WO2016143042A1 - Mesureur de puissance - Google Patents

Mesureur de puissance Download PDF

Info

Publication number
WO2016143042A1
WO2016143042A1 PCT/JP2015/056859 JP2015056859W WO2016143042A1 WO 2016143042 A1 WO2016143042 A1 WO 2016143042A1 JP 2015056859 W JP2015056859 W JP 2015056859W WO 2016143042 A1 WO2016143042 A1 WO 2016143042A1
Authority
WO
WIPO (PCT)
Prior art keywords
sensor
log
control device
level
radio wave
Prior art date
Application number
PCT/JP2015/056859
Other languages
English (en)
Japanese (ja)
Inventor
雅思 佐藤
Original Assignee
オムロン株式会社
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by オムロン株式会社 filed Critical オムロン株式会社
Priority to PCT/JP2015/056859 priority Critical patent/WO2016143042A1/fr
Publication of WO2016143042A1 publication Critical patent/WO2016143042A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G01MEASURING; TESTING
    • G01RMEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
    • G01R11/00Electromechanical arrangements for measuring time integral of electric power or current, e.g. of consumption
    • G01R11/02Constructional details
    • G01R11/24Arrangements for avoiding or indicating fraudulent use
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01RMEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
    • G01R22/00Arrangements for measuring time integral of electric power or current, e.g. electricity meters

Definitions

  • the present invention relates to a watt-hour meter capable of detecting fraud.
  • Patent Document 1 discloses a technique for reporting an abnormality when it is detected that a sealing screw for fixing a terminal cover to a watt hour meter is loosened.
  • Patent Document 1 With the technology of Patent Document 1, it is possible to detect fraudulent actions (for example, formation of fraudulent bypass wiring) that involve an opening operation of a watt hour meter cover, but it is difficult to detect fraudulent actions that do not involve an opening operation of a power system cover It is.
  • a smart meter is a device that measures and outputs (displays or transmits) electric energy in a digital manner, and includes a display unit, an external communication unit (optical port for infrared communication), and a processor.
  • the processor measures the amount of power supplied to the supply target based on a current sensor or the like, and displays (outputs) the amount of power by controlling the display unit. And the amount of power is transmitted (output) to an external device.
  • the processor that controls the display unit and the external communication unit transmits and receives signals to and from the display unit or the external communication unit.
  • the display unit and the external communication unit need to be visible from the outside, the display unit and the external communication unit are not protected by an electromagnetic shield. Therefore, although the smart meter processor itself is protected by an electromagnetic shield, it emits radio waves due to its large surface area and transmission / reception of signals to / from an external communication unit that is not protected by an electromagnetic shield. Or resistance to electrostatic discharge (ESD) is low.
  • ESD electrostatic discharge
  • an unauthorized person may perform an illegal act of temporarily causing radio wave emission or electrostatic discharge to hang up the smart meter processor.
  • the smart meter processor is hung up, the amount of power is not measured even if power is supplied. If the processor is hung up only by a short period of time due to radio emission or electrostatic discharge, but the processor is operating normally without radio emission or electrostatic discharge during other periods, there will be evidence of fraudulent activity. Hard to remain. Therefore, fraudulent acts due to radio wave emission and electrostatic discharge are a problem.
  • a radio wave sensor and an electrostatic sensor are attached to the smart meter, and data on the output values (sensor values) of these sensors A method of saving logs can be considered. This is because such a log can be a sign (evidence) of fraudulent acts caused by radio wave emission or electrostatic discharge.
  • the log must be recorded by the processor. If the smart meter processor hangs up due to radio wave emission or electrostatic discharge, not only the energy measurement stops, but also the log recording process stops. As a result, it is difficult to detect a log while the fraud is being performed, and it is difficult to detect the fraud.
  • An object of the present invention is to provide a watt-hour meter capable of detecting fraudulent acts on an ammeter due to radio wave emission or electrostatic discharge.
  • the watt-hour meter of the present invention transmits and receives a signal to and from the display unit for outputting the electric energy or an external communication port, and measures the electric energy.
  • a second control device that is a circuit board different from the first control device and that transmits and receives signals to and from the first control device.
  • the second control device performs a sensor log generation process for generating a sensor log indicating a history of output information indicating a height of an output value for each of the plurality of sensors
  • the first control device includes: When the normal state is restored from the abnormal state in which the normal operation cannot be performed, the sensor log during the abnormal state is acquired from the second control device, and the illegal behavior estimated from the sensor log is obtained. And executes an action estimate log generation process for generating the activity estimation log showing the kind.
  • the first control device transmits and receives signals to and from the display unit or the external communication port, but the second control device transmits and receives signals to and from the display unit or the external communication port. Since transmission / reception is not performed, the second control device is more resistant to radio wave emission or electrostatic discharge than at least the first control device. Therefore, even if radio wave emission or electrostatic discharge is performed on the watt hour meter and the first control device hangs up, the hang up to the second control device is suppressed. Therefore, since the second control device can generate the sensor log while the first control device is hung up due to fraud due to radio wave emission or electrostatic discharge, it is possible to leave a trace of fraud due to radio wave emission or electrostatic discharge. The first effect is that the fraud can be detected.
  • the sensor log is generated not only while the first control device is hung up but also during normal operation. It is not easy to identify the person unless it is a skilled meter reader (log analyst). This is because (1) the sensor log is simply a history of output information (for example, the level of the output value) indicating the height of the sensor output value. It is difficult to identify, and (2) the log of the period of the normal operation period and the hang-up period is enormous, so it is important to identify the suspected fraud log from this enormous log This is because it is difficult for a meter reader who is unfamiliar with the analysis work.
  • the first control device when the first control device returns from the abnormal state in which the normal operation cannot be performed to the normal operation state, the first control device acquires the sensor log during the abnormal state from the second control device, and An action estimation log indicating the type of fraud estimated from the sensor log is generated.
  • the meter reader need only analyze the behavior estimation log ignoring the sensor log when verifying the presence and type of fraud, and the behavior estimation log indicates the type of fraud.
  • the second effect is that even an inexperienced meter reader can easily perform the analysis work.
  • FIG. 1 It is a block diagram which shows schematic structure of the watt-hour meter which concerns on one Embodiment of this invention. It is a block diagram which shows schematic structure of the security sensor shown in FIG. It is a figure which shows the external appearance of the security sensor shown in FIG. It is the figure which showed the relationship between the threshold value applied to the sensor value of a radio wave sensor, and a level, and the figure which showed an example of the sensor log of a radio wave sensor.
  • the amount of electric power measured by the first control device, the operating state of the first control device, the state of communication between the first control device and the second control device, and the log stored in the first storage unit It is explanatory drawing which showed this relationship. It is the schematic diagram which showed an example of the action estimation log.
  • FIG. 6 is a schematic diagram showing first to fourth behavior estimation tables used in behavior estimation log generation processing. It is a flowchart which shows the flow of the whole process of the 2nd control apparatus of a security sensor. It is a flowchart which shows the flow of a process of a 1st control apparatus. 12 is a flowchart of a subroutine of initialization processing in S952 of FIG. FIG.
  • FIG. 12 shows the first half of the flowchart showing the subroutine of the sensor log generation process in S955 of FIG.
  • FIG. 12 shows the latter half of the flowchart showing the subroutine of the sensor log generation process in S955 of FIG. It is a flowchart which shows the subroutine of the action estimation log production
  • FIG. 1 is a block diagram showing a schematic configuration of a watt-hour meter according to an embodiment of the present invention.
  • the watt-hour meter 100 is a smart meter that measures the amount of power supplied to a power supply target (for example, a house) via a three-phase AC transmission line P1 to P3 by a digital method. is there.
  • the watt-hour meter 100 includes current sensors CT1 and CT3, a voltage dividing circuit 102, a power supply circuit 103, a display unit 104, an external communication unit 105, an RTC 106, and a first storage unit. 107, a first control device 108, and a security sensor 109.
  • the current sensor CT1 is a sensor that detects the current value IP1 of the power transmission line P1
  • the current sensor CT3 is a sensor that detects the current value IP3 of the power transmission line P3.
  • the voltage dividing circuit 102 is a sensor that detects a voltage value VP1 of the transmission line P1 and a voltage value VP3 of P3 of the transmission line.
  • the power supply circuit 103 is a power supply that supplies power to each hardware included in the watt-hour meter 100.
  • the display unit 104 is a display device that is electrically connected directly to the first control device 108 and that displays and outputs the amount of power under the control of the first control device 108.
  • a liquid crystal display device is used as the display unit 104.
  • the display unit 104 is attached to the watt hour meter 100 so as to be visible from the outside of the watt hour meter 100. This is because the meter reader or the like visually recognizes the content displayed on the display unit 104.
  • the external communication unit (external communication port) 105 is a light receiving / emitting element (optical port) that is electrically connected directly to the first control device 108 and performs infrared communication by being controlled by the first control device 108. .
  • the external communication unit 105 is attached to the watt-hour meter 100 so as to be visible from the outside. This is because the infrared communication device possessed by the meter reader is arranged opposite to the external communication unit 105 so that infrared communication can be performed between the infrared communication device and the watt-hour meter 100.
  • the first storage unit 107 is a storage area for storing information.
  • an EEPROM registered trademark; Electrically Erasable Programmable Read-Only Memory
  • storage part 107 is performed by the 1st control apparatus 108.
  • FIG. 1st control apparatus 108 FIG.
  • the first control device 108 is a control circuit board that controls each hardware of the watt-hour meter 100. Specifically, a processor (for example, a CPU (Central Processing Unit)) that executes processing according to a program is used.
  • a processor for example, a CPU (Central Processing Unit)
  • CPU Central Processing Unit
  • the first control device 108 includes a power calculation unit 111, a display control unit 112, an external communication processing unit 114, and a first log processing unit 113.
  • the first control device 108 is hardware, but the blocks 111 to 114 included in the first control device 108 are functional blocks that indicate software functions executed by the first control device 108.
  • the power calculation unit 111 uses the detection values of the current sensors CT1 and CT3 and the voltage dividing circuit 102 to calculate (measure) the amount of power supplied to the power supply target via the transmission lines P1 to P3. It is a block that performs.
  • the power calculation unit 111 obtains the instantaneous power amount of the transmission line P1 by multiplying the current value IP1 and the voltage value VP1, and multiplies the current value IP3 and the voltage value VP3 to obtain the instantaneous power value of the transmission line P3.
  • the amount of power is obtained by time-integrating the sum of the instantaneous power value of the transmission line P1 and the instantaneous power value of the transmission line P3.
  • the power calculation unit 111 calculates the amount of power in the predetermined period every time a predetermined period (for example, 10 minutes) elapses, stores the amount of power in the predetermined period in the first storage unit 107, and stores it in the display control unit 112. introduce.
  • a predetermined period for example, 10 minutes
  • the power calculation unit 111 obtains a monthly or daily power amount (or a total power amount) by integrating the power amount for each predetermined period, and stores the power amount in the first storage unit 107.
  • the display control unit 112 is a block that controls the display unit 104.
  • the display control unit 112 causes the display unit 104 to display the amount of power transmitted from the power calculation unit 111 for a predetermined period.
  • the display control unit 112 displays the daily power amount and the monthly power amount stored in the first storage unit 107 on the display unit 104 in accordance with a command (operator command) input from the outside. It may be like this.
  • the first log processing unit (unauthorized control unit) 113 refers to data (sensor value) sent from the security sensor 109 to be described later, and a sensor log (shown in FIG. 4) showing a history of sensor value (output value) levels.
  • a sensor log generation process for generating (see (b)) is performed.
  • the first log processing unit 113 records the generated sensor log (abnormality detection log) in the first storage unit 107.
  • the 1st log process part 113 will generate
  • the sensor log generation process and the behavior estimation log generation process will be described in detail later.
  • the external communication processing unit 114 is a block that controls the external communication unit 105.
  • the external communication processing unit 114 When the meter reader of the watt-hour meter 100 places the infrared communication device close to and opposite to the external communication unit 105 and operates the infrared communication device to transmit the data extraction command to the external communication unit 105 by infrared, the external communication processing unit 114. Receives the data extraction command via the external communication unit 105.
  • the external communication processing unit 114 reads the data stored in the first storage unit 107 and transmits the data to the infrared communication device via the external communication unit 105 by infrared. .
  • the data transmitted to the infrared communication device by the external communication processing unit 114 is data related to the amount of power, a sensor log (see FIG. 4B), and an action estimation log (see FIG. 6).
  • the meter reader can periodically extract data and logs (sensor log, action estimation log) regarding the electric energy stored in the watt-hour meter 100.
  • the RTC 106 is a real-time clock that outputs time information indicating the current time including the date and time and the hour, minute, and second. Note that the RTC 106 is always connected with a backup battery (not shown), and therefore does not stop due to a power failure or the like, and always outputs accurate time information.
  • the first controller 108 recognizes the current time based on the time information of the RTC 106.
  • a second control device 207 (see FIG. 2) of the security sensor 109, which will be described later, acquires time information of the RTC 106 from the first control device 108 when the security sensor 109 is activated, and the acquired current time is a timer (not shown). The current time is recognized based on this timer.
  • FIG. 2 is a block diagram showing hardware included in the security sensor 109 shown in FIG.
  • FIG. 3 is an external view of the security sensor 109.
  • FIG. 3 (a) is a perspective view showing the front of the security sensor 109.
  • FIG. 3B is a perspective view showing the back surface of the security sensor 109.
  • FIG. 3C is a top view of the security sensor 109.
  • FIG. 3D is a front view of the security sensor 109.
  • FIG. 3E is a side view of the security sensor 109.
  • FIG. 3F is a rear view of the security sensor 109.
  • FIG. 3G is a bottom view of the security sensor 109.
  • the security sensor 109 is a detection device for detecting an illegal act on the watt hour meter 100 and is attached to the inside of the watt hour meter 100.
  • the security sensor 109 is detachable from the watt hour meter 100.
  • the security sensor 109 includes a radio wave sensor 201, an electrostatic sensor 202, a magnetic sensor 203, an acceleration sensor 204, a temperature sensor 205, a second storage unit 206, and a second control device 207.
  • the security sensor 109 has a resin package (housing) 109a shown in FIG. 3A, and the package 109a accommodates the members 201 to 207 shown in FIG.
  • the radio wave sensor 201 is a sensor that outputs a sensor value AD1 that correlates with the amount of radio waves in a frequency band that causes radio interference (EMI) with respect to an electronic device. Specifically, when an illegal act of emitting radio waves is performed in order to hang up the processor that measures the amount of power (the first control device 108 in this embodiment), the sensor value AD1 output from the radio wave sensor 201 becomes high. Become.
  • the electrostatic sensor (ESD sensor) 202 is a sensor that outputs a sensor value AD2 that correlates with the charge amount inside the watt-hour meter 100. Specifically, when an illegal act of discharging static electricity is performed in order to hang up the processor (the first control device 108 in the present embodiment) that measures the amount of electric power, it is output from the electrostatic sensor 202.
  • the sensor value AD2 increases.
  • the electrostatic sensor (ESD Surge sensor) 202 is a sensor that outputs a sensor value AD2 corresponding to an increase in charge when a charge surge phenomenon occurs in the watt-hour meter 100. Specifically, a charge surge phenomenon occurs in the watt-hour meter 100 when a fraudulent act of discharging static electricity is performed to hang up the processor (first control device 108 in this embodiment) that measures the amount of power.
  • the sensor value AD2 becomes high.
  • the magnetic sensor 203 is a sensor that outputs a sensor value AD3 correlated with the magnitude of the magnetic field. Specifically, when an illegal act of bringing the magnet close to the watt hour meter 100 is performed for the purpose of stopping the functions of the current sensors CT1 and CT3, the sensor value AD3 output from the magnetic sensor 203 increases. Note that if the current sensors CT1 and CT3 stop functioning, the power calculation unit 111 cannot measure the amount of power, resulting in theft.
  • the acceleration sensor 204 is a sensor that outputs a sensor value AD4 that correlates with the acceleration of the security sensor 109. Specifically, when an illegal act of applying an impact to the watt-hour meter 100 with a drill or the like for the purpose of breaking the cover of the watt-hour meter 100, the sensor value AD4 output from the acceleration sensor 204 becomes high. Become.
  • the temperature sensor 205 is a sensor that outputs a sensor value AD5 correlated with the ambient temperature. Specifically, when the cover of the watt hour meter 100 is ignited for the purpose of breaking the cover of the watt hour meter 100, the sensor value AD5 output from the temperature sensor 205 increases.
  • the second storage unit 206 is a storage area for storing information, and a flash memory is used in this embodiment. Reading and writing of information with respect to the second storage unit 206 is executed by the second control device 207.
  • the second control device 207 is a control circuit board separate from the first control device 108, and is a processor (for example, CPU) that controls each hardware of the security sensor 109.
  • the second control device 207 receives sensor values of the sensors 201 to 205 and performs sensor log generation processing for generating a sensor log (abnormality detection log) indicating a history of sensor value levels with reference to the sensor values.
  • the sensor log is stored in the second storage unit 206.
  • the second control device 207 transmits (transfers) the sensor values received from the sensors 201 to 205 to the first control device 108.
  • the first log processing unit 113 receives the sensor value sent from the security sensor 109 (that is, the second control device 207), and based on the sensor value.
  • the sensor log generation process is performed, and the sensor log is stored in the first storage unit 107.
  • the processing content of the sensor log generation processing in the second control device 207 and the processing content of the sensor log generation processing in the first control device 108 are the same. Therefore, while both the first control device 108 and the second control device 207 are operating normally, the first control device 108 and the second control device 207 perform the process of generating sensor logs having the same contents as each other. A sensor log with the same content is generated. Therefore, the sensor log stored in the first storage unit 107 and the sensor log stored in the second storage unit 206 during the normal operation of both the first control device 108 and the second control device 207 are the same. It is.
  • watt hour meters In general, watt hour meters must be designed so that the operator can visually recognize the display unit and external communication unit (optical port) from the outside. It has not been. Since the display unit and the external communication unit are hardware with a large surface area, when radio wave emission or electrostatic discharge is performed on the watt hour meter, control is performed to transmit / receive signals to / from the display unit or external communication unit. Radio waves or static electricity is easily transmitted to the circuit (processor) via the wiring between the display unit and the external communication unit. Therefore, a control circuit that transmits and receives signals to and from the display unit or the external communication unit is likely to hang up and has low resistance to radio waves or static electricity.
  • the first control device 108 that transmits and receives signals to and from the display unit 104 or the external communication unit 105 of the watt hour meter 100 has low resistance to radio wave emission or electrostatic discharge, and If radio waves are emitted or electrostatic discharge is performed, hang-up is likely to occur.
  • the second control device 207 of the present embodiment does not transmit / receive signals to / from the display unit and the external communication unit, and the first control device 108, the second storage unit 206, and the sensors 201 to 205 It is designed to send and receive signals between. Therefore, the second control device 207 is highly resistant to radio wave emission or electrostatic discharge (at least higher than the first control device 108) and hangs even if radio wave emission or electrostatic discharge is performed on the watt-hour meter 100. It is hard for an up. The reason is as follows.
  • the wiring that connects circuit boards such as control devices and storage devices is designed to suppress the transmission of radio waves and static electricity, so the display unit or external communication unit and circuit that are not protected by electromagnetic shielding
  • the influence of radio waves and static electricity is suppressed compared to the wiring connecting the substrate. Therefore, even if radio wave emission or electrostatic discharge is performed on the watt-hour meter 100, radio wave or static electricity is easily transmitted from the display unit 104 or the external communication unit 105 to the first control device 108. It is difficult to transmit from the control device 108 to the second control device 207.
  • the second control device 207 transmits and receives signals to and from the sensors 201 to 205.
  • the sensors 201 to 205 are extremely small in size and surface area compared to the display unit 104 or the external communication unit 105. Very small. Therefore, even if radio wave emission or electrostatic discharge is performed on the watt-hour meter 100, radio wave or static electricity is easily transmitted from the display unit 104 or the external communication unit 105 having a large surface area to the first control device 108. In addition, it is difficult for radio waves or static electricity to be transmitted from the sensors 201 to 205 having a small surface area to the second controller 207. Therefore, the second control device 207 is highly resistant to radio wave emission or electrostatic discharge (at least higher than the first control device 108) and hangs even if radio wave emission or electrostatic discharge is performed on the watt-hour meter 100. It is hard for an increase to occur.
  • the second control device 207 can continue normal operation. During this period, the first control device 108 cannot generate the sensor log because it cannot receive the sensor value from the second control device 207, but the second control device 207 can generate the sensor log.
  • the second control device 207 includes a sensor value acquisition unit 301, a communication control unit 302, and a second log processing unit 303.
  • the second control device 207 is hardware (CPU), but each of the blocks 301 to 303 included in the second control device 207 is a functional block indicating a function of software executed by the second control device 207.
  • the sensor value acquisition unit 301 is a block that controls each of the sensors 201 to 205 and simultaneously acquires the sensor values of the sensors 201 to 205 at regular intervals.
  • the communication control unit 302 is a block that performs communication with the first control device 108. Specifically, the communication control unit 302 transmits (transfers) the sensor values of the sensors 201 to 205 acquired by the sensor value acquisition unit 301 to the first control device 108.
  • the communication control unit 302 is configured to monitor the communication state of the first control device 108. Specifically, the communication control unit 302 detects (determines) the start time and the end time of the communication disabled period when a communication disabled period occurs with the first control device 108.
  • the communication disabled period is, for example, that the first control device 108 and the second control are performed when radio waves are emitted or electrostatic discharge is performed on the watt hour meter 100 and the first control device 108 is hung up. Examples include a period during which communication with the device 207 is disabled.
  • the second log processing unit 303 refers to the sensor values of the sensors 201 to 205 acquired by the sensor value acquisition unit 301, and generates a sensor log (see FIG. 4B) for each of the sensors 201 to 205. Perform the generation process.
  • sensor log generation processing performed by the second log processing unit 303 and the first log processing unit 113 will be described.
  • processing by the second log processing unit 303 is described as an example, but the same processing is performed in the first log processing unit 113 as well.
  • threshold value 1 and threshold value 2 higher than threshold value 1 are set for each sensor 201-205. Further, level 0 is initially set as the sensor value level for each of the sensors 201 to 205.
  • the second log processing unit 303 determines for each of the sensors 201 to 205 whether or not a change in the level of the acquired sensor value has occurred.
  • the second log processing unit 303 records a sensor log indicating the correspondence between the recording time and the level information.
  • the recording time is the time when the sensor log indicating the recording time is recorded.
  • the level information is information indicating the type of sensor to be processed and the level after the change.
  • FIG. 4A is a graph showing the relationship between the threshold value 1 (Rad_Th1) and threshold value 2 (Rad_Th2) applied to the sensor value of the radio wave sensor 201 and the level
  • FIG. 4B is the radio wave sensor.
  • FIG. 6 is a schematic diagram illustrating an example of a sensor log 201.
  • the second log processing unit 303 determines that the sensor value of the radio wave sensor 201 acquired by the sensor value acquisition unit 301 is level 0 (Lv0) when the sensor value is less than or equal to the threshold value 1, and the sensor value exceeds the threshold value 1 and is less than or equal to the threshold value 2 In this case, it is determined as level 1 (Lv1), and when the sensor value exceeds the threshold value 2, it is determined as level 2 (Lv2).
  • the second log processing unit 303 determines whether or not the currently determined level of the radio wave sensor 201 has changed from the previously determined level (or the initially set level), and the level changes. If not, the sensor log is not recorded.
  • the second log processing unit 303 records a sensor log indicating the correspondence between the recording time and the level information.
  • the recording time is the time when the sensor log indicating the recording time is recorded.
  • the level information is information indicating the type of sensor to be processed and the level after the change.
  • the sensor values of the five sensors 201 to 205 are simultaneously acquired by the sensor value acquisition unit 301. If it is determined that the sensor value level of the radio wave sensor 201 has changed, the sensor log of the radio wave sensor 201 is detected. As a result, the correspondence between the recording time and the level information is recorded.
  • (B) of FIG. 4 is an example of a sensor log of the radio wave sensor 201.
  • “2015.02.23 16: 03: 23.266” in the sensor log indicated by reference numeral 500 is the recording time of the sensor log.
  • “Lv1 RadioWave” is level information
  • “RadioWave” is the type of sensor to be processed (radio wave sensor 201)
  • “Lv1” is the level after the change.
  • the second log processing unit 303 similarly creates a sensor log for each of the sensors 202 to 205 other than the radio wave sensor 201. That is, in FIG. 4B, the sensor log of the radio wave sensor 201 is shown as a representative example, but a sensor log similar to the sensor log shown in FIG. 4B is provided for each of the sensors 202 to 205 other than the radio wave sensor 201. It is to be created.
  • the second log processing unit 303 sets the sensors 201 to 205 as processing targets in order, and sensor values of the processing target sensors. It is determined whether or not the level has changed, and when it is determined that the level has changed, a sensor log of the determination target sensor is generated and recorded.
  • the recording time, the type of sensor to be processed (static sensor 202), and the level after the change (of the electrostatic sensor 202) are recorded as a sensor log of the electrostatic sensor.
  • the correspondence relationship with the level information indicating the sensor value level) is recorded.
  • the recording time, the type of sensor to be determined (magnetic sensor 203), and the level after the change (magnetic sensor 203) are recorded as a sensor log of the magnetic sensor 203.
  • the correspondence relationship with the level information indicating the sensor value level) is recorded.
  • the sensor time of the acceleration sensor 204 is recorded as the recording time, the type of sensor to be determined (acceleration sensor 204), and the level after the change (acceleration sensor 204). The correspondence relationship with the level information indicating the sensor value level) is recorded.
  • the sensor time of the temperature sensor 205 is recorded as the recording time, the type of sensor to be determined (temperature sensor 205), and the level after the change (temperature sensor 205). The correspondence relationship with the level information indicating the sensor value level) is recorded.
  • the second log processing unit 303 creates a sensor log for each of the sensors 201 to 205 and stores it in the second storage unit 206.
  • the level information indicating the type and level of the sensor is associated with the recording time.
  • the attached sensor log is recorded.
  • level information indicating the type and level of the sensor and the recording time each time a level change occurs are recorded in the sensor log.
  • the sensor values of the respective sensors 201 to 205 acquired simultaneously by the sensor value acquisition unit 301 are not only used for the sensor log generation process in the second log processing unit 303 but also the first control by the communication control unit 302. Transferred to device 108. Then, the first log processing unit 113 of the first control device 108 acquires the sensor values of the respective sensors 201 to 205 transferred from the communication control unit 302, and uses the sensor values to use the second log processing unit 303. The same process as the sensor log generation process is executed, and the sensor log for each sensor generated in the process is stored in the first storage unit 107. Therefore, while both the first control device 108 and the second control device 207 are operating normally, the same sensor log is recorded in the first storage unit 107 and the second storage unit 206.
  • FIG. 5 shows the amount of electric power measured by the first control device 108, the state (operation state) of the first control device 108, and the state of communication between the first control device 108 and the second control device 207.
  • FIG. 6 is an explanatory diagram showing a relationship with a log stored in the first storage unit 107.
  • the second control device 207 continues normal operation, but the first control device 108 may hang up. . As shown in FIG. 5, while the first control device 108 is hung up, not only the amount of power is not measured, but also the second control device 207 cannot communicate with the first control device 108.
  • the sensor values of the sensors 201 to 205 are not transmitted from the second control device 207 to the first control device 108, and the first control device 108 itself is operating normally in the first place. Therefore, the sensor log creation process by the first control device 108 is not performed. Therefore, as shown in FIG. 5, during the normal operation period of the first control device 108, the first control device 108 records the sensor log in the first storage unit 107, but the first control device 108. During the hang-up, the sensor log generation processing by the first control device 108 is not performed, and the sensor log is not recorded in the first storage unit 107.
  • the security sensor 109 since the security sensor 109 is attached to the watt-hour meter 100, the second control of the security sensor 109 is performed even while the first control device 108 is hung up due to an illegal act. Since the device 207 generates a sensor log, information (level change log while being hung up) indicating that the illegal act has been performed can be left.
  • storage part 206 during the hang-up of the 1st control apparatus 108 is sent to the 1st control apparatus 108 after the 1st control apparatus 108 returns, and memorize
  • the sensor log is analyzed for the period of the normal operation period and the hang-up period, but it is not a skilled meter reader to identify fraud from the sensor log of the period of the normal operation period and the hang-up period. Not as easy as possible. This is because (1) the sensor log is simply a history of sensor value levels, and it is difficult for meter readers unfamiliar with log analysis to specify from the sensor log to the type of fraud. (2) Normal operation This is because it is difficult for a meter reader who is unfamiliar with analysis work to identify a log suspected of fraudulent activity from the enormous log because the log of the period including the period and the hang-up period is enormous.
  • the second control device 108 when the first log processing unit 113 of the first control device 108 returns to the normal operation state from the abnormal state (for example, hang-up) in which the first control device 108 cannot operate normally, the second control device 108 The sensor log during the abnormal state period is acquired from 207, and an action estimation log generation process for generating an action estimation log indicating the type of fraud estimated from the sensor log is executed.
  • the first log processing unit 113 transmits a log collection request to the second control device 207 when returning from the abnormal state where the normal operation cannot be performed to the normal operation state.
  • the second control device 207 collects the sensor log whose recording time is between the start time and the end time of the communication disabled period, and transmits the collected sensor log to the first control device 108. That is, the second control device 207 transmits the sensor log during the communication disabled period to the first control device 108 as the sensor log during the abnormal state.
  • the first log processing unit 113 of the first control device 108 generates a behavior estimation log based on the sensor log sent from the first control device 108, and stores the sensor log and the behavior estimation log in the first storage unit 107. Record.
  • the behavior estimation log is a log showing a correspondence relationship between the fraud information indicating the type of fraud estimated from the sensor log and the recording time.
  • the recording time is the recording time of the sensor log that is the basis for the estimation of fraud indicated in the fraud information associated with the recording time.
  • the sensor log of the normal period and the hang-up period and the action estimation log during the hang-up period are recorded.
  • the meter reader can periodically collect the sensor log and the action estimation log stored in the first storage unit 107. Therefore, for the meter reader, when verifying the existence and type of fraud, it is only necessary to ignore the sensor log and analyze only the behavior estimation log. Therefore, even a meter reader who is unfamiliar with the analysis work can easily perform the analysis work.
  • FIG. 7 is a diagram illustrating a sensor log recorded during the communication disabled period.
  • FIG. 8 is an explanatory diagram showing a process of generating the behavior estimation log shown in FIG. 6 from the sensor log shown in FIG.
  • FIG. 9 is a schematic diagram illustrating a correction table used in the behavior estimation log generation process.
  • FIG. 10 is a schematic diagram showing first to fourth behavior estimation tables used in the behavior estimation log generation process.
  • the communication control unit 302 monitors the communication state of the first control device 108. Specifically, when a communication disabled period occurs between the first control device 108 and the second control device 207, the communication control unit 302 detects the start time and end time (return time) of the communication disabled period. It has become.
  • the second log processing unit 303 of the second control device 207 uses the sensor log recorded in the past communication disabled period in the second storage unit 206. Thus, a sensor log that has not been transmitted to the first control device 108 is searched and collected.
  • Whether the sensor log belongs to the past communication disabled period can be determined from the sensor log recording time and the past communication disabled period (at the start and end).
  • whether or not the sensor log has not been transmitted to the first control device 108 can be determined, for example, by adding a flag indicating transmission to the transmitted sensor log. Further, if the transmitted sensor log is deleted from the second storage unit 206, the past communication is impossible only by determining the presence or absence of the sensor log in the past communication disabled period stored in the second storage unit 206. The presence / absence of a sensor log that has been recorded during the period and has not been transmitted to the first control device 108 is determined.
  • the second log processing unit 303 collects sensor logs that have been recorded in the past communication disabled period and have not been transmitted to the first control device 108, and the collected sensor logs are subjected to the first control via the communication control unit 302. To device 108.
  • the second log processing unit 303 collects the sensor logs belonging to the communication disabled period from the sensor logs generated for each of the five sensors 201 to 205, and the first control apparatus 108 The sensor log belonging to is received.
  • FIG. 7 shows sensor logs belonging to a certain communication disabled period collected by the second log processing unit 303.
  • the collected sensor logs (sensor logs belonging to the communication disabled period) are not classified according to the type of sensor indicated in the level information, but are arranged regardless of the type of sensor. However, the recording times are sorted in order from the past.
  • “Lv1” indicates level 1 and “Lv2” indicates level 2.
  • “RadioWave” indicates the radio wave sensor 201
  • “ESD Surge” indicates the electrostatic sensor 202
  • “Magnet” indicates the magnetic sensor 203
  • “Acceleration” indicates the acceleration sensor 204.
  • the action estimation log generation process includes a noise removal process, a correction process, and a conversion process shown in FIG.
  • the noise removal process will be described.
  • the first log processing unit 113 sets the highest level for each sensor type indicated in the level information among the sensor logs of the communication disabled period.
  • the noise removal process is performed to leave the other sensor logs and delete (exclude) other sensor logs (see FIG. 8).
  • FIG. 8A is a schematic diagram in which the sensor logs (sensor logs belonging to a certain communication disabled period) A to L shown in FIG. 7 are arranged along the time axis of the recording time.
  • FIG. 8B shows that the sensor logs B, C, E, G, H, K, and L remain after the noise removal processing is performed on the sensor logs A to L shown in FIG. FIG.
  • “Acc” is an abbreviation for “Acceleration”
  • Magn is an abbreviation for “Magnet”
  • “Rad” is an abbreviation for “RadioWave”
  • “Sur” is “ESD Surge”. Is an abbreviation.
  • the highest level sensor log is left for each type of sensor indicated in the level information. Erased (excluded).
  • This noise removal process is a measure for compressing and compacting the action estimation log that is finally generated by deleting in advance the sensor log that is considered to be noise (that is, the sensor log that is not related to fraud). .
  • the first log processing unit 113 performs a correction process using the correction table of FIG. 9 after the noise removal process shown in FIG. Hereinafter, the correction process will be described.
  • the level change of the sensor value of the radio wave sensor 201 indicates radio wave emission
  • the level change of the sensor value of the electrostatic sensor 202 indicates ESD.
  • the time of the sensor value level change of the radio wave sensor 201 is very close to the time of the sensor value level change of the electrostatic sensor 202 and the level of the sensor value after the change is the same, rather than radio wave emission or ESD. High possibility of jamming emission.
  • the time of the level change of the radio wave sensor 201 and the time of the level change of the electrostatic sensor 202 are very close and the sensor value level of one sensor is different from the sensor value level of the other sensor, the higher level Although the sensor value is highly accurate, the sensor value with the lower level is likely to be noise.
  • the correction table shown in FIG. 9 is stored in the first storage unit 107 in advance, and the first log processing unit 113 performs the correction process using the correction table.
  • the correction table is a table showing the correspondence between the correction target sensor log pair and the corrected sensor log.
  • the correction target sensor log is shown as a pair, while the corrected sensor log is shown as a single, but this is corrected to a single corrected sensor log. It means that.
  • row 401 in FIG. 9 indicates that the pair of “Sur Lv2” and “RadvLv2” is corrected to “JamvLv1”, and the single “Sur Lv2” is corrected to “Jam Lv1”. It does not indicate that “Rad“ Lv2 ”alone is corrected to“ Jam Lv1 ”. Also, for example, row 402 in FIG. 9 indicates that the pair of “Sur Lv1” and “Rad Lv2” is corrected to “Rad Lv2”, and the single “Sur Lv1” is changed to “Rad Lv2”. It does not indicate that it is corrected, and it does not indicate that a single “Rad Lv2” is corrected to “Rad Lv2”.
  • Jam is a symbol indicating an interference wave. That is, “Jam Lv1” or “Jam Lv2” shown in FIG. 9 in the sensor log indicates not the type of sensor but the content of fraud (disturbance wave is emitted to the watt-hour meter 100).
  • the first control device 108 hangs up as in the case of electromagnetic wave emission and electrostatic discharge).
  • the conditions for establishing a pair of correction target sensor logs in each row of the correction table of FIG. 9 are as follows. On the time axis of the recording time in FIG. 8B, the left log of the correction target sensor log pairs in each row of the correction table of FIG. 9 is located at a point in time earlier than the right log, and both logs are adjacent to each other. It is a condition that the difference between the recording times of both logs is within a first predetermined time (for example, within 1 sec or 500 msec).
  • the first log processing unit 113 searches for a pair of correction target sensor logs shown in the correction table in FIG. 9 from all the sensor logs arranged on the time axis shown in FIG. 8B. When the same pair as the pair shown in FIG. 9 is extracted, the first log processing unit 113 corrects the pair to the corrected sensor log associated with the pair in the correction table.
  • the sensor log shown in (b) of FIG. 8 is corrected to the sensor log shown in (c) of FIG. 8 by performing a correction process using the correction table of FIG. That is, the pair of the sensor log indicated by reference sign G and the sensor log indicated by reference sign H is corrected to the sensor log indicated by reference sign H1.
  • the recording time is processed with priority from the past.
  • the first sensor log, the second sensor log, and the third sensor log are arranged on the time axis of the recording time shown in FIG. 8B, and the recording time is selected from the first to third sensor logs. Is the first sensor log, the second is the second sensor log, and the third sensor log is closest to the current time.
  • the first sensor log and the second sensor log satisfy the condition of the correction target sensor log pair shown in the correction table of FIG. 9, and the second sensor log and the third sensor log are corrected in FIG.
  • the pair is formed with the recording time prioritized from the past. That is, the first sensor log and the second sensor log are preferentially handled as a pair, and the second sensor log and the third sensor log are not handled as a pair.
  • the first sensor log, the second sensor log, the third sensor log, and the fourth sensor log are arranged on the time axis of the recording time in FIG.
  • the one with the oldest recording time is the first sensor log
  • the next past is the second sensor log
  • the next past is the third sensor log
  • the fourth sensor log is Assume the situation that is closest to the present time.
  • the first sensor log and the second sensor log satisfy the conditions of the correction target sensor log pair shown in the correction table of FIG. 9, and the second sensor log and the third sensor log are in the correction table of FIG.
  • the correction target sensor log pair condition shown is satisfied and the third sensor log and the fourth sensor log correspond to the correction target sensor log pair shown in the correction table of FIG.
  • the recording time is given priority from the past.
  • a pair is formed. That is, the first sensor log and the second sensor log are preferentially handled as a pair, and the second sensor log and the third sensor log are not handled as a pair.
  • the third sensor log forms a pair with the fourth sensor log.
  • the first log processing unit 113 performs the conversion process using the four behavior estimation tables shown in FIG. 10 after the correction process shown in FIG. Hereinafter, the conversion process will be described.
  • the fraud information in FIG. 10 indicates the fraud and the level indicating the accuracy of the fraud.
  • the fraud information “Impulse wave emission after impact is applied Lv4” is shown. Indicates fraud, and “Lv4” indicates accuracy. The higher the level, the higher the accuracy.
  • each behavior estimation table shown in FIG. The first log processing unit 113 converts the sensor log into the behavior estimation log shown in FIG. 6 using the correspondence relationship between the sensor log pattern and the fraud information shown in each behavior estimation table. A conversion process is performed.
  • each behavior estimation table in FIG. 10 will be described.
  • a row in which a sensor log pair is shown as a sensor log pattern indicates that the pair is converted into fraud information.
  • row 501 of the first behavior estimation table shown in FIG. 10A indicates that the pair of “Acc Lv2” and “Jam Lv2” is converted to “jamming wave emission Lv4 after application of impact”. It does not indicate that a single “Acc Lv2” is converted to “jamming wave emission ⁇ ⁇ Lv4” after an impact is applied, but a single “Jam Lv2” is “jamming wave emission Lv4” after an impact is applied. It is not shown that it is converted to.
  • each behavior estimation table in FIG. 10 the row in which the sensor log is shown alone as the sensor log pattern indicates that the single sensor log is converted into fraud information.
  • the row 502 of the first behavior estimation table in FIG. 10A shows that “Jam Lv2” is converted to “jamming wave emission Lv2”.
  • the sensor log in which “Jam” is shown indicates an illegal act instead of the type of sensor (“Jam” indicates the meaning of the jamming wave). That is, the rows 502 and 503 of the first behavior estimation table in FIG. 10A are merely converted from information indicating fraud to information indicating the same fraud, and the level value itself also changes. As a result, the actual contents are not converted. However, for other lines, the sensor log pattern indicating the sensor type has been converted into fraud information, or the sensor log indicating the sensor type and the sensor log indicating the fraud (Jam) Since the pair is converted into fraudulent information, it is accompanied by substantial conversion of contents.
  • the conditions for establishing a pair of sensor logs shown in each row of each behavior estimation table in FIG. 10 are as follows. On the time axis of the recording time in FIG. 8C, the left log of the pair of sensor logs shown in each row of each action designation table in FIG. The condition is that they are adjacent to each other and the difference between the recording times of both logs is within a second predetermined time (for example, within 15 minutes). Note that the second predetermined time is set longer than the first predetermined time (for example, 1 sec or 500 msec) which is a condition for establishing a pair shown in the correction table of FIG.
  • the first predetermined time is a time set for detecting a situation in which the radio wave sensor 201 and the electrostatic sensor 202 are changing levels almost simultaneously, whereas the second predetermined time is determined by the same unauthorized person. This is because the time is set for detecting a series of frauds (for example, an act of emitting radio waves after applying an impact with a drill).
  • the first to fourth behavior estimation tables are prepared, but the conversion process is not performed using all the behavior estimation tables at the same time. They will be used in order.
  • the highest priority is the first behavior estimation table in FIG. 10A
  • the second highest priority is the second behavior estimation table in FIG.
  • the third action estimation table in FIG. 10C has a higher priority
  • the fourth action estimation table in FIG. 10D has the lowest priority.
  • the first log processing unit 113 first selects the first behavior estimation table from the first to fourth behavior estimation tables, and performs processing for converting the sensor log into fraudulent information. Specifically, the pattern shown in the first behavior estimation table in FIG. 10A is searched from all the sensor logs arranged on the time axis shown in FIG. When the pattern shown in the behavior estimation table in FIG. 10A is extracted, the first log processing unit 113 identifies the pattern as the fraud information associated with the pattern in the first behavior estimation table. Convert to
  • the first log processing unit 113 performs the same processing as the processing by the first behavior estimation table using the second behavior estimation table after finishing the processing by the first behavior estimation table as described above. . Moreover, after finishing the process by the 2nd action estimation table, the 1st log process part 113 performs the process similar to the process by the 1st action estimation table using a 3rd action estimation log. Furthermore, after finishing the process by the 3rd action estimation table, the 1st log process part 113 performs the process similar to the process by the 1st action estimation table using a 4th action estimation log.
  • each sensor log shown in (c) of FIG. 8 is converted into each fraud information as shown in (d) of FIG. become.
  • the pair of the sensor log indicated by reference sign B and the sensor log indicated by reference sign C is converted into fraud information indicated by reference sign B1
  • the pair of the sensor log indicated by reference sign E and the sensor log indicated by reference sign H1 is
  • the sensor log indicated by reference sign K1 is converted into the fraud information shown by reference numeral L1
  • the sensor log indicated by reference sign K1 is converted by the cheating information indicated by reference sign L1.
  • the first log processing unit 113 generates, as an action estimation log, a log indicating the correspondence between the fraud information generated in this way and the recording time indicated in the sensor log corresponding to the fraud information.
  • FIG. 6 is an action estimation log created from the fraud information of FIG.
  • the first log processing unit 113 uses the sensor log of the communication disabled period received from the second control device 207 and the behavior estimation log generated from the sensor log as the first. Save in the storage unit 107.
  • FIG. 11 is a flowchart showing the flow of processing of the second control device 207.
  • FIG. 12 is a flowchart showing a process flow of the first control device 108.
  • FIG. 13 is a flowchart of the subroutine of the initialization process in S952 of FIG.
  • FIG. 13 is also a subroutine of the initialization process in S904 of FIG.
  • FIG. 14A shows the first half of the flowchart showing the subroutine of the sensor log generation process of S955 of FIG.
  • FIG. 14B shows the latter half of the flowchart showing the subroutine of the sensor log generation process in S955 of FIG. 14A and 14B are also a subroutine of the sensor log generation process of S906 in FIG.
  • FIG. 15 is a flowchart showing a subroutine of action estimation log generation processing in S903 of FIG.
  • FIG. 11 shows the processing of the second control device 207.
  • the second control device 207 first performs an initialization process (S952).
  • the initialization process subroutine (FIG. 13) will be described later.
  • the second control device 207 acquires sensor values from each of the radio wave sensor 201, the electrostatic sensor 202, the magnetic sensor 203, the acceleration sensor 204, and the temperature sensor 205 (S953). Subsequently, the second control device 207 transmits the sensor values of the sensors 201 to 205 acquired in S953 to the first control device 108 (S954).
  • the second control device 207 performs a sensor log generation process based on the sensor value acquired in S953 (S955).
  • the sensor log generation processing subroutine (FIGS. 14A and 14B) will be described later.
  • the second control device 207 determines whether a log request command has been received from the first control device 108 (S956). If a log request command has not been received from first control device 108 (NO in S956), second control device 207 proceeds to S953 and repeats the processing from S953 onward.
  • second control device 207 is a sensor log that has been recorded during the communication disabled period and has not been transmitted to first control device 108. Is determined (S957). Although not shown in FIG. 11, the second control device 207 detects the start time and end time of the communication disabled period when a communication disabled period occurs with the first control device 108. Therefore, the communication disabled period can be recognized. Then, the second control device 207 determines whether there is a sensor log that has been recorded during the communication disabled period and has not been transmitted to the first control device 108.
  • the second control device 207 stores the sensor log recorded during the communication disabled period in the second storage unit 206. By simply searching, it is possible to determine whether there is a sensor log that has been recorded during the communication disabled period and has not been transmitted to the first control device 108. Further, even if the sensor log transmitted to the first control device 108 is continuously stored in the second storage unit 206, the second control device 207 can be provided by adding a flag indicating that the sensor log has already been transmitted to the transmitted sensor log. Can be determined whether there is a sensor log recorded during the communication disabled period and not transmitted to the first control device 108.
  • the second control device 207 is a sensor log recorded during the communication disabled period and there is no sensor log that has not been transmitted to the first control device 108 (NO in S957), the second control device 207 proceeds to S953, and the processing after S953 repeat.
  • the second control device 207 stores the sensor log in the first control device. 108 (S958), the process proceeds to S953, and the processes after S953 are repeated.
  • the second control device 207 that has received the log request command is a sensor log generated during the communication disabled period and there is a sensor log that has not been transmitted to the first control device 108
  • the second control device 207 sends the sensor log to the first control device 108. It is supposed to send.
  • the first control device 108 skips S903 and shifts the processing to S904 when there is no sensor log that has not been transmitted to the first control device 108 (NO in S902).
  • the first control device 108 performs an initialization process in S904.
  • the initialization process subroutine (FIG. 13) will be described later.
  • the first controller 108 acquires the sensor values of the radio wave sensor 201, the electrostatic sensor 202, the magnetic sensor 203, the acceleration sensor 204, and the temperature sensor 205 from the second controller 207 (S905). Subsequently, the first control device 108 performs sensor log generation processing based on the sensor value acquired in S905 (S906), and repeats S905 and S906.
  • the sensor log generation process subroutine (FIGS. 14A and 14B) will be described later.
  • FIG. 13 will be described as the subroutine of S952 in FIG. 11, the operating subject of the process is the second control device 207, but when the subroutine of S904 in FIG.
  • the first control unit 108 uses the first storage unit 107 as an information storage destination.
  • the second control device 207 sets two threshold values (threshold value 1 and threshold value 2) for each of the sensors 201 to 205 (S21 to S25).
  • Rad_Th1 is the threshold value 1 of the radio wave sensor 201
  • Rad_Th2 is the threshold value 2 of the radio wave sensor 201.
  • Sur_Th 1 is the threshold value 1 of the electrostatic sensor 202
  • Sur_Th 2 is the threshold value 2 of the electrostatic sensor 202.
  • Mag_Th1 is the threshold value 1 of the magnetic sensor 203
  • Mag_Th2 is the threshold value 2 of the magnetic sensor 203.
  • Acc_Th1 is the threshold value 1 of the acceleration sensor 204
  • Acc_Th2 is the threshold value 2 of the acceleration sensor 204
  • Tem_Th1 is the threshold value 1 of the temperature sensor 205
  • Tem_Th2 is the threshold value 2 of the temperature sensor 205.
  • the second control device 207 resets the sensor value level to zero for each of the sensors 201 to 205 (S26 to S30).
  • Rad_Dtct of S26 is the level of the radio wave sensor 201
  • Sur_Dtct of S27 is the level of the electrostatic sensor 202
  • Mag_Dtct of S28 is the level of the magnetic sensor 203
  • Acc_Dtct of S29 is the level of the acceleration sensor 204
  • Tem_Dtct in S30 is the level of the temperature sensor 205.
  • the second control device 207 resets the level to zero for each of the sensors 201 to 205 and displays the level 0 level information in S26 to S30. Is stored in the second storage unit 206. By the end of S30 in FIG. 13, the initialization process in FIG. 13 ends.
  • FIGS. 14A and 14B a flowchart of sensor processing shown in FIGS. 14A and 14B will be described.
  • the operating entity of the process is the second control device 207, but when the subroutine of S906 in FIG.
  • the first control unit 108 uses the first storage unit 107 as an information storage destination.
  • sensor log generation processing of the radio wave sensor 201 is performed (S101 to S111), then sensor log generation processing of the electrostatic sensor 202 is performed (S201 to S211), and then the magnetic sensor 203.
  • Sensor log generation processing is performed (S301 to S311), then the sensor log generation processing of the acceleration sensor 204 is performed (S401 to S411), and finally the sensor log generation processing of the temperature sensor 205 is performed (S501 to S511). ) Is performed.
  • sensor log processing (S101 to S111) of the radio wave sensor 201 sensor log generation processing (S201 to S211) of the electrostatic sensor 202, sensor log generation processing (S301 to S311) of the magnetic sensor 203, and sensor log generation of the acceleration sensor 204
  • the processing (S401 to S411) and the sensor log generation processing (S501 to S511) of the temperature sensor 205 are the same as each other, except that the processing target sensor and the threshold used are different. Therefore, hereinafter, sensor log generation processing (S101 to S111) of the radio wave sensor 201 will be described, and description of sensor log generation processing of other sensors will be omitted.
  • the second control device 207 determines whether or not the sensor value of the radio wave sensor 201 acquired in S953 in FIG. 11 exceeds the threshold 2 (S101). If the threshold value 2 is exceeded (YES in S101), it is determined whether the sensor value level has changed (S103). In S103, since the level when the threshold value 2 is exceeded is 2, the level change is determined by determining whether the current radio wave sensor level (Rad_Dtct) is not level 2. ing.
  • the second control device 207 When determining that the level has not changed in S103, the second control device 207 ends the sensor log generation processing of the radio wave sensor 201, and proceeds to the sensor log generation processing of the electrostatic sensor 202 after S201 (NO in S103). ). On the other hand, when determining that the level has changed in S103 (YES in S103), the second control device 207 records a sensor log indicating that the processing target is the radio wave sensor 201 and is level 2. (S106). The sensor log also shows the recording time.
  • FIG. 4B is a sensor log of the radio wave sensor 201.
  • the second control device 207 sets the level (Rad_Dtct) of the radio wave sensor 201 to level 2 (S109), ends the sensor log generation processing of the radio wave sensor 201, and the sensor log of the electrostatic sensor 202 after S201. Transition to generation processing.
  • the second control device 207 determines whether the sensor value of the radio wave sensor 201 exceeds the threshold value 1 (S102). ). If threshold value 1 is exceeded (YES in S102), second control device 207 determines whether the level of the sensor value has changed (S104).
  • the second control device 207 ends the sensor log generation process of the radio wave sensor 201 and proceeds to the sensor log generation process of the electrostatic sensor 202 after S201. To do.
  • the second control device 207 records a sensor log indicating that the processing target is the radio wave sensor 201 and is level 1. (S107).
  • the second control device 207 sets the level (Rad_Dtct) of the radio wave sensor 201 to level 1 (S110), ends the sensor log generation processing of the radio wave sensor 201, and the sensor log of the electrostatic sensor 202 after S201. Transition to generation processing.
  • the second control device 207 determines whether the level of the sensor value has changed (S105).
  • the second control device 207 ends the sensor log generation process of the radio wave sensor 201 and proceeds to the sensor log generation process of the electrostatic sensor 202 after S201. To do.
  • the second control device 207 records a sensor log indicating that the processing target is the radio wave sensor 201 and is level 0. (S108).
  • the second control device 207 sets the level (Rad_Dtct) of the radio wave sensor 201 to level 0 (S111), ends the sensor log generation processing of the radio wave sensor 201, and the sensor log of the electrostatic sensor 202 after S201. Transition to generation processing.
  • S101 to S111 are sensor log processing of the radio wave sensor 201.
  • sensor log generation processing (S201 to S211) of the electrostatic sensor 202 is performed after the sensor log processing of the radio wave sensor 201, but the parameters (sensor value, threshold value, level, etc.) used are merely replaced with those of the electrostatic sensor 202.
  • the processing contents are the same for the sensor log processing of the radio wave sensor 201 and the sensor log processing of the electrostatic sensor 202. That is, S201 to S211 are the same processes as S101 to S111, respectively.
  • the sensor log generation process (S301 to S311) of the magnetic sensor 203, the sensor log generation process (S401 to S411) of the acceleration sensor, and the sensor log generation process (S501 to S511) of the temperature sensor are also used for each sensor.
  • the processing content itself is the same as the sensor log processing of the radio wave sensor 201 only by replacing it. That is, S301 to S311 are processes similar to S101 to S111, S401 to S411 are processes similar to S101 to S111, and S501 to S511 are processes similar to S101 to S111, respectively. It is.
  • the action designation log generation processing in FIG. 15 is a subroutine of S903 in FIG.
  • the first control device 108 performs a noise removal process that leaves the highest level sensor log for each of the sensors 201 to 205 among the sensor logs during the communication disabled period, as shown in FIG. Subsequently, in S702, the first control device 108 performs a correction process of correcting the sensor log using a correction table (see FIG. 9) as shown in FIG.
  • the first control device 108 performs a conversion process of converting the sensor log into fraud information using the first behavior estimation table of FIG. 10A, and in S704, the first control device 108. Performs a conversion step of converting the sensor log into the fraud information using the second behavior estimation table of FIG. 10B, and in S705, the first control device 108 performs the third process of FIG. In step S706, the first controller 108 uses the fourth behavior estimation table in (d) of FIG. 10 to convert the sensor log into the fraudulent act. A conversion process for converting to information is performed.
  • the first control device 108 generates, as an action estimation log, a log indicating the correspondence between the fraud information obtained in this way and the recording time indicated in the sensor log corresponding to the fraud information,
  • the sensor log during the communication disabled period and the action estimation log are stored in the first storage unit 107 (S707).
  • the first control device 108 acquires the sensor log during the abnormal state from the second control device 207 when returning from the abnormal state where the normal operation cannot be performed to the normal operation state.
  • the behavior estimation log indicating the type of fraud estimated from the sensor log is generated.
  • the meter reader need only analyze the behavior estimation log ignoring the sensor log when verifying the presence and type of fraud, and the behavior estimation log indicates the type of fraud. Even an inexperienced meter reader can easily perform analysis work.
  • the second control device 207 transmits the sensor log during the communication disabled period with the first control device 108 as the sensor log during the abnormal state.
  • an action estimation log indicating a series of fraudulent acts by the same unauthorized person is generated from sensor values of different sensor pairs (FIG. 10).
  • an action estimation log indicating an illegal act such as “radiation of radio waves after applying an impact” can be generated from the sensor value of the acceleration sensor 204 and the sensor value of the radio wave sensor 201. It is possible to increase the types (variations) of possible misconduct.
  • the sensor value level is shown as output information indicating the height of the sensor value, but instead of the sensor value level as the output information.
  • the sensor value itself may be indicated. However, in this case, it is necessary to appropriately modify each table so that the tables of FIGS. 9 and 10 can be used even with sensor values.
  • the sensor value level is shown, but the sensor value itself is not shown.
  • the sensor value is included in addition to the level. Also good.
  • the sensor value of the radio wave sensor 201 is included in addition to the recording time and level information shown in FIG. 4B, and the sensor values of the sensors 202 to 204 are also included. It may be included in the sensor log of the radio wave sensor 201 (that is, the sensor log of the sensor whose level has changed includes not only the sensor value of the sensor but also the sensor values of other sensors).
  • the sensor value included in the sensor log may be the value acquired in S953, or when it is determined that the level has changed (S103 to S105, S203 to S205, S303 to S305, S403 to S405, S503 to S505).
  • the value may be newly acquired from each of the sensors 201 to 205.
  • the watt-hour meter of the embodiment described above includes a first control device that transmits and receives signals to and from the display unit for outputting power and an external communication port, and measures the power, and at least a radio wave sensor. And a plurality of sensors including electrostatic sensors, and a detection device having a second control device that is a circuit board different from the first control device and transmits and receives signals to and from the first control device, The second control device performs a sensor log generation process for generating a sensor log indicating a history of output information indicating the height of an output value for each of the plurality of sensors, and the first control device is in an abnormal state where normal operation cannot be performed. When the state returns to the normal operation state, the sensor log during the abnormal state is acquired from the second control device, and the behavior estimation indicating the type of fraud estimated from the sensor log is obtained. And executes an action estimate log generation process for generating a log.
  • the first control device transmits and receives signals to and from the display unit or the external communication port, but the second control device transmits and receives signals to and from the display unit or the external communication port. Since transmission / reception is not performed, the second control device is more resistant to radio wave emission or electrostatic discharge than at least the first control device. Therefore, even if radio wave emission or electrostatic discharge is performed on the watt hour meter and the first control device hangs up, the hang up to the second control device is suppressed. Therefore, since the second control device can generate the sensor log while the first control device is hung up due to fraud due to radio wave emission or electrostatic discharge, it is possible to leave a trace of fraud due to radio wave emission or electrostatic discharge. The first effect is that the fraud can be detected.
  • the sensor log is generated not only while the first control device is hung up but also during normal operation. It is not easy to identify the person unless it is a skilled meter reader (log analyst). This is because (1) the sensor log is simply a history of output information (for example, the level of the output value) indicating the height of the sensor output value. It is difficult to identify, and (2) the log of the period of the normal operation period and the hang-up period is enormous, so it is important to identify the suspected fraud log from this enormous log This is because it is difficult for a meter reader who is unfamiliar with the analysis work.
  • the first control device when the first control device returns from the abnormal state in which the normal operation cannot be performed to the normal operation state, the first control device acquires the sensor log during the abnormal state from the second control device, and An action estimation log indicating the type of fraud estimated from the sensor log is generated.
  • the meter reader need only analyze the behavior estimation log ignoring the sensor log when verifying the presence and type of fraud, and the behavior estimation log indicates the type of fraud.
  • the second effect is that even an inexperienced meter reader can easily perform the analysis work.
  • the second control device transmits a sensor log during a period during which communication with the first control device is disabled as a sensor log during the abnormal state. Also good.
  • the plurality of sensors may include a magnetic sensor, an acceleration sensor, and a temperature sensor.
  • the first control device may generate an action estimation log indicating a series of fraudulent acts by the same fraudster from output values of different sensor pairs. Good.
  • an action estimation log indicating an illegal act such as “radio wave emission after applying an impact” can be generated from the sensor value of the acceleration sensor and the sensor value of the radio wave sensor.
  • the types of possible misconduct (variations) can be increased.
  • the present invention can be used for a watt-hour meter that measures the amount of power in a digital manner.
  • Electricity meter 104
  • Display unit 105
  • External communication unit external communication port
  • First control device 108
  • Security sensor detection device
  • Radio wave sensor 202
  • Electrostatic sensor 203
  • Magnetic sensor 204
  • Acceleration sensor 205
  • Temperature sensor 207 Second controller

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Arrangements For Transmission Of Measured Signals (AREA)

Abstract

L'invention concerne un mesureur de puissance (100) pourvu d'un premier dispositif de commande (108), qui effectue la transmission et la réception de signaux avec une unité d'affichage (104) et une unité de communication externe (105), ainsi qu'un capteur de sécurité (109). Un second dispositif de commande (207) du capteur de sécurité (109) génère un journal de capteur montrant un historique du niveau de valeur de sortie pour une pluralité de capteurs (201 à 205). Le premier dispositif de commande (108), dès le retour à un état de fonctionnement normal à partir d'un état anormal dans lequel un fonctionnement normal est impossible, acquiert le journal de capteur pour la période de l'état anormal à partir du second dispositif de commande (207), et génère un journal d'estimation d'action indiquant un type d'activité frauduleuse estimée à partir dudit journal de capteur.
PCT/JP2015/056859 2015-03-09 2015-03-09 Mesureur de puissance WO2016143042A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/JP2015/056859 WO2016143042A1 (fr) 2015-03-09 2015-03-09 Mesureur de puissance

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/JP2015/056859 WO2016143042A1 (fr) 2015-03-09 2015-03-09 Mesureur de puissance

Publications (1)

Publication Number Publication Date
WO2016143042A1 true WO2016143042A1 (fr) 2016-09-15

Family

ID=56878678

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2015/056859 WO2016143042A1 (fr) 2015-03-09 2015-03-09 Mesureur de puissance

Country Status (1)

Country Link
WO (1) WO2016143042A1 (fr)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH0635737A (ja) * 1992-07-15 1994-02-10 Matsushita Electric Works Ltd 自動障害復旧方式
JPH06229802A (ja) * 1993-02-02 1994-08-19 Toshiba Corp 自動遮断機能付ガスメータ
WO1996030774A1 (fr) * 1995-03-27 1996-10-03 Hitachi Electronics Services Co., Ltd. Dispositif d'enregistrement et de detection de bruit
JP2001028093A (ja) * 1999-07-15 2001-01-30 Shikoku Electric Power Co Inc 電力量計
JP2007041000A (ja) * 2005-08-02 2007-02-15 General Electric Co <Ge> 無人のメータにおいて過渡条件をレポートするシステム、方法、および装置
JP2010054285A (ja) * 2008-08-27 2010-03-11 Toshiba Corp 電力量計
JP2012108128A (ja) * 2010-11-18 2012-06-07 General Electric Co <Ge> メータの磁気改ざん検出のための方法、デバイス及びコンピュータプログラム成果物

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH0635737A (ja) * 1992-07-15 1994-02-10 Matsushita Electric Works Ltd 自動障害復旧方式
JPH06229802A (ja) * 1993-02-02 1994-08-19 Toshiba Corp 自動遮断機能付ガスメータ
WO1996030774A1 (fr) * 1995-03-27 1996-10-03 Hitachi Electronics Services Co., Ltd. Dispositif d'enregistrement et de detection de bruit
JP2001028093A (ja) * 1999-07-15 2001-01-30 Shikoku Electric Power Co Inc 電力量計
JP2007041000A (ja) * 2005-08-02 2007-02-15 General Electric Co <Ge> 無人のメータにおいて過渡条件をレポートするシステム、方法、および装置
JP2010054285A (ja) * 2008-08-27 2010-03-11 Toshiba Corp 電力量計
JP2012108128A (ja) * 2010-11-18 2012-06-07 General Electric Co <Ge> メータの磁気改ざん検出のための方法、デバイス及びコンピュータプログラム成果物

Similar Documents

Publication Publication Date Title
US9798428B2 (en) Touch detecting method, touch detecting system and touch terminal for touch sensor
CN104021601B (zh) 基于三轴加速度传感器的汽车碰撞检测方法和装置
US7030746B2 (en) Method and system for generating automatic alarms based on trends detected in machine operation
JP6365405B2 (ja) 電力量演算システム
CN105354912B (zh) 一种检测纸币的方法及装置
EP2172824B1 (fr) Procédé et système de surveillance de l&#39;état d&#39;une éolienne
CN1982848A (zh) 一种基于传感器的信息检测控制装置及其检测方法
CN108881326A (zh) 确定网络流量异常行为的方法、系统、介质及设备
JP5933386B2 (ja) データ管理装置及びプログラム
CN106226724A (zh) 一种电能表时钟异常检测方法
CN103454342A (zh) 一种克服绝对涡流检测探头温度漂移的技术方法
WO2016143043A1 (fr) Dispositif de détection et mesureur de puissance
US20140058615A1 (en) Fleet anomaly detection system and method
CN104457911A (zh) 一种液位检测系统及液位检测方法
US9436188B2 (en) Systems and methods for detecting compressor surge
CN103493321A (zh) 用于产生故障信号的方法
CN105630657A (zh) 一种温度检测方法及装置
WO2018142996A1 (fr) Dispositif sismique et dispositif de sécurité utilisant ce dernier
WO2016143042A1 (fr) Mesureur de puissance
US20210116423A1 (en) Particle filter monitoring
CN203688490U (zh) 腐蚀气体探测装置和计算机
US20150285847A1 (en) Method and data processing arrangement for determining the frequency, amplitude and attenuation of at least one output oscillation in an electrical energy supply network
JP4998706B2 (ja) 変圧器の内部異常診断方法
CN109686397A (zh) 具有自检功能的存储器及其检测方法
CN110134570A (zh) 一种服务器及其震荡保护装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15884538

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

NENP Non-entry into the national phase

Ref country code: JP

122 Ep: pct application non-entry in european phase

Ref document number: 15884538

Country of ref document: EP

Kind code of ref document: A1