のA社計測端末32Aは、テレビ41-1に接続され、テレビ41-1の消費電力量を計測する。別の1台のA社計測端末32Aは、冷蔵庫41-2に接続され、冷蔵庫41-2の消費電力量を計測する。ここでは、テレビ41-1と冷蔵庫41-2の2台の家電を例示しているが、実際には、家屋10内の全ての家電あるいは消費電力量の多い全ての家電に計測端末32を接続することで、家屋10内の全体の消費電力量を把握することが可能となる。 In the figure, two A company measuring terminals 32A and 32A in the house 10 are shown. One company A measuring terminal 32A is connected to the television 41-1, and measures the power consumption of the television 41-1. Another A company measuring terminal 32A is connected to the refrigerator 41-2 and measures the power consumption of the refrigerator 41-2. Here, two home appliances, the television 41-1 and the refrigerator 41-2, are illustrated, but in practice, the measurement terminal 32 is connected to all home appliances in the house 10 or all home appliances with high power consumption. By doing so, it becomes possible to grasp | ascertain the total power consumption in the house 10. FIG.
 また、図に、家屋10内の2台のB社計測端末32B、32Bを示している。1台のB社計測端末32Bは、ガス漏れセンサ41-3に接続され、ガス漏れセンサ41-3の出力情報を取得する。別の1台のB社計測端末32Bは、ガスメータ41-4に接続され、ガス使用量の情報を取得する。 The figure also shows two B company measuring terminals 32B and 32B in the house 10. One company B measuring terminal 32B is connected to the gas leak sensor 41-3 and acquires output information of the gas leak sensor 41-3. Another B company measuring terminal 32B is connected to the gas meter 41-4 and acquires information on the amount of gas used.
 さらに、図に、家屋10内の1台のC社計測端末32Cを示している。C社計測端末32Cは、水道の流量メータ41-5に接続され、水道使用量の情報を取得する。他にも、水漏れセンサにC社計測端末32Cを接続するなどしてもよい。 Furthermore, the figure shows one C company measuring terminal 32C in the house 10. The company C measuring terminal 32C is connected to the water flow meter 41-5 and acquires information on the amount of water used. In addition, the C company measurement terminal 32C may be connected to the water leak sensor.
 以下の説明において、テレビ41-1、冷蔵庫41-2、ガス漏れセンサ41-3、ガスメータ41-4、水道流量メータ41-5を機器41と総称することにする。 In the following description, the TV 41-1, the refrigerator 41-2, the gas leak sensor 41-3, the gas meter 41-4, and the water flow meter 41-5 are collectively referred to as the device 41.
 また、電力線21には、外部アクセス装置35が接続されている。外部アクセス装置35は、インターネット50に接続されている。各社のマスタ端末31A~31Cは、外部アクセス装置35を経由してインターネット50に接続可能としている。 Further, an external access device 35 is connected to the power line 21. The external access device 35 is connected to the Internet 50. Each company's master terminals 31 A to 31 C can be connected to the Internet 50 via the external access device 35.
 なお、この実施の形態においては、外部アクセス装置35がインターネット50に直接接続されている場合を示している。つまり、外部アクセス装置35がルータ機能を内蔵し、光ケーブル、ADSL回線、専用線などを介してインターネットに接続される形態を示したが、他の形態であってもよい。たとえば、外部アクセス装置35にモデムが接続され、電話回線を経由してインターネット50に接続される形態であってもよい。あるいは、外部アクセス装置35が家屋10内に設けられたイーサネット(登録商標)に接続され、イーサネット(登録商標)に接続されたルータを介してインターネット50に接続する形態であってもよい。 In this embodiment, the external access device 35 is directly connected to the Internet 50. That is, although the external access device 35 has a built-in router function and is connected to the Internet via an optical cable, an ADSL line, a dedicated line, etc., other forms may be used. For example, a mode in which a modem is connected to the external access device 35 and connected to the Internet 50 via a telephone line may be employed. Alternatively, the external access device 35 may be connected to the Ethernet (registered trademark) provided in the house 10 and connected to the Internet 50 via a router connected to the Ethernet (registered trademark).
 以上のように構成された電力線通信ネットワーク20を利用することで、A社は、家屋10内の消費電力量の情報を取得し、取得した情報をA社マスタ端末31Aで集計する。そして、A社マスタ端末31Aは、外部アクセス装置35を経由してA社サーバ60Aに集計情報を通知することができる。B社は、家屋10内のガス使用量の情報やガス漏れ情報を取得し、取得した情報をB社マスタ端末31Bで集計する。そして、B社マスタ端末31Bは、外部アクセス装置35を経由してB社サーバ60Bに集計情報を通知することができる。C社は、家屋10内の水道使用量の情報を取得し、取得した情報をC社マスタ端末31Cで集計する。そして、C社マスタ端末31Cは、外部アクセス装置35を経由してC社サーバ60Cに集計情報を通知することができる。 By using the power line communication network 20 configured as described above, the company A acquires information on the power consumption in the house 10 and aggregates the acquired information at the company A master terminal 31A. The company A master terminal 31 </ b> A can notify the company A server 60 </ b> A of the total information via the external access device 35. The company B acquires information on the amount of gas used in the house 10 and gas leakage information, and totals the acquired information at the company B master terminal 31B. Then, the B company master terminal 31B can notify the B company server 60B of the total information via the external access device 35. The company C acquires information on the amount of water used in the house 10 and totals the acquired information at the company C master terminal 31C. Then, the C company master terminal 31C can notify the total information to the C company server 60C via the external access device 35.
 図2は、マスタ端末31の機能ブロック図である。マスタ端末31は、電力線搬送通信機能を備えた端末である。マスタ端末31は、制御部311、電力線通信部312を備えている。 FIG. 2 is a functional block diagram of the master terminal 31. The master terminal 31 is a terminal having a power line carrier communication function. The master terminal 31 includes a control unit 311 and a power line communication unit 312.
 制御部311は、CPU、メモリ等を備えマスタ端末31の全体制御を行う。制御部311は、計測端末32から収集した情報から後で説明する通信パケット70を生成する処理、通信パケット70を外部アクセス装置35に送信する処理などを実行する。電力線通信部312は、電力線21に接続されており、電力線搬送通信を行う。電力線通信部312は、計測端末32や外部アクセス装置35と通信を行う。電力線通信部312は、また、電力線21から与えられる電力をマスタ端末31に供給する。 The control unit 311 includes a CPU, a memory, and the like, and performs overall control of the master terminal 31. The control unit 311 executes processing for generating a communication packet 70 described later from information collected from the measurement terminal 32, processing for transmitting the communication packet 70 to the external access device 35, and the like. The power line communication unit 312 is connected to the power line 21 and performs power line carrier communication. The power line communication unit 312 communicates with the measurement terminal 32 and the external access device 35. The power line communication unit 312 also supplies the power supplied from the power line 21 to the master terminal 31.
 図3は、計測端末32の機能ブロック図である。計測端末32は、電力線搬送通信機能と機器41の情報収集機能を備えている。計測端末32は、制御部321、電力線通信部322、情報取得部323を備えている。 FIG. 3 is a functional block diagram of the measurement terminal 32. The measurement terminal 32 has a power line carrier communication function and an information collection function for the device 41. The measurement terminal 32 includes a control unit 321, a power line communication unit 322, and an information acquisition unit 323.
 制御部321は、CPU、メモリ等を備え計測端末32の全体制御を行う。制御部321は、情報取得部323が収集した機器41の情報をマスタ端末31に送信する処理などを実行する。電力線通信部322は、電力線21に接続されており、電力線搬送通信を行う。電力線通信部322は、マスタ端末31や外部アクセス装置35と通信を行う。電力線通信部322は、また、電力線21から与えられる電力を計測端末32に供給する。 The control unit 321 includes a CPU, a memory, and the like, and performs overall control of the measurement terminal 32. The control unit 321 executes processing for transmitting the information on the device 41 collected by the information acquisition unit 323 to the master terminal 31. The power line communication unit 322 is connected to the power line 21 and performs power line carrier communication. The power line communication unit 322 communicates with the master terminal 31 and the external access device 35. The power line communication unit 322 also supplies power supplied from the power line 21 to the measurement terminal 32.
 情報取得部323は機器41に接続され、機器41から様々な情報を取得する。情報取得部323は、また、電力線通信部322を介して電力線21に接続されており、電力線21から与えられる電力を機器41に供給することができる。 The information acquisition unit 323 is connected to the device 41 and acquires various information from the device 41. The information acquisition unit 323 is also connected to the power line 21 via the power line communication unit 322, and can supply the power supplied from the power line 21 to the device 41.
 機器41が、テレビ41-1、冷蔵庫41-2である場合には、情報取得部323は、テレビ41-1、冷蔵庫41-2に電力を供給するとともに、テレビ41-1、冷蔵庫41-2の消費電力量を計測する。情報取得部323は、計測した消費電力量の情報を制御部321に通知する。 When the device 41 is the television 41-1 or the refrigerator 41-2, the information acquisition unit 323 supplies power to the television 41-1 or the refrigerator 41-2, and the television 41-1 or the refrigerator 41-2. Measure power consumption. The information acquisition unit 323 notifies the control unit 321 of information on the measured power consumption.
 機器41が、ガス漏れセンサ41-3である場合には、情報取得部323は、ガス漏れセンサ41-3のセンシング情報を取得する。機器41が、ガスメータ41-4である場合には、情報取得部323は、ガスメータ41-4からガス使用量の情報を取得する。情報取得部323は、センシング情報やガス使用量の情報を取得すると、取得した情報を制御部321に通知する。 When the device 41 is the gas leak sensor 41-3, the information acquisition unit 323 acquires the sensing information of the gas leak sensor 41-3. When the device 41 is the gas meter 41-4, the information acquisition unit 323 acquires information on the amount of gas used from the gas meter 41-4. When the information acquisition unit 323 acquires sensing information and gas usage information, the information acquisition unit 323 notifies the control unit 321 of the acquired information.
 機器41が、水道の流量メータ41-5である場合には、情報取得部323は、水道使用量の情報を取得する。情報取得部323は、水道使用量の情報を取得すると、取得した情報を制御部321に通知する。 When the device 41 is a water flow meter 41-5, the information acquisition unit 323 acquires water usage information. When the information acquisition unit 323 acquires the water usage information, the information acquisition unit 323 notifies the control unit 321 of the acquired information.
 このように、計測端末32は、電力線搬送通信機能を備えるとともに、機器41の情報を取得する機能を備える。さらには、計測端末32は、機器41に電力を供給する機能を備える。ただし、機器41が、ガス漏れセンサ41-3、ガスメータ41-4、水道流量メータ41-5である場合には、計測端末32は、電力供給機能を備えていなくてもよい。 As described above, the measurement terminal 32 has a power line carrier communication function and a function of acquiring information of the device 41. Furthermore, the measurement terminal 32 has a function of supplying power to the device 41. However, when the device 41 is the gas leak sensor 41-3, the gas meter 41-4, and the water flow meter 41-5, the measurement terminal 32 may not have the power supply function.
 また、情報取得部323は、機器41に接続されていると説明したが、情報取得部323と機器41との接続形態は様々な形態をとることが可能である。たとえば、A社計測端末32Aについては、機器41に電力を供給し、消費電力量を計測するため、情報取得部323と機器41とは電力線で接続される。B社計測端末32B、C社計測端末32Cについては、情報取得部323は有線あるいは無線の通信機能を備えることにより、機器41-3、41-4、41-5のセンシング情報や計測情報を取得する形態であってもよい。 In addition, although the information acquisition unit 323 has been described as being connected to the device 41, the connection form between the information acquisition unit 323 and the device 41 can take various forms. For example, for the company A measuring terminal 32A, the information acquisition unit 323 and the device 41 are connected by a power line in order to supply power to the device 41 and measure the power consumption. For the B company measurement terminal 32B and the C company measurement terminal 32C, the information acquisition unit 323 has a wired or wireless communication function to acquire sensing information and measurement information of the devices 41-3, 41-4, and 41-5. It may be a form to do.
 図4は、外部アクセス装置35の機能ブロック図である。外部アクセス装置35は、制御部351、電力線通信部352、固有鍵保存部353、個別鍵保存部354、外部通信部355を備えている。 FIG. 4 is a functional block diagram of the external access device 35. The external access device 35 includes a control unit 351, a power line communication unit 352, a unique key storage unit 353, an individual key storage unit 354, and an external communication unit 355.
 制御部351は、CPU、メモリ等を備え外部アクセス装置35の全体制御を行う。制御部351は、マスタ端末31から通信パケット70を受信する処理、暗号化された通信パケット70を復号する処理、外部通知情報をサーバ60に転送する処理などを実行する。また、制御部351は、後で説明する各社ごとの個別鍵を生成する処理などを実行する。電力線通信部352は、電力線21に接続されており、電力線搬送通信を行う。電力線通信部352は、マスタ端末31と通信を行う。電力線通信部352は、また、電力線21から与えられる電力を外部アクセス装置35に供給する。外部通信部355は、インターネット50への接続機能を備えている。 The control unit 351 includes a CPU, a memory, and the like, and performs overall control of the external access device 35. The control unit 351 executes processing for receiving the communication packet 70 from the master terminal 31, processing for decrypting the encrypted communication packet 70, processing for transferring external notification information to the server 60, and the like. Further, the control unit 351 executes processing for generating individual keys for each company, which will be described later. The power line communication unit 352 is connected to the power line 21 and performs power line carrier communication. The power line communication unit 352 communicates with the master terminal 31. The power line communication unit 352 also supplies power supplied from the power line 21 to the external access device 35. The external communication unit 355 has a function of connecting to the Internet 50.
 {2.情報収集システムの利用形態}
 上述したように、電力線通信ネットワーク20は、異なる会社A社、B社、C社の端末31、32が混在して配置されている。これら異なる会社の端末31、32は、共通の通信媒体として電力線21を利用している。そして、各社の計測端末32は、各社の供給資源に関する情報を計測、取得する。さらに、各社の計測端末32が計測、取得した情報は、各社のマスタ端末31で集計され、共通の外部アクセス装置35を介して、各社のサーバ60に通知される。
{2. Usage form of information collection system}
As described above, the power line communication network 20 includes terminals 31 and 32 of different companies A, B, and C in a mixed manner. The terminals 31 and 32 of these different companies use the power line 21 as a common communication medium. And the measurement terminal 32 of each company measures and acquires the information regarding the supply resource of each company. Furthermore, the information measured and acquired by the measurement terminals 32 of each company is aggregated at the master terminal 31 of each company and notified to the server 60 of each company via the common external access device 35.
 各社のサーバ60は、それぞれ電力、ガス、水道に関する使用量などの情報を顧客ごとに集計してデータベースで管理している。これにより、各社は、リアルタイムで電力、ガス、水道の使用量を把握することができる。この情報を利用して、需要予測を行うことや、使用量の抑制対策などに役立てることもできる。また、各社は、取得した情報に基づいて料金請求などの処理を行うこともできる。 Each company's server 60 aggregates information such as the amount of power, gas, and water usage for each customer and manages them in a database. Thereby, each company can grasp | ascertain the usage-amount of electric power, gas, and water supply in real time. By using this information, it is possible to make a demand prediction or to take measures for suppressing usage. Each company can also perform processing such as billing based on the acquired information.
 また、家屋10のマスタ端末31はモニタ(不図示)を備えており、モニタに電力、ガス、水道などの使用状況を表示させることができる。また、マスタ端末31は、電力、ガス、水道などの使用量から電気料金、ガス料金、水道料金などを計算し、各料金をリアルタイムで表示する機能を備える。これにより、利用者は、マスタ端末31のモニタを参照することで、電力、ガス、水道の使用状況を把握したり、料金を把握したりすることができる。このような仕組みを提供することで、各家庭において、資源の節約、環境保護観点からの使用計画を立てることができる。 In addition, the master terminal 31 of the house 10 includes a monitor (not shown), and the usage status of power, gas, water, etc. can be displayed on the monitor. In addition, the master terminal 31 has a function of calculating an electricity charge, a gas charge, a water charge, and the like from the usage amount of electric power, gas, water, etc., and displaying each charge in real time. Thereby, the user can grasp | ascertain the usage condition of electric power, gas, and water, or a charge by referring the monitor of the master terminal 31. FIG. By providing such a mechanism, each household can make a use plan from the viewpoint of resource saving and environmental protection.
 {3.通信パケットの構成}
 次に、マスタ端末31と外部アクセス装置35との間で受け渡される通信パケット70の構成について説明する。図5は、マスタ端末31において生成され、外部アクセス装置35に対して送信される通信パケット70のパケット構成を示す図である。通信パケット70は、ヘッダ71、外部アクセス情報部72、外部通知情報部73から構成される。
{3. Configuration of communication packet}
Next, the configuration of the communication packet 70 transferred between the master terminal 31 and the external access device 35 will be described. FIG. 5 is a diagram showing a packet configuration of a communication packet 70 generated in the master terminal 31 and transmitted to the external access device 35. The communication packet 70 includes a header 71, an external access information unit 72, and an external notification information unit 73.
 ヘッダ71には、各社識別番号が含まれている。つまり、A社、B社、C社を一意に識別するための番号が記述されている。この情報は特に機密性を維持する必要はない。たとえば、A社に“1”、B社に“2”、C社に“3”などの識別番号が付与される。 The header 71 includes each company identification number. That is, the numbers for uniquely identifying the A company, the B company, and the C company are described. This information does not need to be kept confidential. For example, an identification number such as “1” is assigned to company A, “2” to company B, and “3” to company C.
 外部アクセス情報部72には、サーバ60に接続するための情報が含まれている。たとえば、A社マスタ端末31Aが生成した通信パケット70であればA社サーバ60AのIPアドレスや電話番号などが記述されている。 The external access information section 72 includes information for connecting to the server 60. For example, in the case of the communication packet 70 generated by the company A master terminal 31A, the IP address and telephone number of the company A server 60A are described.
 外部通知情報部73は、マスタ端末31で集計され、サーバ60に通知される情報が記述される。たとえば、A社マスタ端末31Aで生成された通信パケット70であれば、家屋10内の消費電力量の情報が含まれる。B社マスタ端末31Bで生成された通信パケット70であれば、家屋10内のガス使用量の情報やガス漏れセンシング情報などが含まれる。C社マスタ端末31Cで生成された通信パケット70であれば、家屋10内の水道使用量の情報が含まれる。 The external notification information section 73 describes information that is aggregated by the master terminal 31 and notified to the server 60. For example, if it is the communication packet 70 produced | generated by A company master terminal 31A, the information of the power consumption in the house 10 will be included. If the communication packet 70 is generated by the company B master terminal 31B, information on the amount of gas used in the house 10, gas leak sensing information, and the like are included. If the communication packet 70 is generated by the company C master terminal 31C, information on the amount of water used in the house 10 is included.
 ヘッダ71には暗号は施されない。したがって、外部アクセス装置35は受信した通信パケット70を復号することなく、各社識別番号を取得することができる。各社の通信パケット70は、共通の電力線21を流れることになるが、各社識別番号は特に情報の機密性を要求されないので、暗号化は行われない。 The header 71 is not encrypted. Therefore, the external access device 35 can acquire each company identification number without decrypting the received communication packet 70. The communication packets 70 of the respective companies flow through the common power line 21, but since the identification numbers of the respective companies are not particularly required to be confidential, information is not encrypted.
 外部通知情報部73は、各社の独自暗号方式で暗号化されている。この暗号方式は、A社、B社、C社が独自で選択することのできる暗号方式を利用することができ、もちろん、他者には非公開の暗号方式が利用される。ここでは、A社、B社、C社は、それぞれ独自の暗号鍵KA、KB、KCを利用して外部通知情報部73を暗号化するものとする。図5では、暗号鍵KA、KB、KCを暗号鍵KX(X=A、B、C)として示している。外部アクセス装置35も、暗号鍵KXを用いて暗号化された外部通知情報部73を復号することはできない。 The external notification information unit 73 is encrypted by a proprietary encryption method of each company. As this encryption method, an encryption method that can be independently selected by Company A, Company B, and Company C can be used. Of course, a private encryption method is used by others. Here, company A, company B, and company C encrypt the external notification information unit 73 using their own encryption keys KA, KB, and KC, respectively. In FIG. 5, the encryption keys KA, KB, and KC are shown as encryption keys KX (X = A, B, and C). The external access device 35 cannot decrypt the external notification information unit 73 encrypted using the encryption key KX.
 暗号鍵KXで暗号化された外部通知情報部73は、さらに外部アクセス情報部72とともに、各社の個別鍵CX(X=A、B、C)で暗号化される。つまり、A社、B社、C社は、それぞれ外部アクセス情報部72と外部通知情報部73とを個別鍵CA、CB、CCで暗号化する。 The external notification information unit 73 encrypted with the encryption key KX is further encrypted with the individual key CX (X = A, B, C) of each company together with the external access information unit 72. That is, Company A, Company B, and Company C encrypt the external access information unit 72 and the external notification information unit 73 with the individual keys CA, CB, and CC, respectively.
 各社の個別鍵CXは、他社には非公開の鍵である。このため、各社の外部アクセス情報は、他社に参照されることはない。これにより、各社サーバ60へのアクセス情報の機密性が確保される。 The individual key CX of each company is a private key to other companies. For this reason, the external access information of each company is not referred to by other companies. Thereby, the confidentiality of the access information to each company server 60 is ensured.
 各社の個別鍵CXは、外部アクセス装置35においては復号可能である。これにより、外部アクセス装置35は、外部アクセス情報を取得して、各社の外部通知情報を各社のサーバ60に転送することができる。 The individual key CX of each company can be decrypted in the external access device 35. Thereby, the external access device 35 can acquire the external access information and transfer the external notification information of each company to the server 60 of each company.
 図6、図7は、個別鍵CXの生成プロセスを示す図である。図6に示すように、まず、マスターキーと外部アクセス装置35のMACアドレスを入力情報として、外部アクセス装置固有鍵Pが生成される。この例では、暗号方式として鍵長128ビットのAES(Advanced Encryption Standard)を利用している。 6 and 7 are diagrams showing a process for generating the individual key CX. As shown in FIG. 6, first, the external access device unique key P is generated using the master key and the MAC address of the external access device 35 as input information. In this example, AES (Advanced Encryption Standard) having a key length of 128 bits is used as an encryption method.
 マスターキーは外部アクセス装置35の製造会社によって秘密管理される鍵である。このマスターキーと外部アクセス装置35のMACアドレスを入力情報とすることで、外部アクセス装置ごとに一意に決定される固有鍵Pが生成される。この固有鍵Pは、外部アクセス装置35の固有鍵保存部353に格納される。つまり、外部アクセス装置35の製造段階で、固有鍵保存部353に外部アクセス装置固有鍵Pが格納される。マスターキーが秘密管理されることにより、この固有鍵Pは、外部の者には生成不可能となっている。 The master key is a key that is secretly managed by the manufacturer of the external access device 35. By using the master key and the MAC address of the external access device 35 as input information, a unique key P uniquely determined for each external access device is generated. This unique key P is stored in the unique key storage unit 353 of the external access device 35. That is, the external access device unique key P is stored in the unique key storage unit 353 at the manufacturing stage of the external access device 35. Since the master key is secretly managed, this unique key P cannot be generated by an outsider.
 次に、図7に示すように、固有鍵Pと“各社識別番号および時刻情報”を入力情報として各社個別鍵CXが生成される。この例では、暗号方式として鍵長128ビットのAESを利用している。 Next, as shown in FIG. 7, each company individual key CX is generated using the unique key P and “each company identification number and time information” as input information. In this example, AES having a key length of 128 bits is used as an encryption method.
 個別鍵CXは、マスタ端末31からの生成要求を受けて外部アクセス装置35において生成される。生成された個別鍵CXは、電力線通信ネットワーク20を介してマスタ端末31に転送される。マスタ端末31は、受信した個別鍵CXをメモリに格納する。また、外部アクセス装置35は、生成した個別鍵CXを個別鍵保存部354に格納する。 The individual key CX is generated in the external access device 35 in response to a generation request from the master terminal 31. The generated individual key CX is transferred to the master terminal 31 via the power line communication network 20. The master terminal 31 stores the received individual key CX in the memory. In addition, the external access device 35 stores the generated individual key CX in the individual key storage unit 354.
 固有鍵Pと各社識別番号を入力情報とすることで、各社に一意で決定される固有鍵を生成することができる。しかし、本実施の形態においては、さらに時刻情報を入力情報としている。時刻情報は、個別鍵CXを生成するときの年月日の情報である。外部アクセス装置35は、マスタ装置31から個別鍵CXの生成要求を受信すると、この要求を受けた日時情報を用いて個別鍵CXを生成するのである。 By using the unique key P and each company identification number as input information, a unique key uniquely determined for each company can be generated. However, in the present embodiment, time information is further used as input information. The time information is date information when the individual key CX is generated. When the external access device 35 receives the request for generating the individual key CX from the master device 31, the external access device 35 generates the individual key CX using the date and time information received.
 これにより、たとえ同じ会社について生成される個別鍵CXであっても生成日時によって異なる個別鍵CXが生成されることになる。つまり、1つの個別鍵CXが生成されるのは1回だけに限定することができる。これにより、例えある会社が他社の識別番号を利用して個別鍵の生成要求を行った場合であっても、他社の個別鍵CXと同じ鍵を取得することは実質的に不可能となっている。 Thus, even if individual keys CX generated for the same company, different individual keys CX are generated depending on the generation date and time. That is, one individual key CX can be generated only once. As a result, even if a company makes a request for generating an individual key using another company's identification number, it is virtually impossible to obtain the same key as the other company's individual key CX. Yes.
 個別鍵CXの生成プロセスを以上のような仕組みとすることで、個別鍵CXの複製が実質的に不可能となる。共通の電力線21に各社の通信パケット70が流れ、共通の外部アクセス装置35において各社の通信パケット70が処理されることになるが、各社は他社の外部アクセス情報を参照することはできない。また、外部通知情報は、各社独自の暗号鍵KXと合わせて個別鍵CXで暗号化されるので、各社の計測、取得情報の機密性が厳重に維持されることになる。 By making the process for generating the individual key CX as described above, the individual key CX cannot be duplicated substantially. The communication packet 70 of each company flows on the common power line 21 and the communication packet 70 of each company is processed in the common external access device 35, but each company cannot refer to the external access information of other companies. Further, since the external notification information is encrypted with the individual key CX together with the encryption key KX unique to each company, the confidentiality of the measurement and acquisition information of each company is strictly maintained.
 {4.通信処理の流れ}
 以上のように構成された情報収集システムにおいて、上記構成の通信パケット70を利用した通信処理の流れについてA社の情報収集プロセスを例に説明する。
{4. Flow of communication processing}
In the information collection system configured as described above, the flow of communication processing using the communication packet 70 configured as described above will be described by taking the information collection process of company A as an example.
 まず、家屋10内でテレビ41-1や冷蔵庫41-2などの家電が使用される。これら家電には、A社計測端末32Aを介して電力が供給され、情報取得部323において消費電力量が計測される。 First, home appliances such as the television 41-1 and the refrigerator 41-2 are used in the house 10. Electric power is supplied to these home appliances via the company A measuring terminal 32A, and the information acquisition unit 323 measures the power consumption.
 A社計測端末32A、32Aは、計測した消費電力量の情報をA社マスタ端末31Aに送信する。A社マスタ端末31Aは、A社計測端末32A、32Aから受信した計測情報を基に、家屋10内の消費電力量を集計し、A社サーバ60Aへ報告する情報を生成する。 The company A measuring terminals 32A and 32A transmit information on the measured power consumption to the company A master terminal 31A. The company A master terminal 31A aggregates the power consumption in the house 10 based on the measurement information received from the company A measurement terminals 32A and 32A, and generates information to be reported to the company A server 60A.
 生成された情報は外部通知情報部73として通信パケット70に埋め込まれる。このとき、まず、外部通知情報部73は、A社独自の暗号鍵KAで暗号化される。さらに、A社サーバ60Aのアクセス情報が外部アクセス情報部72として通信パケット70に埋め込まれるが、このとき、外部アクセス情報部72と外部通知情報部73がA社の個別鍵CAで暗号化される。そして、A社の識別情報を含むヘッダ71が生成されると、図8に示すように、通信パケット70が外部アクセス装置35に送信される。 The generated information is embedded in the communication packet 70 as the external notification information unit 73. At this time, first, the external notification information unit 73 is encrypted with the encryption key KA unique to the company A. Further, the access information of the company A server 60A is embedded in the communication packet 70 as the external access information unit 72. At this time, the external access information unit 72 and the external notification information unit 73 are encrypted with the individual key CA of the company A. . When the header 71 including the identification information of company A is generated, a communication packet 70 is transmitted to the external access device 35 as shown in FIG.
 外部アクセス装置35は、ヘッダ71を参照することで、通信パケット70がA社の通信パケット70であると認識する。そこで、外部アクセス装置35は、A社の個別鍵CAを用いて外部アクセス情報部72と外部通知情報部73を復号し、外部アクセス情報を取得する。 The external access device 35 refers to the header 71 to recognize that the communication packet 70 is the communication packet 70 of company A. Therefore, the external access device 35 decrypts the external access information unit 72 and the external notification information unit 73 using the individual key CA of company A, and acquires external access information.
 次に、外部アクセス装置35は、取得した外部アクセス情報を利用してインターネット50を介してA社サーバ60Aにアクセスし、外部通知情報部73をA社サーバ60Aに転送するのである。このとき、外部通知情報部73は、図8にも示すように、A社独自の暗号鍵KAで暗号化されているので、情報の機密性は保持される。 Next, the external access device 35 uses the acquired external access information to access the A company server 60A via the Internet 50 and transfers the external notification information section 73 to the A company server 60A. At this time, as shown in FIG. 8, the external notification information unit 73 is encrypted with the encryption key KA unique to the company A, so the confidentiality of the information is maintained.
 また、外部アクセス装置35は、個別鍵CAを用いて復号して得られた外部アクセス情報を利用した後は、メモリに保存することなく破棄する。これにより、外部アクセス情報が不正に利用される可能性の余地を残さないようにしている。 In addition, after using the external access information obtained by decrypting using the individual key CA, the external access device 35 discards it without saving it in the memory. As a result, there is no room for the possibility of unauthorized use of external access information.
 以上説明したように、本実施の形態の情報収集システムは、共通の電力線通信ネットワーク20を複数の異なる会社が共用することで、システムの構築コストを低減させることができる。また、家屋10内に構築するネットワークシステムを簡素化させることができる。 As described above, the information collection system of the present embodiment can reduce system construction costs by sharing a common power line communication network 20 among a plurality of different companies. Moreover, the network system constructed in the house 10 can be simplified.
 複数の異なる会社が家屋10内の共通の電力線21および外部アクセス装置35を利用し、このネットワーク内で個人情報を収集するため、情報の機密性が問題となるが、上記の仕組みにより、各社の情報の機密性が維持される。したがって、複数の会社は、安心して共通システムを利用することができる。 Since different companies use the common power line 21 and the external access device 35 in the house 10 and collect personal information in this network, the confidentiality of information becomes a problem. Information confidentiality is maintained. Therefore, a plurality of companies can use the common system with peace of mind.
 また、各社の情報の機密性を維持しながら、図5で示したように通信パケット70のフォーマットは共通化しているので、通信処理のプロセス、プロトコルを共通化させることができ、情報収集システムの構築コストの低減と高い拡張性を保持することができる。 Further, while maintaining the confidentiality of the information of each company, the format of the communication packet 70 is made common as shown in FIG. 5, so that the communication process and protocol can be made common, and the information collection system Reduction of construction cost and high expandability can be maintained.
 また、各社の利用する個別鍵CXは秘匿性が維持されるので、各社の情報が解読されることはないが、外部アクセス装置35で実行される個別鍵CXの生成プロセスは共通化されるので、鍵の管理が容易であり、システム運用において煩雑さを排除できる。 In addition, since the confidentiality of the individual key CX used by each company is maintained, the information of each company is not decrypted, but the generation process of the individual key CX executed by the external access device 35 is shared. Key management is easy, and complexity in system operation can be eliminated.
 {5.変形例}
 上記実施の形態においては、電力、ガス、水道会社を例に説明したが、これは一例である。家屋10内に機器41を設置する様々な会社が情報を収集するために本システムを利用可能である。
{5. Modifications}
In the said embodiment, although demonstrated to the example of electric power, gas, and a water company, this is an example. Various companies that install the equipment 41 in the house 10 can use this system to collect information.
 たとえば、セキュリティ会社がセキュリティシステムの情報を収集するために、この情報収集システムを利用してもよい。計測端末32が各種センサと通信を行い、センシング情報を取得し、セキュリティ会社のサーバに情報を転送することができる。これにより、セキュリティ会社は、各家屋に専用の回線を敷設する必要がなくなる。電力線21は、家屋10内のあらゆる場所に張り巡らされているので、家屋10内の様々な場所に設置されたセンサから情報を収集するのに便利である。そして、インターネット50を経由して携帯電話機などの端末で家屋10内のセキュリティ情報を参照可能とすることで、さらに利便性の高いシステムを提供可能である。 For example, this information collection system may be used by a security company to collect security system information. The measurement terminal 32 can communicate with various sensors, acquire sensing information, and transfer the information to a security company server. This eliminates the need for security companies to lay dedicated lines in each house. Since the power line 21 is stretched everywhere in the house 10, it is convenient for collecting information from sensors installed in various places in the house 10. Further, by making it possible to refer to the security information in the house 10 with a terminal such as a mobile phone via the Internet 50, it is possible to provide a more convenient system.
 この発明を添付図面に示す実施態様について説明したが、この発明は、特に明記した部分を除いては、その詳細な説明の記載をもって制約しようとするものではなく、特許請求の範囲に記載する範囲において広く構成しようとするものである。 Although the invention has been described with reference to the embodiments shown in the accompanying drawings, the invention is not intended to be limited by the description of the detailed description, except as specifically stated, but not to the extent described in the claims. Is intended to be widely configured.

Claims (9)

  1.  情報収集システムであって、
     電力線通信網と、
     前記電力線通信網に接続された情報収集端末と、
     前記電力線通信網に接続された外部アクセス装置と、
    を備え、
     前記情報収集端末は、
     前記外部アクセス装置によって復号不可能な第1暗号方式により暗号化された通知情報と、前記外部アクセス装置によって復号可能な第2暗号方式により暗号化されたアクセス情報と、を含む通信パケットを前記外部アクセス装置に送信する送信部、
    を含み、
     前記外部アクセス装置は、
     受信した通信パケットに含まれるアクセス情報を復号し、前記第1暗号方式で暗号化された通知情報を、復号したアクセス情報に従って外部へ転送する転送部、
    を含む。
    An information collection system,
    A power line communication network;
    An information collection terminal connected to the power line communication network;
    An external access device connected to the power line communication network;
    With
    The information collecting terminal
    A communication packet including notification information encrypted by a first encryption method that cannot be decrypted by the external access device and access information encrypted by a second encryption method that can be decrypted by the external access device; A transmitter for transmitting to the access device;
    Including
    The external access device is:
    A transfer unit that decrypts the access information included in the received communication packet and forwards the notification information encrypted by the first encryption method to the outside according to the decrypted access information;
    including.
  2.  請求項1に記載の情報収集システムにおいて、さらに、
     前記電力線通信網に接続された計測端末、
    を備え、
     前記情報収集端末は、前記計測端末の情報を収集する。
    The information collection system according to claim 1, further comprising:
    A measuring terminal connected to the power line communication network;
    With
    The information collection terminal collects information of the measurement terminal.
  3.  電力線通信網に接続された外部アクセス装置であって、
     前記外部アクセス装置によって復号不可能な第1暗号方式により暗号化された通知情報と、前記外部アクセス装置によって復号可能な第2暗号方式により暗号化されたアクセス情報と、を含む通信パケットを前記電力線通信網に接続された情報収集端末から受信する受信部と、
     受信した通信パケットに含まれるアクセス情報を復号し、前記第1暗号方式で暗号化された通知情報を、復号したアクセス情報に従って外部へ転送する転送部と、
    を備える。
    An external access device connected to a power line communication network,
    A communication packet including notification information encrypted by a first encryption method that cannot be decrypted by the external access device and access information encrypted by a second encryption method that can be decrypted by the external access device; A receiving unit for receiving from an information collecting terminal connected to a communication network;
    A transfer unit that decrypts the access information included in the received communication packet and forwards the notification information encrypted by the first encryption method to the outside according to the decrypted access information;
    Is provided.
  4.  請求項3に記載の外部アクセス装置において、
     前記外部アクセス装置は、通知情報を外部へ転送した後、復号したアクセス情報を破棄する。
    The external access device according to claim 3,
    The external access device discards the decrypted access information after transferring the notification information to the outside.
  5.  情報収集システムであって、
     電力線通信網と、
     前記電力線通信網に接続された異なる組織によって管理された複数の情報収集端末と、
     前記電力線通信網に接続された外部アクセス装置と、
    を備え、
     各情報収集端末は、
     各組織で独自に設定される第1暗号方式により暗号化された通知情報と、前記外部アクセス装置によって復号可能であり、各組織に固有な第2暗号方式により暗号化されたアクセス情報と、を含む通信パケットを前記外部アクセス装置に送信する送信部、
    を含み、
     前記外部アクセス装置は、
     受信した通信パケットに含まれるアクセス情報を復号し、前記第1暗号方式で暗号化された通知情報を、復号したアクセス情報に従って外部へ転送する転送部、
    を含む。
    An information collection system,
    A power line communication network;
    A plurality of information collection terminals managed by different organizations connected to the power line communication network;
    An external access device connected to the power line communication network;
    With
    Each information collection terminal
    Notification information encrypted by the first encryption method uniquely set in each organization, and access information that can be decrypted by the external access device and encrypted by the second encryption method unique to each organization, A transmission unit for transmitting a communication packet including the external access device;
    Including
    The external access device is:
    A transfer unit that decrypts the access information included in the received communication packet and forwards the notification information encrypted by the first encryption method to the outside according to the decrypted access information;
    including.
  6.  請求項5に記載の情報収集システムにおいて、
     前記第2暗号化方式では組織ごとの組織別暗号鍵が用いられ、前記組織別暗号鍵の生成プロセスにおいて、組織の識別情報と前記組織別暗号鍵が生成された時間情報とがパラメータとして利用される。
    The information collection system according to claim 5,
    In the second encryption method, an organization-specific encryption key for each organization is used, and in the organization-specific encryption key generation process, organization identification information and time information when the organization-specific encryption key is generated are used as parameters. The
  7.  請求項5に記載の情報収集システムにおいて、さらに、
     前記電力線通信網に接続された異なる組織によって管理された複数の計測端末、
    を備え、
     各情報収集端末は、同じ組織で管理されている計測端末の情報を収集する。
    The information collection system according to claim 5, further comprising:
    A plurality of measurement terminals managed by different organizations connected to the power line communication network;
    With
    Each information collection terminal collects information of measurement terminals managed by the same organization.
  8.  異なる複数の組織が共同で利用する電力線通信網に接続された外部アクセス装置であって、
     各組織で独自に設定される第1暗号方式により暗号化された通知情報と、前記外部アクセス装置によって復号可能であり、各組織に固有な第2暗号方式により暗号化されたアクセス情報と、を含む通信パケットを前記電力線通信網に接続された異なる組織によって管理された複数の情報収集端末から受信する受信部と、
     受信した通信パケットに含まれるアクセス情報を復号し、前記第1暗号方式で暗号化された通知情報を、復号したアクセス情報に従って外部へ転送する転送部と、
    を備える。
    An external access device connected to a power line communication network shared by a plurality of different organizations,
    Notification information encrypted by the first encryption method uniquely set in each organization, and access information that can be decrypted by the external access device and encrypted by the second encryption method unique to each organization, A receiving unit that receives communication packets from a plurality of information collection terminals managed by different organizations connected to the power line communication network;
    A transfer unit that decrypts the access information included in the received communication packet and forwards the notification information encrypted by the first encryption method to the outside according to the decrypted access information;
    Is provided.
  9.  請求項8に記載の外部アクセス装置において、
     前記外部アクセス装置は、通知情報を外部へ転送した後、復号したアクセス情報を破棄する。
    The external access device according to claim 8,
    The external access device discards the decrypted access information after transferring the notification information to the outside.
PCT/JP2011/062406 2011-05-30 2011-05-30 Information collection system and external access device WO2012164666A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/JP2011/062406 WO2012164666A1 (en) 2011-05-30 2011-05-30 Information collection system and external access device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/JP2011/062406 WO2012164666A1 (en) 2011-05-30 2011-05-30 Information collection system and external access device

Publications (1)

Publication Number Publication Date
WO2012164666A1 true WO2012164666A1 (en) 2012-12-06

Family

ID=47258552

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2011/062406 WO2012164666A1 (en) 2011-05-30 2011-05-30 Information collection system and external access device

Country Status (1)

Country Link
WO (1) WO2012164666A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111932852A (en) * 2020-07-17 2020-11-13 深圳市燃气集团股份有限公司 Gas meter reading system based on state cryptographic algorithm and gas data transmission method thereof

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2010049334A (en) * 2008-08-19 2010-03-04 Mega Chips Corp Information collection system and external access device

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2010049334A (en) * 2008-08-19 2010-03-04 Mega Chips Corp Information collection system and external access device

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111932852A (en) * 2020-07-17 2020-11-13 深圳市燃气集团股份有限公司 Gas meter reading system based on state cryptographic algorithm and gas data transmission method thereof
CN111932852B (en) * 2020-07-17 2021-05-25 深圳市燃气集团股份有限公司 Gas meter reading system based on state cryptographic algorithm and gas data transmission method thereof

Similar Documents

Publication Publication Date Title
JP5311459B2 (en) Information collection system and external access device
US10375040B2 (en) Utility meter for metering a utility consumption and optimizing upstream communications and method for managing these communications
US8863228B2 (en) Energy management apparatus and energy management system
KR101538424B1 (en) Terminal for payment and local network monitoring
Liu et al. A dynamic secret-based encryption scheme for smart grid wireless communication
US11733061B2 (en) System and method to manage utility meter communications
CN111800400B (en) Multi-dimensional multi-angle electricity data aggregation system based on fog
JP6017336B2 (en) Data management device and power consumption calculation system
KR101512502B1 (en) Ami security system applied with hardware security module
Souri et al. Smart metering privacy-preserving techniques in a nutshell
Akgün et al. A privacy-preserving scheme for smart grid using trusted execution environment
CN110278077B (en) Method, device, equipment and storage medium for acquiring data information of electric energy meter
WO2012164666A1 (en) Information collection system and external access device
WO2023171882A1 (en) Remote metering system using security module
WO2013168326A1 (en) Cryptographic key configuration system and terminal device
JP2003283537A (en) Remote monitoring system
WO2023008651A1 (en) Smart metering system having security function
KR20230094654A (en) Method and device for collecting real-time energy usage data in public space
WO2014000773A1 (en) Secure communication in an energy management system
KR20220068640A (en) Apparatus for collecting power usage data of apartment house
Kaur et al. Review on Smart Grid Attacks and their Countermeasure using Cryptography Algorithms.
KUMAR et al. A Light Weight Authenticated Communication Sketch for Shrewd Net
JP5681198B2 (en) Machine management system, machine management apparatus, and machine management method
Samarati Communications and Networking for Smart Grid: Technology and Practice
Cvetanovic Visualization techniques for system performance characterization

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 11866473

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC DATED 05.03.14

NENP Non-entry into the national phase

Ref country code: JP

122 Ep: pct application non-entry in european phase

Ref document number: 11866473

Country of ref document: EP

Kind code of ref document: A1