WO2015003512A1 - 集中器、电表及其消息处理方法 - Google Patents

集中器、电表及其消息处理方法 Download PDF

Info

Publication number
WO2015003512A1
WO2015003512A1 PCT/CN2014/074554 CN2014074554W WO2015003512A1 WO 2015003512 A1 WO2015003512 A1 WO 2015003512A1 CN 2014074554 W CN2014074554 W CN 2014074554W WO 2015003512 A1 WO2015003512 A1 WO 2015003512A1
Authority
WO
WIPO (PCT)
Prior art keywords
message
module
information
concentrator
meter
Prior art date
Application number
PCT/CN2014/074554
Other languages
English (en)
French (fr)
Inventor
万邦睿
蒲莉红
胖志南
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2015003512A1 publication Critical patent/WO2015003512A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01RMEASURING ELECTRIC VARIABLES; MEASURING MAGNETIC VARIABLES
    • G01R22/00Arrangements for measuring time integral of electric power or current, e.g. electricity meters
    • G01R22/06Arrangements for measuring time integral of electric power or current, e.g. electricity meters by electronic methods
    • G01R22/061Details of electronic electricity meters
    • G01R22/066Arrangements for avoiding or indicating fraudulent use
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords

Definitions

  • the present invention relates to the field of smart grids, and in particular, to a concentrator, an electric meter, and a message processing method thereof.
  • BACKGROUND With the popularization of smart grids and the use of more smart meters, smart meter reading in the future will inevitably replace the traditional method of manual meter reading, achieving efficient information collection and centralized management of electricity information, etc.
  • all the main stations are connected to the concentrator, the concentrator is connected to the electric meter, and the electric meter is connected with the electric terminal.
  • the concentrator and the electric meter transmit information through the grid protocol. This way of transmitting information through the network is in the process of information transmission.
  • the existing meter reading system as shown in FIG. 1, mainly includes: a concentrator and an electric meter.
  • the concentrator and the meter can be connected by wire or wirelessly.
  • the concentrator can send configuration parameters, control commands and other information to the meter, and can receive the power information reported by the meter.
  • the existing system has the following deficiencies and limitations: It does not support flexible and dynamic configuration information transmission methods, the risk of tampering is high, and the exception handling method is not flexible enough.
  • SUMMARY OF THE INVENTION The main technical problem to be solved by embodiments of the present invention is to provide a concentrator, an electric meter, and a message processing method thereof, which can improve information security of the meter reading system.
  • an embodiment of the present invention provides a message processing method of a concentrator.
  • the process of processing the message to be delivered includes: establishing a link with the electric meter, and determining whether the manner of transmitting the message is The ciphertext transmission, if yes, encrypts the message to be delivered, assembles the encrypted message, and transmits the encrypted message to the electric meter.
  • the verification bit information is generated according to the pre-configured verification bit generation mode information and the generation period information, and the verification bit information and the message to be delivered are performed. After assembly, it is transmitted to the meter.
  • the method before establishing the link with the electric meter, the method further includes: configuring parameter information related to the electric meter, the parameter information comprising: communication parameter information and transmission mode information; establishing a link with the electric meter, comprising: configuring the communication according to the configuration
  • the parameter information is linked with the corresponding electric meter.
  • the determining whether the manner of transmitting the message is ciphertext transmission comprises: determining whether the manner of transmitting the message is ciphertext transmission according to the configured transmission mode information.
  • the parameter information further includes: a base key; performing encryption processing on the to-be-sent message: performing encryption processing on the to-be-issued message according to the basic key; or according to the basis a session key for transmitting information between the key generation concentrator and the electric meter; encrypting the information to be delivered according to the session key; or when the message session key to be delivered is based on The basic key encrypts the message to be delivered; when the message to be delivered is not the session key, the session for transmitting information between the concentrator and the meter is generated according to the basic key.
  • the key is used to encrypt the information to be delivered according to the session key.
  • the parameter information further includes: verification bit generation mode information and generation cycle information; assembling the encrypted message and transmitting the data to the electricity meter comprises: generating verification according to the configured verification bit generation mode information and generation period The bit information, the verification bit information and the encrypted message are assembled, and the assembled message is transmitted to the electricity meter.
  • the process of processing the reported message includes: Receiving the message reported by the electric meter; verifying the message reported by the electric meter, if the verification is successful, determining whether the manner in which the electric meter reports the message is ciphertext transmission; if yes, decrypting the message reported by the electric meter; If the verification fails or the decryption fails, the exception is handled.
  • the parameter information further includes: an abnormality type, an abnormality threshold, and an abnormality processing manner; the step of performing the abnormality processing includes: matching the type of the current abnormal situation with the configured abnormal type, and if the matching is successful, determining Whether the sum of the number of abnormal conditions of this type is greater than the abnormal threshold. If it is greater than, the current abnormal condition is processed according to the configured exception handling mode.
  • the embodiment of the present invention further provides a message processing method for an electric meter, including: receiving a message sent by a concentrator; determining whether the message sent by the concentrator needs to be decrypted, and if so, Then, the message sent by the concentrator is decrypted, and the decrypted message is stored.
  • receiving the message delivered by the concentrator includes: receiving security policy information sent by the concentrator, where the security policy information includes a session key and verification bit information; and sending a message to the concentrator Before the decryption, the method further includes: configuring a basic key of the electric meter; performing decryption processing on the message sent by the concentrator, and storing the decrypted message comprises: performing the session key according to a basic key of the electric meter Decrypting the session key of the electric meter, and storing the session key of the electric meter; decrypting the verification bit information according to the session key of the electric meter, acquiring verification bit information of the electric meter, and storing the electric meter Verification bit information.
  • receiving the message delivered by the concentrator further includes receiving configuration parameter information sent by the concentrator, where the configuration parameter message includes communication parameter information and transmission mode information;
  • Decrypting the message sent by the concentrator, and storing the decrypted message further includes: decrypting the configuration parameter information according to the session key of the electric meter, and verifying bit information according to the electric meter after successful decryption The decrypted configuration parameter information is verified, and if the verification is successful, the decrypted configuration parameter information is stored.
  • the process of processing the report message includes: establishing a link with the concentrator according to the stored communication parameter information; acquiring a message to be reported by the electric meter, according to the stored transmission
  • the mode information determines whether the message to be reported needs to be ciphertext transmission. If yes, the message to be reported is encrypted, and the stored verification bit information and the encrypted message are assembled and transmitted to the concentrator.
  • the embodiment of the present invention further provides a concentrator, including: an information interaction module, a judgment module, an encryption module, and an assembly module; the information interaction module is configured to establish a link with the electric meter, and assemble the same.
  • the information is transmitted to the power meter; the determining module is configured to determine whether the manner of transmitting the message is ciphertext transmission; and the cryptographic module is configured to be sent when the determining module determines that the manner of transmitting the message is ciphertext transmission
  • the message is encrypted; the assembly module is configured to assemble the encrypted message.
  • the concentrator further includes: a configuration module and a security policy module; the configuration module is configured to configure verification bit generation mode information and generate cycle information to generate verification bit information; and the security policy module is configured to be configured according to the verification bit Generating mode information and generating cycle information to generate verification bit information; the assembly module is further configured to assemble the generated verification bit information and the message to be delivered when the determining module determines that the manner of transmitting the message is not ciphertext transmission It is then transmitted to the meter.
  • the configuration module is configured to configure verification bit generation mode information and generate cycle information to generate verification bit information
  • the security policy module is configured to be configured according to the verification bit Generating mode information and generating cycle information to generate verification bit information
  • the assembly module is further configured to assemble the generated verification bit information and the message to be delivered when the determining module determines that the manner of transmitting the message is not ciphertext transmission It is then transmitted to the meter.
  • the concentrator further includes: a configuration module; the configuration module is configured to configure parameter information related to the power meter, the parameter information includes: communication parameter information and transmission mode information; and the information interaction module is configured according to the configuration The communication parameter information is linked with the corresponding electric meter; the judging module is configured to determine whether the manner of transmitting the message is ciphertext transmission according to the configured transmission mode information.
  • the parameter information further includes: a base key, verification bit generation mode information, and generation period information;
  • the concentrator further includes: a security policy module;
  • the security policy module is configured to generate a concentration according to the basic key a session key for transmitting information between the device and the meter, and generating verification bit information according to the configured verification bit generation mode information and the generation period;
  • the encryption module is configured to receive the information according to the session key or the base key Performing an encryption process, or performing encryption processing on the message to be delivered according to the basic key when the message session key to be delivered is performed, according to the session when the message to be delivered is not a session key
  • the key to be sent is encrypted.
  • the assembly module is configured to assemble the verification bit information and the encrypted message.
  • the concentrator further includes: a verification module, a decryption module, and an exception policy module;
  • the information interaction module is further configured to receive a message reported by the electricity meter;
  • the verification module is configured to verify the message reported by the electricity meter;
  • the determining module is configured to: when the verification module successfully verifies the message reported by the electric meter, determine whether the manner in which the message is reported by the electric meter is ciphertext transmission; and the decrypting module is configured to: when the judging module judges that the reporting manner is Decrypting the message reported by the meter during ciphertext transmission;
  • the exception policy module is configured to perform abnormal condition processing when the verification module fails to verify or when the decryption module fails to decrypt.
  • the parameter information further includes: an abnormality type, an abnormality threshold, and an abnormality processing manner; the abnormality policy module is configured to match the type of the current abnormal situation with the configured abnormal type, and if the matching is successful, determine the type Whether the sum of the number of abnormal conditions is greater than the abnormal threshold. If it is greater than, the current abnormal condition is processed according to the configured exception handling mode.
  • the embodiment of the present invention further provides an electric meter, including: an information interaction module, a judging module, a message storage module, and a decryption module; and the information interaction module is configured to receive a message delivered by the concentrator;
  • the determining module is configured to determine whether the message sent by the concentrator needs to be decrypted;
  • the decryption module is configured to decrypt the message sent by the concentrator when the determining module determines that the decryption needs to be performed; and the message storage module is configured to store the decrypted message.
  • receiving the message delivered by the concentrator includes: receiving security policy information delivered by the concentrator, the security policy information including a session key and verification bit information; the power meter further includes a security policy module;
  • the policy module is configured to configure a base key of the electric meter, and store the session key of the electric meter and the verification bit information of the electric meter;
  • the decrypting module is configured to decrypt the session key according to the basic key of the electric meter to obtain the electric meter a session key, and decrypting the verification bit information according to the session key of the electricity meter to obtain verification bit information of the electricity meter.
  • the receiving the message sent by the concentrator further includes receiving configuration parameter information sent by the concentrator, where the configuration parameter message includes communication parameter information and transmission mode information;
  • the electric meter further includes a verification module; the decryption module Setting to decrypt the configuration parameter information according to the session key of the electric meter;
  • the verification module is configured to verify the decrypted configuration parameter information according to the verification bit information of the electric meter after the decryption module decrypts successfully If the verification is successful, the decrypted configuration parameter information is stored in the message storage module.
  • the electric meter further includes: an encryption module and an assembly module; the information interaction module is further configured to establish a link with the concentrator according to the stored communication parameter information, and send the assembled message to the concentrator;
  • the determining module is further configured to determine, according to the stored transmission mode information, whether the reported message needs to be ciphertext transmission;
  • the cryptographic module is configured to acquire a message to be reported by the electrical meter, and when the determining module determines that ciphertext transmission is required At the time, the reported message is encrypted; the assembly module is configured to assemble the stored verification bit information and the encrypted message.
  • the beneficial effects of the embodiments of the present invention are:
  • the embodiment of the present invention provides a concentrator, an electric meter, and a message processing method thereof, which can improve the information security of the meter reading system.
  • the message processing method of the concentrator of the embodiment of the present invention when the concentrator sends a message, the message to be delivered is sent.
  • the process of the present invention includes: establishing a link with the electric meter, determining whether the manner of transmitting the message is ciphertext transmission, and if so, encrypting the message to be delivered, and assembling the encrypted message to the electric meter;
  • the message processing method of the example can encrypt the sent message, improve the security of the message sent by the concentrator, and prevent the information sent by the concentrator and the information reported by the meter from being stolen or tampering.
  • FIG. 2 is a schematic flowchart of a message processing method of a concentrator according to Embodiment 1 of the present invention
  • FIG. 2 is a schematic flowchart of sending configuration information by a concentrator according to Embodiment 1 of the present invention
  • FIG. 4 is a schematic flowchart of a process for sending a session key by a concentrator according to an embodiment of the present invention
  • FIG. 4 is a schematic flowchart of a concentrator providing verification bit information according to Embodiment 1 of the present invention
  • FIG. 6 is a schematic flowchart of a concentrator abnormality processing according to Embodiment 1 of the present invention
  • FIG. 7 is a flowchart of a message processing method of a power meter provided by Embodiment 2 of the present invention
  • FIG. 8 is a schematic flowchart of processing of configuration parameters delivered by a power meter to a concentrator according to an embodiment of the present invention
  • FIG. 9 is a schematic flowchart of a method for reporting a power meter according to an embodiment of the present invention
  • FIG. 11 is a schematic structural diagram of a second concentrator according to Embodiment 3 of the present invention
  • FIG. 12 is a schematic structural diagram of a second concentrator according to Embodiment 3 of the present invention
  • FIG. 13 is a schematic structural diagram of a fourth concentrator according to Embodiment 3 of the present invention
  • Embodiment 1 As shown in FIG. 1 , a message processing method of a concentrator is provided in this embodiment.
  • Step 101 With an electric meter
  • Step 102 Determine whether the manner of transmitting the message is ciphertext transmission, if yes, execute step 103, if no, execute step 104
  • Step 103 perform encryption processing on the delivered message, and perform the encrypted message
  • the meter is transmitted to the meter
  • Step 104 The delivered message is transmitted to the meter according to a preset transmission manner.
  • the ciphertext transmission can be selected for the message to be delivered, and the concentrator can encrypt the message to be delivered, which can improve the security of the information.
  • the messages to be delivered by the concentrator in this implementation mainly include: concentrator configuration parameter information and control command information.
  • the verification bit information is generated according to the pre-configured verification bit generation mode information and the generation period information, and the verification bit information and the issuance are generated.
  • the message is assembled and transmitted to the meter.
  • the message processing method of the embodiment provides a flexible message transmission mode, and the concentrator can transmit the ciphertext or the ciphertext. For example, when the plaintext transmission is performed, the message can be sent to the meter by adding the verification bit information, and the pair is added.
  • the flexible configuration function of the message verification bit can be configured to use different verification bit functions by time period, and the dynamic and system time comparison of information transmission determines which set of verification bits to use.
  • parameter information related to the power meter may be pre-configured, and the parameter information may include: communication parameter information, transmission mode information, and other basic parameter information.
  • the transmission mode information may be transmitted in cipher text or transmitted in plain text;
  • the establishing a link with the electric meter in the above step 101 includes: establishing a link with the corresponding electric meter according to the configured communication parameter information; determining whether the manner of transmitting the message is ciphertext transmission in the step 102 may include: according to the configured transmission mode information Determine whether the way to transmit the message is ciphertext transmission.
  • the message processing method in this embodiment can flexibly configure the transmission mode of the message, which can effectively improve the security of the information transmission, and not only flexibly handle the verification bit information in the message header, but also perform key information transmission for the ciphertext.
  • Security hardening can effectively prevent tampering data from stealing electricity.
  • the parameter information configured in this embodiment further includes: a basic key; the encryption processing of the message to be delivered in the foregoing step 103 includes: or performing encryption processing on the message to be delivered according to the basic key; Generating a session key for transmitting information between the concentrator and the electric meter; performing encryption processing on the information to be delivered according to the session key; or treating the message key to be delivered according to the basic key Sending a message to perform encryption processing; when the message to be delivered is not a session key, generating a session key for transmitting information between the concentrator and the electric meter according to the basic key, and waiting for the session key according to the session key
  • the sent information is encrypted.
  • the concentrator if the concentrator is configured to transmit a key, there are the following three encryption modes: The first type: the basic key is used to encrypt the delivered message; the second type is the message delivered by the session key pair. Encryption; Third: When the delivered message includes the session key, the session key is encrypted by using the base key, and then the other delivered message is encrypted by using the session key.
  • the concentrator if the concentrator is configured to transmit the ciphertext, the concentrator can generate the current connection according to the current key of the encryption system, the random number, and the unique identifier of the electric meter according to the basic key of the electric meter. Session key. This session key is used to encrypt and decrypt data in this connection.
  • the key is encrypted by the message to be delivered.
  • the session key is encrypted by using the base key.
  • the parameter information configured in this embodiment further includes: verification bit generation mode information and generation cycle information; the step of assembling the encrypted message in the foregoing step 103 and transmitting the message to the power meter specifically includes: generating a verification bit according to the configuration The information and generation cycle generates verification bit information, assembles the verification bit information and the encrypted message, and transmits the assembled message to the electricity meter.
  • the method not only encrypts the message but also adds the verification bit information, for example, adds the verification bit to the header of the encrypted message, which further improves the security of the delivered message.
  • the concentrator sends configuration information to the power meter as an example to describe the specific process of the message processing method in this embodiment:
  • Step 201 The concentrator configures the packet information transmission mode (plain text or ciphertext), communication parameters, Correlating information with the power meter, generating mode information, and generating period generating verification bit information, and configuring the base key when the information transmission mode is ciphertext transmission;
  • Step 202 determining whether encryption transmission is required according to the configured message information transmission mode, if For ciphertext transmission, step 203 is performed; if it is a plaintext transmission, step 205 is performed;
  • step 203 generating a session key according to the configuration basic key, and encrypting configuration information to be sent to the power meter according to the session key; Generating verification bit information according to the generation mode information and the generation period verification bit information, and
  • Step 205 Generate verification bit information according to the generation mode information and the generation cycle verification bit information, and splicing the verification information into the configuration information to perform message assembly.
  • Step 206 Send the assembled message to the connected meter .
  • the concentrator needs to send the session key to the electricity meter after establishing a link with the electric meter, and the concentrator
  • the advertised message is a session key, and the specific process of delivering the session key includes: Step 301: The concentrator establishes a link with the electric meter according to the configured communication parameter; Step 302: The concentrator generates a session key according to the configured basic key; Step 303: The concentrator notifies the meter user of the configured base key; the concentrator encrypts the session key according to the base key; the concentrator informs the user that the configured basic key mode does not send a message through the concentrator, for example SMS, email, etc.
  • Step 304 The electric meter configures the basic key of the electric meter according to the basic key input by the user and stores the basic key of the electric meter according to the configured basic key, and obtains the session key by decrypting the received session key according to the configured basic key.
  • the received session key further includes a verification bit
  • the meter also needs to verify the session key, and if the verification is successful, the session key is stored.
  • the concentrator assembles the verification bit information and the encrypted information, the meter not only needs to decrypt the received information, but also needs to verify the decrypted information when receiving the assembled information.
  • the concentrator also needs to transmit the verification bit information of the current transmission information generated by the concentrator to the power meter, and the message to be delivered by the concentrator is the verification bit information, and the message processing method of the embodiment is used.
  • the process of issuing the verification bit information is as shown in FIG. 4:
  • Step 402 Generate verification bit information according to the generation rule information of the verification bit.
  • Step 403 Determine, according to the configured transmission mode information, whether ciphertext transmission is required. If yes, execute step 404.
  • Step 404 Generate according to The session key encrypts the verification bit information; the process of generating the session key refers to the process shown in FIG. 3 above; Step 405: assembling the delivered message and delivering the message information to the electricity meter.
  • the concentrator sends the message process, and the message to be delivered by the concentrator may be a session key, verification bit information, configuration information, or control command information. The foregoing method can ensure the security of the delivered message. As shown in FIG.
  • the message processing method of the concentrator when processing the message reported by the power meter, the process of processing the reported message includes: Step 501: Receiving a meter report Step 502: Verify the message reported by the meter; Step 503: Determine whether the verification is successful. If the verification is successful, go to step 504. If it fails, go to step 507. Step 504: Determine whether the method of reporting the message is The ciphertext transmission, if yes, go to step 505, if no, go to step 508; Step 505: Decrypt the message reported by the meter; Step 506: Determine whether the decryption is successful, if successful, execute step 508, if it fails, then Steps
  • Step 507 Perform abnormal condition processing, and the process ends
  • Step 508 Process data uploaded by the electricity meter, and the process ends.
  • the verification of the report message of the electric meter can verify the reported message according to the verification bit information generated by the concentrator, and the decryption of the report message can decrypt the reported message according to the session key generated by the concentrator.
  • the configuration parameter information in the message processing method of this embodiment may further include: an exception type, an abnormality threshold, and an exception processing manner.
  • the processing of the abnormality in the foregoing step 506 specifically includes: Step 600: Receiving an abnormal situation
  • Step 601 Match the type of the current abnormal situation with the configured abnormal type, and determine whether the matching is successful. If the matching is successful, go to step 602.
  • Step 602 Determine the abnormality of the type. Whether the sum of the number of cases is greater than the abnormal threshold; if greater, step 605 is performed, if not, step 604 is performed; Step 603: The exception is not processed, and is directly discarded.
  • Step 604 Record the abnormality, the number of abnormalities is accumulated, and the process proceeds to step 601 to process the next abnormality.
  • Step 605 According to the configured abnormal processing mode, the current abnormal situation Processing; such as generating alarm information and storing, SMS notification alarm, lower power generation table breaking command, equipment sound and light alarm, etc.
  • Embodiment 2 As shown in FIG. 1 , the information security transmission is ensured, and the verification bit information is dynamically changed according to the configuration mode according to the security policy module, thereby preventing the forgery data. It also provides a strong security policy. By using the base key and session key information, the security of the encrypted data is ensured. In addition, after the data is found to be abnormal, according to the established processing method, the normal alarm mode and delay processing can be adopted. It is also possible to immediately issue a brake command to the meter through the concentrator to timely handle abnormal behavior.
  • Embodiment 2 As shown in FIG.
  • this embodiment provides a message processing method for an electric meter, wherein the processing of the message delivered by the concentrator includes: Step 701: Receive a message sent by the concentrator; Step 702: Determining whether the message sent by the concentrator needs to be decrypted, if yes, executing step 703; if not, executing step 704; step 703: decrypting the message sent by the concentrator, and storing the decrypted message
  • Step 704 The message sent by the concentrator is stored.
  • the message sent by the receiving concentrator in the embodiment includes: receiving the security policy information sent by the concentrator, where the security policy information includes the session key and the verification bit information; before step 703, the method further includes: configuring the basic key of the electric meter Step 703: performing decryption processing on the message sent by the concentrator, and storing the decrypted message includes: decrypting the session key according to the basic key of the electric meter, and acquiring a session key of the electric meter, And storing the session key of the meter; Decrypting the verification bit information according to the session key of the electric meter to obtain verification bit information of the electric meter, and storing verification bit information of the electric meter.
  • the process of configuring the basic key of the electric meter in this embodiment refers to the process shown in FIG. 3, when the concentrator notifies the electric meter user of the configured basic key; the user configures the basic key of the electric meter on the electric meter, and the basic key and the centralized key
  • the base key of the device is the same.
  • the meter can decrypt and verify the configuration parameter information or the control command information sent by the concentrator. Only when the decryption and verification are successful, can the centralized configuration parameter information be obtained. Or control command information to prevent information from being tampered with during transmission, providing security for information transmission.
  • the configuration parameters of this embodiment mainly include: communication parameter information, transmission mode information, and other basic parameters. The basic parameters are not introduced here.
  • Step 801 Decrypt the configuration parameter information according to the session key of the electric meter
  • Step 802 Determine whether the decryption is performed If successful, go to step 803. If it fails, go to step.
  • Step 803 Perform verification on the decrypted configuration parameter information according to the verification bit information of the electric meter.
  • Step 804 Determine whether the verification is successful. If yes, execute step 805. If no, execute step 806; Step 805; : storing the decrypted configuration parameter information; Step 806: Performing exception handling.
  • the abnormal condition processing may be performed by referring to the concentrator shown in FIG. 6 for performing the abnormal condition processing.
  • the configuration parameters of this embodiment mainly include: communication parameter information and transmission mode information. The above describes the process of processing the message under the concentrator by the meter. After the necessary configuration parameters are stored in the meter, the message required by the concentrator needs to be reported. As shown in FIG. 9, the following describes the processing of the message to be reported in the meter.
  • Step 901 Establish a link with the concentrator according to the stored communication parameter information
  • Step 902 Acquire a message that the electric meter needs to report, and determine, according to the stored transmission mode information, whether the reported message needs to be ciphertext transmission. If yes, go to step 903, if not, go to step 904;
  • Step 903 Perform encryption processing on the reported message, and assemble the stored verification bit information and the encrypted message to the concentrator.
  • Step 904 After the stored verification bit information and the message to be reported are assembled and transmitted. Give the concentrator.
  • the message processing method of the embodiment can perform encryption processing on the message reported by the electric meter, improve the security of the message sent by the electric meter, and further combine the verification bit information to further improve the security of the message, and prevent the message reported by the electric meter from being stolen and tamper.
  • Embodiment 3 As shown in FIG. 10, this embodiment provides a concentrator, which applies a smart grid, and includes: an information interaction module, a judgment module, an encryption module, and an assembly module; and the information interaction module is configured to establish a link with the electricity meter.
  • the determining module is configured to determine whether the manner of transmitting the message is ciphertext transmission; and the cryptographic module is configured to: when the judging module judges that the manner of transmitting the message is ciphertext transmission
  • the message to be delivered is encrypted; the assembly module is configured to assemble the encrypted message.
  • the concentrator of this embodiment further includes: a configuration module and a security policy module; the configuration module is configured to configure verification bit generation mode information and generate cycle information to generate verification bit information; The security policy module is configured to generate verification bit information according to the configured verification bit generation mode information and the generation cycle information; the assembly module is further configured to perform verification when the determining module determines that the manner of transmitting the message is not ciphertext transmission
  • the bit information and the message to be delivered are assembled and transmitted to the meter.
  • the concentrator shown in FIG. 11 can send the generated verification bit information to the electricity meter.
  • the concentrator of the embodiment is determined not to transmit ciphertext, for example, the plaintext transmission may be different according to the configured verification bit generation rules, and different verification bits may be dynamically generated, thereby improving information security.
  • the concentrator of this embodiment further includes: a configuration module; the configuration module is configured to configure parameter information related to the power meter, where the parameter information includes: communication parameter information and transmission Mode information; but not limited to these parameters, it may also include other necessary parameters related to the meter;
  • the information interaction module is configured to establish a link with the corresponding power meter according to the configured communication parameter information.
  • the determining module is configured to determine, according to the configured transmission mode information, whether the manner of transmitting the message is ciphertext transmission.
  • the concentrator shown in FIG. 12 can determine the manner in which the message to be sent is sent according to the configured transmission mode information.
  • the parameter information of the embodiment further includes: a basic key, a verification bit generation mode information, and a generation cycle information;
  • the concentrator further includes: a security policy module, refer to the concentrator shown in FIG. 11; the security policy module And configured to generate a session key for transmitting information between the concentrator and the electric meter according to the basic key, and generate verification bit information according to the configured verification bit generation manner information and a generation period;
  • the encryption module is set to be dense according to the session Encrypting the information to be delivered by the key or the basic key, or encrypting the message to be delivered according to the basic key when the message session key to be delivered is sent, when the message to be delivered is sent The information to be delivered according to the session key is not encrypted when the session key is not used;
  • the assembly module is configured to assemble the verification bit information and the encrypted message.
  • the concentrator of this embodiment further includes: a verification module, a decryption module, and an exception policy module; the information interaction module is further configured to receive a message reported by the electricity meter; and the verification module is configured to report the power meter
  • the judging module is configured to: when the verification module successfully verifies the message reported by the electric meter, determine whether the manner of reporting the message by the electric meter is ciphertext transmission; and the decrypting module is configured to: when the judging module judges reporting The transmission mode of the message is to decrypt the message reported by the meter when the ciphertext is transmitted; the exception policy module is configured to perform abnormal condition processing when the verification module fails to verify or when the decryption module fails to decrypt.
  • the concentrator shown in Figure 13 describes the process of processing the messages reported by the meter.
  • the parameter information further includes: an abnormality type, an abnormality threshold, and an abnormality processing mode
  • the abnormality policy module of the embodiment is configured to match the type of the current abnormal situation with the configured abnormal type, and if the matching is successful, determine Whether the sum of the types of abnormal conditions of this type is greater than the abnormal threshold, and if it is greater than The exception handling method is used to process the current exception.
  • a description is given of the abnormal condition processing in the first embodiment.
  • the concentrator provided in this embodiment ensures the secure transmission of information by verifying the verification bit information of the message header in the conventional manner, and increases the verification bit information dynamically according to the configuration manner of the security policy module to prevent falsification of data.
  • Embodiment 4 As shown in FIG. 14, the embodiment provides an electric meter, which is applied to a smart grid, and includes: an information interaction module, a judgment module, a message storage module, and a decryption module; and the information interaction module is configured to receive the concentration.
  • the determining module is configured to determine whether the message sent by the concentrator needs to be decrypted; the decrypting module is configured to: when the determining module determines that decryption is required, to the concentrator The sent message is decrypted; the message storage module is configured to store the decrypted message.
  • the electric meter of this embodiment can perform decryption processing on the centrally delivered message.
  • the message sent by the receiving concentrator in the embodiment includes: receiving security policy information delivered by the concentrator, where the security policy information includes a session key and verification bit information; as shown in FIG.
  • the power meter further includes a security policy module; the security policy module is configured to configure a base key of the electricity meter, and store the session key of the electricity meter and the verification bit information of the electricity meter; the decryption module is configured to be based on the basic key pair of the electricity meter The session key is decrypted to obtain a session key of the electric meter, and the verification bit information is decrypted according to the session key of the electric meter to obtain verification bit information of the electric meter.
  • the message sent by the receiving concentrator in the embodiment further includes receiving configuration parameter information sent by the concentrator, where the configuration parameter message includes communication parameter information and transmission mode information; as shown in FIG.
  • the power meter further includes a verification module; the decryption module is configured to decrypt the configuration parameter information according to the session key of the electricity meter; and the verification module is configured to: according to the verification bit information of the electricity meter after the decryption module decrypts successfully The decrypted configuration parameter information is verified, and if the verification is successful, the decrypted configuration parameter information is stored in the message storage module.
  • the decryption module is configured to decrypt the configuration parameter information according to the session key of the electricity meter
  • the verification module is configured to: according to the verification bit information of the electricity meter after the decryption module decrypts successfully The decrypted configuration parameter information is verified, and if the verification is successful, the decrypted configuration parameter information is stored in the message storage module.
  • the decryption module is configured to decrypt the configuration parameter information according to the session key of the electricity meter
  • the verification module is configured to: according to the verification bit information of the electricity meter after the decryption module decrypts successfully The
  • the electric meter of this embodiment further includes: an encryption module and an assembly module; the information interaction module is further configured to establish a link with the concentrator according to the stored communication parameter information, and to assemble the Sending a message to the concentrator; the determining module is further configured to determine, according to the stored transmission mode information, whether the reported message needs to be ciphertext transmission; the cryptographic module is configured to obtain a message to be reported by the electric meter, when When the judging module judges that ciphertext transmission is required, the message to be reported is encrypted; the assembly module is configured to assemble the stored verification bit information and the encrypted message.
  • the electric meter of this embodiment may also include an abnormality policy module, and the abnormal condition in the electric meter may be processed according to the parameter related to the abnormal situation configured in the concentrator.
  • the meter can perform encryption processing on the message reported by the meter, and the security of the message sent by the meter is improved, and the verification bit information is further combined to further improve the security of the message, and the message reported by the meter is prevented from being stolen and falsified.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)
  • Arrangements For Transmission Of Measured Signals (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本发明公开了一种集中器、电表及其消息处理方法。本发明的集中器的消息处理方法中当集中器下发消息时,对待下发的消息处理的过程包括:与电表建立链接,判断传输消息的方式是否为密文传输,若是,则对待下发的消息进行加密处理,将加密后的消息进行组装后传输给所述电表;本发明的消息处理方法,可以对下发的消息进行加密处理,提升了集中器下发消息的安全性,防止窃取或篡改集中器下发信息。

Description

集中器、 电表及其消息处理方法 技术领域 本发明涉及智能电网领域, 尤其涉及一种集中器、 电表及其消息处理方法。 背景技术 随着智能电网的普及和更多智能电表的使用, 未来智能抄表必然会取代传统的手 工抄表的方式, 达到高效的信息采集和集中管理用电信息等目的, 目前智能电网抄表 ***中, 都是主站连接集中器, 集中器连接电表, 电表和用电终端相连, 集中器和电 表之间通过电网协议传输信息, 这种通过网络信息传输的方式, 在信息的传输过程中 存在安全隐患, 如主站通过集中器设置电表的费率的下行信息, 或者用户电表的用电 信息通过集中器上报到主站的上行消息等完全有可能被串改, 达到窃电的目的。 技术上, 随着智能电网的推广, 智能集中器, 智能电表得到了广泛的使用。 因此, 如何提高抄表***的数据安全性, 成为了***提供商非常关注的功能, 同时也带来了 巨大的商机。。 现有的抄表***, 如图 1所示, 主要包括: 集中器、 电表。 集中器和电表间可以 使用有线或者无线的方式进行连接, 集中器可以发送配置参数、 控制命令等信息到电 表, 可以接收电表上报的用电信息等。 现有的***具有以下的不足和局限: 不支持灵 活的、 动态的配置信息传输方式, 窃电风险很高、 异常处理方式不够灵活。 发明内容 本发明实施例要解决的主要技术问题是, 提供一种集中器、 电表及其消息处理方 法能够提高抄表***的信息安全。 为解决上述技术问题, 本发明实施例提供一种集中器的消息处理方法, 当集中器 下发消息时, 对待下发的消息处理的过程包括: 与电表建立链接, 判断传输消息的方式是否为密文传输, 若是, 则对所述待下发 的消息进行加密处理, 将加密后的消息进行组装后传输给所述电表。 优选地, 当判断传输消息的方式不是为密文传输时, 则根据预先配置的验证位生 成方式信息和生成周期信息生成验证位信息, 并将该验证位信息和所述待下发的消息 进行组装后传输给所述电表。 优选地, 在与电表建立链接之前还包括: 配置与所述电表相关的参数信息, 所述参数信息包括: 通信参数信息和传输方式 信息; 与所述电表建立链接包括:根据配置的所述通信参数信息与相应的电表建立链接; 所述判断传输消息的方式是否为密文传输包括: 根据配置的所述传输方式信息判 断传输消息的方式是否为密文传输。 优选地, 所述参数信息还包括: 基础密钥; 对所述待下发的消息进行加密处理包 括: 根据所述基础密钥对所述待下发的消息进行加密处理; 或者 根据所述基础密钥生成集中器和所述电表之间传输信息的会话密钥; 根据所述会话密钥对所述待下发的信息进行加密处理; 或者 当所述待下发的消息会话密钥时根据所述基础密钥对所述待下发的消息进行加密 处理; 当所述待下发的消息不为会话密钥时根据所述基础密钥生成集中器和所述电表之 间传输信息的会话密钥, 根据所述会话密钥对所述待下发的信息进行加密处理。 优选地, 所述参数信息还包括: 验证位生成方式信息和生成周期信息; 将加密后的消息进行组装后传输给所述电表包括: 根据配置的所述验证位生成方 式信息和生成周期生成验证位信息, 对所述验证位信息和加密后的消息进行组装, 将 组装后的消息传输给所述电表。 优选地, 当所述集中器接收电表上报的消息, 对上报的消息处理的过程包括: 接收所述电表上报的消息; 对所述电表上报的消息进行验证, 若验证成功, 则判断所述电表上报消息的方式 是否为密文传输, 若是, 则对所述电表上报的消息进行解密; 若验证失败或者解密失败时, 进行异常情况处理。 优选地, 所述参数信息还包括: 异常类型、 异常阈值和异常处理方式; 所述进行 异常情况处理的步骤包括: 将当前异常情况的类型与配置的异常类型进行匹配, 若匹配成功, 则判断该种类 型的异常情况的数量总和是否大于异常阈值, 若大于, 则根据配置的异常处理方式对 当前的异常情况进行处理。 同样为了解决上述的技术问题,本发明实施例还提供了一种电表的消息处理方法, 包括: 接收集中器下发的消息; 判断是否需要对所述集中器下发的消息进行解密, 若是, 则对所述集中器下发的 消息进行解密处理, 并存储解密后的消息。 优选地,接收所述集中器下发的消息包括:接收所述集中器下发的安全策略信息, 所述安全策略信息包括会话密钥和验证位信息; 在对所述集中器下发的消息解密之前还包括: 配置所述电表的基础密钥; 对所述集中器下发的消息进行解密处理, 并存储解密后的消息包括: 根据所述电表的基础密钥对所述会话密钥进行解密获取所述电表的会话密钥, 并 存储所述电表的会话密钥; 根据所述电表的会话密钥对所述验证位信息进行解密获取所述电表的验证位信 息, 并存储所述电表的验证位信息。 优选地,接收所述集中器下发的消息还包括接收所述集中器下发的配置参数信息, 所述配置参数消息包括通信参数信息和传输方式信息; 对所述集中器下发的消息进行解密处理, 并存储解密后的消息还包括: 根据所述电表的会话密钥对所述配置参数信息进行解密, 解密成功后根据所述电 表的验证位信息对解密后的所述配置参数信息进行验证, 若验证成功, 则存储解密后 的配置参数信息。 优选地, 所述电表上报消息时, 对待上报消息的处理过程包括:、 根据存储的所述通信参数信息与所述集中器建立链接; 获取所述电表待上报的消息, 根据存储的所述传输方式信息判断待上报的消息是 否需要进行密文传输, 若是, 则对所述待上报的消息进行加密处理, 将存储的验证位 信息和加密后的消息进行组装后传输给所述集中器。 同样为了解决上述的技术问题, 本发明实施例还提供了一种集中器, 包括: 信息 交互模块、 判断模块、 加密模块和组装模块; 所述信息交互模块设置为与电表建立链接,以及将组装后的信息传输给所述电表; 所述判断模块设置为判断传输消息的方式是否为密文传输; 所述加密模块设置为当所述判断模块判断传输消息的方式为密文传输时对待下发 的消息进行加密处理; 所述组装模块设置为将加密后的消息进行组装。 优选地, 所述集中器还包括: 配置模块和安全策略模块; 所述配置模块设置为配 置验证位生成方式信息和生成周期信息生成验证位信息; 所述安全策略模块设置为根 据配置的验证位生成方式信息和生成周期信息生成验证位信息; 所述组装模块还设置 为当所述判断模块判断传输消息的方式不是密文传输时将生成的验证位信息和所述待 下发的消息进行组装后传输给所述电表。 优选地, 所述集中器还包括: 配置模块; 所述配置模块设置为配置与电表相关的 参数信息, 所述参数信息包括: 通信参数信息和传输方式信息; 所述信息交互模块设置为根据配置的通信参数信息与相应的电表建立链接; 所述判断模块设置为根据配置的所述传输方式信息判断传输消息的方式是否为密 文传输。 优选地, 所述参数信息还包括: 基础密钥、验证位生成方式信息和生成周期信息; 所述集中器还包括: 安全策略模块; 所述安全策略模块设置为根据所述基础密钥生成集中器和电表之间传输信息的会 话密钥, 以及根据配置的验证位生成方式信息和生成周期生成验证位信息; 所述加密模块设置为根据所述会话密钥或者基础密钥对待下发的信息进行加密处 理, 或者当所述待下发的消息会话密钥时根据所述基础密钥对待下发的消息进行加密 处理, 当所述待下发的消息不为会话密钥时根据所述会话密钥待对下发的信息进行加 密处理。 所述组装模块设置为对所述验证位信息和加密后的消息进行组装。 优选地, 所述集中器还包括: 验证模块、 解密模块和异常策略模块; 所述信息交互模块还设置为接收电表上报的消息; 所述验证模块设置为对所述电表上报的消息进行验证; 所述判断模块设置为当所述验证模块对电表上报的消息验证成功时, 判断电表上 报消息的方式是否为密文传输; 所述解密模块设置为当所述判断模块判断上报消息的传输方式为密文传输时对电 表上报的消息进行解密; 所述异常策略模块设置为当所述验证模块验证失败或者当所述解密模块解密失败 时, 进行异常情况处理。 优选地, 所述参数信息还包括: 异常类型、 异常阈值和异常处理方式; 所述异常策略模块设置为将当前异常情况的类型与配置的异常类型进行匹配, 若 匹配成功, 则判断该种类型的异常情况的数量总和是否大于异常阈值, 若大于, 则根 据配置的异常处理方式对当前的异常情况进行处理。 同样为了解决上述的技术问题, 本发明实施例还提供了一种电表, 包括: 信息交 互模块、 判断模块、 消息存储模块和解密模块; 所述信息交互模块设置为接收集中器下发的消息; 所述判断模块设置为判断是否需要对所述集中器下发的消息进行解密; 所述解密模块设置为当所述判断模块判断需要进行解密时, 对所述集中器下发的 消息进行解密处理; 所述消息存储模块设置为存储解密后的消息。 优选地, 接收所述集中器下发的消息包括: 接收集中器下发的安全策略信息, 所 述安全策略信息包括会话密钥和验证位信息; 所述电表还包括安全策略模块; 所述安全策略模块设置为配置电表的基础密钥, 以及存储电表的会话密钥和电表 的验证位信息; 所述解密模块设置为根据所述电表的基础密钥对所述会话密钥进行解密获取电表 的会话密钥, 以及根据所述电表的会话密钥对所述验证位信息进行解密获取电表的验 证位信息。 优选地, 接收所述集中器下发的消息还包括接收集中器下发的配置参数信息, 所 述配置参数消息包括通信参数信息和传输方式信息; 所述电表还包括验证模块; 所述解密模块设置为根据所述电表的会话密钥对所述配置参数信息进行解密; 所述验证模块设置为在解密模块解密成功后根据所述电表的验证位信息对解密后 的所述配置参数信息进行验证, 若验证成功, 则将解密后的配置参数信息存储至所述 消息存储模块中。 优选地, 所述电表还包括: 加密模块和组装模块; 所述信息交互模块还设置为根据存储的所述通信参数信息与集中器建立链接, 以 及将组装后的消息发送给所述集中器; 所述判断模块还设置为根据存储的所述传输方式信息判断上报的消息是否需要进 行密文传输; 所述加密模块设置为获取电表待上报的消息, 当所述判断模块判断需要进行密文 传输时, 对待上报的消息进行加密处理; 所述组装模块设置为将存储的验证位信息和加密后的消息进行组装。 本发明实施例的有益效果是: 本发明实施例提供一种集中器、 电表及其消息处理方法能够提高抄表***的信息 安全, 本发明实施例的集中器的消息处理方法中当集中器下发消息时, 对待下发的消 息处理的过程包括: 与电表建立链接, 判断传输消息的方式是否为密文传输, 若是, 则对待下发的消息进行加密处理, 将加密后的消息进行组装后传输给所述电表; 本发 明实施例的消息处理方法, 可以对下发的消息进行加密处理, 提升了集中器下发消息 的安全性, 防止窃取或篡改集中器下发信息及电表上报的信息。 附图说明
S i为本发明实施例-一提供的 种集中器的消息处理方法的流程示意图; 图 2为本发明实施例-一提供的 种集中器下发配置信息的流程示意图; 图 3为本发明实施例-一提供的 种集中器发送会话密钥流程示意图; 图 4为本发明实施例-一提供的 种集中器下发验证位信息的流程示意图; 图 5为本发明实施例-一提供的 种集中器处理电表上报消息的流程示意图; 图 6为本发明实施例-一提供的 种集中器异常情况处理的流程示意图; 图 7为本发明实施例:二提供的 种电表的消息处理方法的流程示意图; 图 8为本发明实施例.二提供的 -种电表对集中器下发的配置参数处理的流程示意 图; 图 9为本发明实施例:二提供的 种电表上报消息的流程示意图; 图 10为本发明实施例三提供的第一种集中器的结构示意图; 图 11为本发明实施例三提供的第二种集中器的结构示意图; 图 12为本发明实施例三提供的第三种集中器的结构示意图; 图 13为本发明实施例三提供的第四种集中器的结构示意图; 图 14为本发明实施例四提供的第一种电表的结构示意图; 图 15为本发明实施例四提供的第二种电表的结构示意图; 图 16为本发明实施例四提供的第三种电表的结构示意图; 图 17为本发明实施例四提供的第四种电表的结构示意图。 具体实施方式 下面通过具体实施方式结合附图对本发明作进一步详细说明。 实施例一: 如图 1所示, 为本实施例提供的一种集中器的消息处理方法, 其中在当集中器下 发消息时, 对下发的消息处理的过程包括: 步骤 101 : 与电表建立链接; 步骤 102: 判断传输消息的方式是否为密文传输, 若是, 则执行步骤 103, 若否, 则执行步骤 104; 步骤 103 : 对待下发的消息进行加密处理, 将加密后的消息进行组装后传输给所 述电表; 步骤 104: 按照预设的传输方式将下发的消息传输给所述电表。 本实施例集中器的消息处理方法, 可以对待下发的消息选择密文传输, 集中器可 以对待下发的消息进行加密处理, 可以提高信息的安全性。 本实施中集中器待下发的 消息主要包括: 集中器配置参数信息和控制命令信息。 本实施例消息处理方法中当判断传输消息的方式不是为密文传输时, 则根据预先 配置的验证位生成方式信息和生成周期信息生成验证位信息, 并将该验证位信息和所 述下发的消息进行组装后传输给所述电表。 本实施例的消息处理方法提供了灵活的消息传输方式, 集中器可以采用密文传输 或者不采用密文传输, 例如明文传输时, 可以通过添加验证位信息的方式下发消息给 电表,增加对消息验证位的灵活配置功能,可配置按时段不用采用不同的验证位功能, 信息传输时动态的和***时间比对来决定使用哪一组验证位。 本实施例消息处理方法, 可以预先配置与电表相关的参数信息, 该参数信息可以 包括: 通信参数信息、 传输方式信息以及其他基本的参数信息。 该传输方式信息可以 密文传输或者为明文传输; 上述步骤 101中与电表建立链接具体包括: 根据配置的通信参数信息与相应的电 表建立链接; 上述步骤 102中判断传输消息的方式是否为密文传输的可以包括: 根据配置的所述传输方式信息判断传输消息的方式是否为密文传输。 本实施例的消息处理方法可以灵活地配置消息的传输方式, 可以有效提升信息传 输的安全性, 不仅对于消息头中验证位信息做灵活处理, 同时如果为密文传输, 对密 钥信息做了安全加固, 能够有效防止篡改数据进行窃电。 本实施例中配置的参数信息还包括: 基础密钥; 上述步骤 103中对待下发的消息 进行加密处理具体包括: 或者根据基础密钥对待下发的消息进行加密处理; 根据所述基础密钥生成集中器和电表之间传输信息的会话密钥; 根据所述会话密钥对待下发的信息进行加密处理; 或者 当所述待下发的消息会话密钥时根据所述基础密钥对待下发的消息进行加密处 理; 当所述待下发的消息不为会话密钥时根据所述基础密钥生成集中器和电表之间传 输信息的会话密钥, 根据所述会话密钥待对下发的信息进行加密处理。 本实施例方法中集中器若配置密钥传输时, 有以下三种加密方式: 第一种: 采用基础密钥对下发的消息进行加密; 第二种: 采用会话密钥对下发的消息进行加密; 第三种: 当下发的消息包括会话密钥时, 采用基础密钥对会话密钥进行加密, 然 后采用会话密钥对其他下发的消息进行加密。 本实施例方法中集中器若配置密文传输时, 则与电表建立连接后, 集中器根据电 表的基础密钥, 可以采用加密***当前时间、 随机数、 电表唯一标识等信息生成本次 连接的会话密钥, 本次连接内统一使用该会话密钥进行数据的加解密。 或者采用基础 密钥对待下发的消息进行加密, 例如当发送会话密钥时, 则采用基础密钥对下发的会 话密钥进行加密。 优选地,本实施例配置的参数信息还包括:验证位生成方式信息和生成周期信息; 上述步骤 103中将加密后的消息进行组装后传输给所述电表具体包括: 根据配置的验证位生成方式信息和生成周期生成验证位信息, 将所述验证位信息 和加密后的消息进行组装中, 将组装后的消息传输给所述电表。 本实施例方法在密文传输时不仅对消息进行加密而且还加入了验证位信息, 例如 将验证位添加到加密后的消息的头部, 进一步地提高了下发消息的安全性。 并且由于 可以配置的验证位生成方式信息和生成周期生成验证位信息, 这样可以动态地生成验 证位信息, 防止伪造数据。 如图 2, 下面以集中器下发配置信息给电表为例, 来介绍本实施例消息处理方法 的具体过程: 步骤 201 : 集中器配置报文信息传输方式 (明文或密文)、 通信参数、 与电表的关 联信息、 生成方式信息和生成周期生成验证位信息, 当信息传输方式为密文传输时还 配置基础密钥; 步骤 202: 根据配置的报文信息传输方式判断是否需要加密传输, 若是密文传输, 则执行步骤 203 ; 若是明文传输, 则执行步骤 205 ; 步骤 203 : 根据配置基础密钥生成会话密钥, 根据所述会话密钥对待下发给电表 的配置信息进行加密; 步骤 204: 根据生成方式信息和生成周期生成验证位信息生成验证位信息, 将所 述验证位信息和加密后配置信息进行报文组装, 转步骤 206; 例如将验证位信息拼接到加密后的信息的头部, 或其他组装方式。 步骤 205 : 根据生成方式信息和生成周期生成验证位信息生成验证位信息, 将所 述验证信息拼接到配置信息中进行报文组装; 步骤 206: 将组装后的报文下发给与其连接的电表。 如图 3所示, 当消息传输方式为密文传输时, 为了能够使得电表能够解密信息, 本实施例中集中器还需在与电表建立链接后将会话密钥发送给电表, 此时集中器下发 的消息为会话密钥, 下发会话密钥的具体过程包括: 步骤 301 : 集中器根据配置的通信参数与电表建立链接; 步骤 302: 集中器根据配置的基础密钥生成会话密钥; 步骤 303 : 集中器将配置的基础密钥通知电表用户; 集中器根据基础密钥对会话 密钥进行加密; 集中器告知用户其配置的基础密钥方式不通过集中器下发消息的方式, 例如可以 采用短信、 邮件等方式, 这样可以保证密钥信息不会在信息传输过程中被窃取。 步骤 304: 电表根据用户输入的基础密钥, 配置出电表的基础密钥并存储; 电表 根据配置的基础密钥对接收的会话密钥进行解密获得会话密钥。 当接到的会话密钥还包括验证位时, 电表还需要对会话密钥进行验证, 若验证成 功, 则存储该会话密钥。 当集中器将验证位信息与加密后的信息组装后, 电表在接收到组装后的信息时不 仅需要对接收到信息进行解密, 还需要对解密后的信息进行验证。 再此情况下, 集中 器还需要将其生成的本次传输信息的验证位信息传输给电表, 此时集中器待下发的消 息为验证位信息, 采用本实施例的消息处理方法, 集中器下发验证位信息的过程如图 4所示: 步骤 401 : 获取配置的验证位的生成规则信息, 包括生成方式和周期; 验证位生成方式可自定义, 如随机数, 随机字符串等。 步骤 402: 根据验证位的生成规则信息生成验证位信息; 步骤 403 : 根据配置的传输方式信息判断是否需要密文传输, 若是, 则执行步骤 404, 若否, 执行步骤 405 ; 步骤 404: 根据生成的会话密钥对所述验证位信息进行加密; 生成会话密钥的过程参考上述图 3所示的过程; 步骤 405 : 组装下发报文, 下发报文信息至电表。 上述介绍的集中器下发消息过程, 上述集中器待下发的消息可以为会话密钥、 验 证位信息、 配置信息或者控制命令信息, 采用上述的方法, 可以确保下发消息的安全 性。 如图 5所示, 在上述的内容的基础上, 本实施例提供的集中器的消息处理方法, 在对接收电表上报的消息时, 对上报的消息进行处理过程包括: 步骤 501 : 接收电表上报的消息; 步骤 502: 对电表上报的消息进行验证; 步骤 503 : 判断是否验证成功, 若验证成功, 则执行步骤 504, 若失败, 则执行步 骤 507: 步骤 504: 判断电表上报消息的方式是否为密文传输, 若是, 则执行步骤 505, 若 否, 则执行步骤 508; 步骤 505 : 对电表上报的消息进行解密; 步骤 506: 判断是否解密成功, 若成功, 则执行步骤 508, 若失败, 则执行步骤
507; 步骤 507: 进行异常情况处理, 流程结束; 步骤 508: 处理电表上传的数据, 流程结束。 本实施例对电表上报消息的验证可以根据集中器生成的验证位信息对上报的消息 进行验证,对上报消息的解密可以根据集中器生成的会话密钥对上报的消息进行解密。 如图 6所示, 本实施例的消息处理方法中配置参数信息还可以包括: 异常类型、 异常阈值和异常处理方式; 上述步骤 506中进行异常情况处理具体包括: 步骤 600: 接收到异常情况的通知; 步骤 601 : 将当前异常情况的类型与配置的异常类型进行匹配, 判断匹配是否成 功, 若匹配成功, 则执行步骤 602, 若失败, 则执行步骤 603 ; 步骤 602: 判断该种类型的异常情况的数量总和是否大于异常阈值; 若大于, 则 执行步骤 605, 若小于, 执行步骤 604; 步骤 603 : 不处理该异常, 直接丢弃; 步骤 604: 记录该种异常,该种异常数量累加,跳转到步骤 601,处理下一个异常; 步骤 605 : 根据配置的异常处理方式对当前的异常情况进行处理; 如生成告警信 息并存储、 短信通知告警、 下发电表断闸命令、 设备声光告警等。 通过上述处理方法, 在传统的通过验证消息头部的验证位信息保证信息安全传输 夕卜,增加了根据安全策略模块按照配置的方式动态的变化验证位信息, 防止伪造数据。 还提供了强大的安全策略, 通过使用基础密钥和会话密钥信息, 保证了加密数据的安 全, 另外在发现数据异常后, 根据制定好的处理方式, 可采用普通的告警方式, 延迟 处理, 也可以立即通过集中器下发断闸命令到表计, 及时的处理异常行为。 实施例二: 如图 7所示, 本实施例提供了一种电表的消息处理方法, 其中对集中器下发的消 息的处理过程包括: 步骤 701 : 接收集中器下发的消息; 步骤 702: 判断是否需要对所述集中器下发的消息进行解密, 若是, 则执行步骤 703, 若否, 则执行步骤 704; 步骤 703 : 对所述集中器下发的消息进行解密处理, 并存储解密后的消息; 步骤 704: 存储集中器下发的消息。 本实施例中接收集中器下发的消息包括: 接收集中器下发的安全策略信息, 所述 安全策略信息包括会话密钥和验证位信息; 在步骤 703之前还包括: 配置电表的基础密钥; 步骤 703中对所述集中器下发的消息进行解密处理, 并存储解密后的消息的步骤 包括: 根据所述电表的基础密钥对所述会话密钥进行解密获取电表的会话密钥, 并存储 电表的会话密钥; 根据所述电表的会话密钥对所述验证位信息进行解密获取电表的验证位信息, 并 存储所述电表的验证位信息。 本实施例中电表配置的基础密钥的过程参考图 3所示的过程, 当集中器将配置的 基础密钥通知电表用户; 用户在电表上配置电表的基础密钥, 该基础密钥与集中器的 基础密钥是一致。 在获取会话密钥和验证位信息之后, 电表就可以对集中器下发的配置参数信息或 者控制命令信息进行解密并验证, 只有当解密和验证同时成功后才能够获取集中下发 的配置参数信息或者控制命令信息, 防止信息在传输过程中被篡改, 提供了信息传输 的安全性。 本实施例配置参数主要包括: 通信参数信息、 传输方式信息以及其他基本 的参数, 这里就不一一介绍基本的参数。 如图 8所示, 电表接收集中器下发的配置参数时, 其具体的处理过程包括: 步骤 801 : 根据所述电表的会话密钥对所述配置参数信息进行解密; 步骤 802: 判断解密是否成功, 若成功, 则执行步骤 803, 若失败, 则执行步骤
806; 步骤 803 : 根据所述电表的验证位信息对解密后的所述配置参数信息进行验证; 步骤 804: 判断是否验证成功, 若是, 则执行步骤 805, 若否, 则执行步骤 806; 步骤 805 : 存储解密后的配置参数信息; 步骤 806: 进行异常情况处理。 本实施例中进行异常情况处理可以参考图 6所示的集中器进行异常情况处理的过 程。 本实施例配置参数主要包括: 通信参数信息和传输方式信息。 上述介绍的是电表对集中器下的消息进行处理的过程, 在电表存储了必要的配置 参数后, 需要上报集中器所需的消息, 如图 9所示, 下面介绍对本电表待上报消息的 处理过程, 包括: 步骤 901 : 根据存储的所述通信参数信息与集中器建立链接; 步骤 902: 获取电表需要上报的消息, 根据存储的所述传输方式信息判断上报的 消息是否需要进行密文传输, 若是, 则执行步骤 903, 若否则, 执行步骤 904; 步骤 903 : 对待上报的消息进行加密处理, 将存储的验证位信息和加密后的消息 进行组装后传输给所述集中器; 步骤 904: 将存储的验证位信息和需要上报的消息进行组装后传输给集中器。 本实施例的消息处理方法可以在电表上报的消息进行加密处理, 提升了电表发送 消息的安全性, 并将还组合了验证位信息进一步地提高消息的安全性, 防止电表上报 的消息被窃取和篡改。 实施例三: 如图 10所示,本实施例提供了一种集中器,应用智能电网,包括:信息交互模块、 判断模块、 加密模块和组装模块; 所述信息交互模块设置为与电表建立链接,以及将组装后的信息传输给所述电表; 所述判断模块设置为判断传输消息的方式是否为密文传输; 所述加密模块设置为当所述判断模块判断传输消息的方式为密文传输时对待下发 的消息进行加密处理; 所述组装模块设置为将加密后的消息进行组装。 本实施例中集中器下发消息的过程可以参考实施例一中的相关描述。 如图 11所示, 在图 10的基础上, 本实施例的集中器还包括: 配置模块和安全策 略模块; 所述配置模块设置为配置验证位生成方式信息和生成周期信息生成验证位信 息; 所述安全策略模块设置为根据配置的验证位生成方式信息和生成周期信息生成验 证位信息; 所述组装模块还设置为当所述判断模块判断传输消息的方式不是密文传输 时将生成的验证位信息和所述待下发的消息进行组装后传输给所述电表。图 11所示的 集中器可以将生成的验证位信息下发给电表。 本实施例集中器当判断不是密文传输时, 例如明文传输时可以根据配置的验证位 生成规则不同, 可以动态的生成不同的验证位, 提升了信息的安全。 如图 12所示, 在图 10的基础上, 本实施例的集中器还包括: 配置模块; 所述配 置模块设置为配置与电表相关的参数信息, 所述参数信息包括: 通信参数信息和传输 方式信息; 但不仅限于这些参数, 还可以包括其他与电表相关的必要参数; 所述信息交互模块设置为根据配置的通信参数信息与相应的电表建立链接; 所述判断模块设置为根据配置的所述传输方式信息判断传输消息的方式是否为密 文传输。 图 12所示的集中器可以根据配置的传输方式信息判断发送待下发消息的方式。 优选地, 本实施例参数信息还包括: 基础密钥、 验证位生成方式信息和生成周期 信息; 所述集中器还包括: 安全策略模块, 参考图 11所示的集中器; 所述安全策略模块设置为根据所述基础密钥生成集中器和电表之间传输信息的会 话密钥, 以及根据配置的验证位生成方式信息和生成周期生成验证位信息; 所述加密模块设置为根据所述会话密钥或基础密钥对待下发的信息进行加密处 理, 或者当所述待下发的消息会话密钥时根据所述基础密钥对待下发的消息进行加密 处理, 当所述待下发的消息不为会话密钥时根据所述会话密钥待对下发的信息进行加 密处理; 所述组装模块设置为对所述验证位信息和加密后的消息进行组装。 如图 13所示, 本实施例的集中器还包括: 验证模块、 解密模块和异常策略模块; 所述信息交互模块还设置为接收电表上报的消息; 所述验证模块设置为对所述电表上报的消息进行验证; 所述判断模块设置为当所述验证模块对电表上报的消息验证成功时, 判断电表上 报消息的方式是否为密文传输; 所述解密模块设置为当所述判断模块判断上报消息的传输方式为密文传输时对电 表上报的消息进行解密; 所述异常策略模块设置为当所述验证模块验证失败或者当所述解密模块解密失败 时, 进行异常情况处理。 图 13所示的集中器介绍了对电表上报的消息进行处理的过程。 优选地, 当所述参数信息还包括: 异常类型、 异常阈值和异常处理方式, 本实施 例的异常策略模块设置为将当前异常情况的类型与配置的异常类型进行匹配, 若匹配 成功, 则判断该种类型的异常情况的数量总和是否大于异常阈值, 若大于, 则根据配 置的异常处理方式对当前的异常情况进行处理。 具参考实施例一中关于异常情况处理 的描述。 本实施例提供的集中器在传统的通过验证消息头部的验证位信息保证信息安全传 输外, 增加了根据安全策略模块按照配置的方式动态的变化验证位信息, 防止伪造数 据。 还提供了强大的安全策略, 通过使用基础密钥和会话密钥信息, 保证了加密数据 的安全, 另外通过异常策略处理模块保存的配置, 在发现数据异常后, 根据制定好的 处理方式, 可采用普通的告警方式, 延迟处理, 也可以立即通过集中器下发断闸命令 到表计, 及时的处理异常行为。 实施例四: 如图 14所示, 本实施例提供了一种电表, 应用于智能电网中, 包括: 信息交互模 块、 判断模块、 消息存储模块和解密模块; 所述信息交互模块设置为接收集中器下发的消息; 所述判断模块设置为判断是否需要对所述集中器下发的消息进行解密; 所述解密模块设置为当所述判断模块判断需要进行解密时, 对所述集中器下发的 消息进行解密处理; 所述消息存储模块设置为存储解密后的消息。 本实施例的电表可以对集中下发的消息进行解密处理。 优选地, 本实施例中接收集中器下发的消息包括: 接收集中器下发的安全策略信 息, 所述安全策略信息包括会话密钥和验证位信息; 如图 15所示, 本实施例的电表还 包括安全策略模块; 所述安全策略模块设置为配置电表的基础密钥, 以及存储电表的会话密钥和电表 的验证位信息; 所述解密模块设置为根据所述电表的基础密钥对所述会话密钥进行解密获取电表 的会话密钥, 以及根据所述电表的会话密钥对所述验证位信息进行解密获取电表的验 证位信息。 优选地, 本实施例中接收集中器下发的消息还包括接收集中器下发的配置参数信 息, 所述配置参数消息包括通信参数信息和传输方式信息; 如图 16所示, 本实施例的 电表还包括验证模块; 所述解密模块设置为根据所述电表的会话密钥对所述配置参数信息进行解密; 所述验证模块设置为在解密模块解密成功后根据所述电表的验证位信息对解密后 的所述配置参数信息进行验证, 若验证成功, 则将解密后的配置参数信息存储至所述 消息存储模块中。 优选地, 如图 17所示, 本实施例的电表还包括: 加密模块和组装模块; 所述信息交互模块还设置为根据存储的所述通信参数信息与集中器建立链接, 以 及将组装后的消息发送给所述集中器; 所述判断模块还设置为根据存储的所述传输方式信息判断上报的消息是否需要进 行密文传输; 所述加密模块设置为获取电表待上报的消息, 当所述判断模块判断需要进行密文 传输时, 对待上报的消息进行加密处理; 所述组装模块设置为将存储的验证位信息和加密后的消息进行组装。 本实施例中关于电表对集中器下发的消息进行处理过程和上报给集中器的消息的 处理过程可以参考实施例一二中的相关描述。 另外本实施例的电表也可以包括异常策略模块, 可以根据集中器中配置的异常情 况相关的参数对电表中的异常情况进行处理。 具体的可以参考集中器中异常策略模块 的描述。 本实施例电表可以在电表上报的消息进行加密处理, 提升了电表发送消息的安全 性, 并将还组合了验证位信息进一步地提高消息的安全性, 防止电表上报的消息被窃 取和篡改。 以上内容是结合具体的实施方式对本发明所作的进一步详细说明, 不能认定本发 明的具体实施只局限于这些说明。 对于本发明所属技术领域的普通技术人员来说, 在 不脱离本发明构思的前提下, 还可以做出若干简单推演或替换, 都应当视为属于本发 明的保护范围。 工业实用性 本发明实施例提供的技术方案可以应用于智能电网领域, 提升了集中器下发消息 的安全性, 防止窃取或篡改集中器下发信息。

Claims

权 利 要 求 书
1. 一种集中器的消息处理方法, 当集中器下发消息时, 对待下发的消息处理的过 程包括:
与电表建立链接, 判断传输消息的方式是否为密文传输, 若是, 则对所述 待下发的消息进行加密处理, 将加密后的消息进行组装后传输给所述电表。
2. 如权利要求 1所述的集中器的消息处理方法, 其中, 所述方法还包括: 当判断 传输消息的方式不是为密文传输时, 则根据预先配置的验证位生成方式信息和 生成周期信息生成验证位信息, 并将该验证位信息和所述待下发的消息进行组 装后传输给所述电表。
3. 如权利要求 1所述的集中器的消息处理方法, 其中, 在与所述电表建立链接之 前还包括: 配置与所述电表相关的参数信息, 所述参数信息包括: 通信参数信息和传 输方式信息;
与所述电表建立链接包括: 根据配置的所述通信参数信息与相应的电表建 立链接; 判断传输消息的方式是否为密文传输包括: 根据配置的所述传输方式信息 判断传输消息的方式是否为密文传输。
4. 如权利要求 3所述的集中器的消息处理方法, 其中, 所述参数信息还包括: 基 础密钥; 对所述待下发的消息进行加密处理包括:
根据所述基础密钥对所述待下发的消息进行加密处理; 或者, 根据所述基础密钥生成集中器和所述电表之间传输信息的会话密钥; 根据 所述会话密钥待对下发的信息进行加密处理; 或者, 当所述待下发的消息会话密钥时根据所述基础密钥对所述待下发的消息进 行加密处理; 当所述待下发的消息不为会话密钥时根据所述基础密钥生成集中 器和所述电表之间传输信息的会话密钥, 根据所述会话密钥待对下发的信息进 行加密处理。
20
5. 如权利要求 3所述的集中器的消息处理方法, 其中, 所述参数信息还包括: 验 证位生成方式信息和生成周期信息; 将加密后的消息进行组装后传输给所述电表包括: 根据配置的所述验证位 生成方式信息和所述生成周期生成验证位信息, 对所述验证位信息和加密后的 消息进行组装, 将组装后的消息传输给所述电表。
6. 如权利要求 2-5任一项所述的集中器的消息处理方法, 其中, 所述方法还包括: 当所述集中器接收所述电表上报的消息, 对所述上报的消息进行处理; 其中, 对所述上报的消息进行处理包括: 接收所述电表上报的消息;
对所述电表上报的消息进行验证, 若验证成功, 则判断所述电表上报消息 的方式是否为密文传输, 若是, 则对所述电表上报的消息进行解密;
若验证失败或者解密失败时, 进行异常情况处理。
7. 如权利要求 6所述的集中器的消息处理方法, 其中, 所述参数信息还包括: 异 常类型、 异常阈值和异常处理方式; 进行异常情况处理包括: 将当前异常情况的类型与配置的异常类型进行匹配, 若匹配成功, 则判断 该种类型的异常情况的数量总和是否大于异常阈值, 若大于, 则根据配置的异 常处理方式对当前的异常情况进行处理。
8. 一种电表的消息处理方法, 包括: 接收集中器下发的消息; 判断是否需要对所述集中器下发的消息进行解密, 若是, 则对所述集中器 下发的消息进行解密处理, 并存储解密后的消息。
9. 如权利要求 8所述的电表的消息处理方法, 其中, 接收所述集中器下发的消息 包括: 接收所述集中器下发的安全策略信息, 所述安全策略信息包括会话密钥 和验证位信息; 在对所述集中器下发的消息解密之前, 所述方法还包括: 配置电表的基础 密钥; 对所述集中器下发的消息进行解密处理, 并存储解密后的消息包括: 根据所述电表的基础密钥对所述会话密钥进行解密获取电表的会话密钥, 并存储电表的会话密钥; 根据所述电表的会话密钥对所述验证位信息进行解密获取电表的验证位信 息, 并存储所述电表的验证位信息。
10. 如权利要求 9所述的电表的消息处理方法, 其中, 接收所述集中器下发的消息 还包括接收所述集中器下发的配置参数信息, 所述配置参数消息包括通信参数 信息和传输方式信息;
对所述集中器下发的消息进行解密处理, 并存储解密后的消息还包括: 根据所述电表的会话密钥对所述配置参数信息进行解密, 解密成功后根据 所述电表的验证位信息对解密后的所述配置参数信息进行验证, 若验证成功, 则存储解密后的配置参数信息。
11. 如权利要求 9所述的电表的消息处理方法, 其中, 所述电表上报消息时, 对待 上报消息的处理过程包括:
根据存储的所述通信参数信息与所述集中器建立链接; 获取电表需要上报的消息, 根据存储的所述传输方式信息判断所述待上报 的消息是否需要进行密文传输, 若是, 则对所述待上报的消息进行加密处理, 将存储的验证位信息和加密后的消息进行组装后传输给所述集中器。
12. 一种集中器, 包括: 信息交互模块、 判断模块、 加密模块和组装模块; 所述信息交互模块设置为与电表建立链接, 以及将组装后的信息传输给所 述电表;
所述判断模块设置为判断传输消息的方式是否为密文传输; 所述加密模块设置为当所述判断模块判断传输消息的方式为密文传输时对 待下发的消息进行加密处理;
所述组装模块设置为将加密后的消息进行组装。
13. 如权利要求 12所述的集中器, 其中, 还包括: 配置模块和安全策略模块; 所述 配置模块设置为配置验证位生成方式信息和生成周期信息生成验证位信息; 所 述安全策略模块设置为根据配置的验证位生成方式信息和生成周期信息生成验 证位信息; 所述组装模块还设置为当所述判断模块判断传输消息的方式不是密 文传输时将生成的验证位信息和所述待下发的消息进行组装后传输给所述电 表。
22
14. 如权利要求 12所述的集中器, 其中, 还包括: 配置模块; 所述配置模块设置为 配置与电表相关的参数信息, 所述参数信息包括: 通信参数信息和传输方式信 息;
所述信息交互模块设置为根据配置的通信参数信息与相应的电表建立链 接;
所述判断模块设置为根据配置的所述传输方式信息判断传输消息的方式是 否为密文传输。
15. 如权利要求 13所述的集中器, 其中, 所述参数信息还包括: 基础密钥、验证位 生成方式信息和生成周期信息; 所述集中器还包括: 安全策略模块; 所述安全策略模块设置为根据所述基础密钥生成集中器和电表之间传输信 息的会话密钥, 以及根据配置的验证位生成方式信息和生成周期生成验证位信 息; 所述加密模块设置为根据所述会话密钥或基础密钥对待下发的信息进行加 密处理, 或者当所述待下发的消息会话密钥时根据所述基础密钥对待下发的消 息进行加密处理, 当所述待下发的消息不为会话密钥时根据所述会话密钥待对 下发的信息进行加密处理;
所述组装模块设置为对所述验证位信息和加密后的消息进行组装。
16. 如权利要求 13-15任一项所述的集中器, 其中, 还包括验证模块、 解密模块和 异常策略模块; 所述信息交互模块还设置为接收电表上报的消息;
所述验证模块设置为对所述电表上报的消息进行验证; 所述判断模块设置为当所述验证模块对电表上报的消息验证成功时, 判断 电表上报消息的方式是否为密文传输; 所述解密模块设置为当所述判断模块判断上报消息的传输方式为密文传输 时对电表上报的消息进行解密; 所述异常策略模块设置为当所述验证模块验证失败或者当所述解密模块解 密失败时, 进行异常情况处理。
17. 如权利要求 16所述的集中器, 其中, 所述参数信息还包括: 异常类型、异常阈 值和异常处理方式;
23 所述异常策略模块设置为将当前异常情况的类型与配置的异常类型进行匹 配, 若匹配成功, 则判断该种类型的异常情况的数量总和是否小于异常阈值, 若小于, 则根据配置的异常处理方式对当前的异常情况进行处理。
18. 一种电表, 包括: 信息交互模块、 判断模块、 消息存储模块和解密模块; 所述信息交互模块设置为接收集中器下发的消息; 所述判断模块设置为判断是否需要对所述集中器下发的消息进行解密; 所述解密模块设置为当所述判断模块判断需要进行解密时, 对所述集中器 下发的消息进行解密处理;
所述消息存储模块设置为存储解密后的消息。
19. 如权利要求 18所述的电表, 其中, 接收所述集中器下发的消息包括: 接收集中 器下发的安全策略信息, 所述安全策略信息包括会话密钥和验证位信息; 所述 电表还包括安全策略模块; 所述安全策略模块设置为配置电表的基础密钥, 以及存储电表的会话密钥 和电表的验证位信息; 所述解密模块设置为根据所述电表的基础密钥对所述会话密钥进行解密获 取电表的会话密钥, 以及根据所述电表的会话密钥对所述验证位信息进行解密 获取电表的验证位信息。
20. 如权利要求 19所述的电表,其中,接收所述集中器下发的消息还包括接收集中 器下发的配置参数信息,所述配置参数消息包括通信参数信息和传输方式信息; 所述电表还包括验证模块;
所述解密模块设置为根据所述电表的会话密钥对所述配置参数信息进行解 密;
所述验证模块设置为在解密模块解密成功后根据所述电表的验证位信息对 解密后的所述配置参数信息进行验证, 若验证成功, 则将解密后的配置参数信 息存储至所述消息存储模块中。
21. 如权利要求 20所述的电表, 其中, 所述电表还包括: 加密模块和组装模块; 所述信息交互模块还设置为根据存储的所述通信参数信息与集中器建立链 接, 以及将组装后的消息发送给所述集中器;
24 所述判断模块还设置为根据存储的所述传输方式信息判断上报的消息是否 需要进行密文传输; 所述加密模块设置为获取电表待上报的消息, 当所述判断模块判断需要进 行密文传输时, 对待上报的消息进行加密处理;
所述组装模块设置为将存储的验证位信息和加密后的消息进行组装。
25
Figure imgf000028_0001
2
2/12
Figure imgf000029_0001
3
3/12
Figure imgf000030_0001
4
4/12
Figure imgf000031_0001
5
5/12
Figure imgf000032_0001
图 6
Figure imgf000032_0002
7
6/12
Figure imgf000033_0001
图 8
7/12
Figure imgf000034_0001
9
集中器
Figure imgf000034_0003
Figure imgf000034_0002
8/12 集中器 信息交互 配置模块 判断模块
模块
加密模块 组装模块 安全策略
模块 图 11
集中器 信息交互 配置模块 判断模块
模块
加密模块 组装模块
图 12
9/12
Figure imgf000036_0001
Figure imgf000036_0002
Figure imgf000036_0004
Figure imgf000036_0003
10/12 安全策略
电表
模块 解密模块 判断模块 信¾ 互 消息存储
模块
Figure imgf000037_0001
安全策略
电表
模块 信息交互 解密模块 判断模块
模块 消息存储 验证模块
模块
Figure imgf000037_0002
11 /12
安全策略
电表
模块 信息交互 解密模块 判断模块
模块 消息存储 验证模块
模块
加密模块 组装模块
Figure imgf000038_0001
12/12
PCT/CN2014/074554 2013-07-10 2014-04-01 集中器、电表及其消息处理方法 WO2015003512A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201310288973.5 2013-07-10
CN201310288973.5A CN104283675A (zh) 2013-07-10 2013-07-10 集中器、电表及其消息处理方法

Publications (1)

Publication Number Publication Date
WO2015003512A1 true WO2015003512A1 (zh) 2015-01-15

Family

ID=52258189

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2014/074554 WO2015003512A1 (zh) 2013-07-10 2014-04-01 集中器、电表及其消息处理方法

Country Status (2)

Country Link
CN (1) CN104283675A (zh)
WO (1) WO2015003512A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113407252A (zh) * 2021-05-28 2021-09-17 威胜集团有限公司 电能表参数的配置方法、装置、设备及存储介质
CN113595591A (zh) * 2021-07-29 2021-11-02 宁波三星医疗电气股份有限公司 模组终端档案参数同步业务异常自恢复处理方法

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108171957B (zh) * 2016-12-07 2021-11-30 中兴通讯股份有限公司 抄表方法及装置、***、通信网关
CN108848059A (zh) * 2018-05-08 2018-11-20 武汉康慧然信息技术咨询有限公司 桥梁监测方法
CN110034928B (zh) * 2019-03-29 2021-11-02 国网山东省电力公司梁山县供电公司 电能计量信息传输装置及方法
CN111768603A (zh) * 2020-05-30 2020-10-13 深圳市有方科技股份有限公司 燃气抄表方法及终端
CN111865562A (zh) * 2020-07-23 2020-10-30 积成电子股份有限公司 一种配电终端dnp规约中基于aes和hmac-sha的加密方法及***
CN112350875B (zh) * 2021-01-07 2021-03-30 广州技象科技有限公司 一种配置数据的集中管理配置方法及装置
CN113037509B (zh) * 2021-02-05 2022-06-03 宁波三星医疗电气股份有限公司 一种串行通讯方法及应用有该通讯方法的电能表

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101499196A (zh) * 2008-12-30 2009-08-05 北京握奇数据***有限公司 电表充值的方法、装置和***
CN101944995A (zh) * 2009-07-01 2011-01-12 深圳长城开发科技股份有限公司 电力管理***通讯方法
CN202068233U (zh) * 2011-04-21 2011-12-07 宁夏隆基宁光仪表有限公司 基于嵌入式cpu的智能电网监控装置
CN102751784A (zh) * 2011-04-21 2012-10-24 宁夏隆基宁光仪表有限公司 基于嵌入式cpu的智能电网监控装置

Family Cites Families (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
ITMI20012726A1 (it) * 2001-12-20 2003-06-20 Enel Distribuzione Spa Sistema di acquisizione remota dei consumi e di telegestione di utenze distribuite anche di tipo domestico
CN101483665A (zh) * 2008-12-19 2009-07-15 上海城市水资源开发利用国家工程中心有限公司 一种用无线抄表终端网络传输数据的方法
JP2011150662A (ja) * 2010-01-25 2011-08-04 Sony Corp 機器認証システム、及び給電制御方法
CN102377566B (zh) * 2010-08-11 2014-04-09 北京融通高科科技发展有限公司 一种电表数据的安全处理装置及***
JP2012113670A (ja) * 2010-11-29 2012-06-14 Renesas Electronics Corp スマートメータ及び検針システム
CN102496258A (zh) * 2011-11-16 2012-06-13 成都秦川科技发展有限公司 物联网智能电能表及其管理***
CN102496209A (zh) * 2011-11-16 2012-06-13 成都秦川科技发展有限公司 物联网智能热能表及其管理***
CN102438240B (zh) * 2011-12-13 2015-04-29 西安交通大学 基于动态密钥的智能电网无线通信加密方法
WO2013134927A1 (zh) * 2012-03-13 2013-09-19 华为终端有限公司 基于传输层安全的密钥传递方法、智能抄表终端及服务器
CN102685114B (zh) * 2012-04-24 2015-02-11 广东电网公司电力科学研究院 一种基于身份加密的计量数据传输***及数据传输方法
CN202856452U (zh) * 2012-04-28 2013-04-03 成都智达电力自动控制有限公司 一种配电网***
CN102710606A (zh) * 2012-05-08 2012-10-03 深圳市科陆电子科技股份有限公司 一种主站***与集中器本地通信模块进行远程通信的方法
CN102693620B (zh) * 2012-06-12 2013-09-25 上海市电力公司 一种无线抄表***
CN202712974U (zh) * 2012-06-12 2013-01-30 上海市电力公司 一种用电信息采集***
CN102750813A (zh) * 2012-06-12 2012-10-24 上海市电力公司 一种用电信息采集***
CN102711102B (zh) * 2012-06-12 2014-08-13 上海市电力公司 一种无线抄表***
CN102890757B (zh) * 2012-09-11 2015-08-05 中国电力科学研究院 一种电能表软件的比对方法及其比对***
CN102903226B (zh) * 2012-10-18 2014-03-05 杭州海兴电力科技股份有限公司 智能电表通信的数据传输方法
CN102882688A (zh) * 2012-10-24 2013-01-16 北京邮电大学 一种适用于用电信息采集的轻量级认证密钥协商协议
CN102916809B (zh) * 2012-10-29 2014-11-05 西安交通大学 基于状态估计的智能电网控制命令动态认证方法
CN102916813B (zh) * 2012-10-29 2014-12-10 西安交通大学 基于状态估计的智能电网动态数据加密方法
CN103001771B (zh) * 2012-11-14 2015-06-10 广东电网公司电力科学研究院 一种计量自动化***数据传输安全加密方法
CN103001952B (zh) * 2012-11-16 2016-01-20 漳州科能电器有限公司 一种电网加密机共享访问的***及参数更新方法
CN103001763A (zh) * 2012-11-23 2013-03-27 山东电力集团公司 一种用于配电终端维护的加密方法
CN103051450A (zh) * 2012-12-10 2013-04-17 中国电力科学研究院 应用于电力信息采集***的安全任务下发的***和方法
CN103036619B (zh) * 2012-12-21 2018-01-16 中国电力科学研究院 单芯光传输智能通信模块及其应用方法
CN103095696B (zh) * 2013-01-09 2015-08-05 中国电力科学研究院 一种适用于用电信息采集***的身份认证和密钥协商方法

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101499196A (zh) * 2008-12-30 2009-08-05 北京握奇数据***有限公司 电表充值的方法、装置和***
CN101944995A (zh) * 2009-07-01 2011-01-12 深圳长城开发科技股份有限公司 电力管理***通讯方法
CN202068233U (zh) * 2011-04-21 2011-12-07 宁夏隆基宁光仪表有限公司 基于嵌入式cpu的智能电网监控装置
CN102751784A (zh) * 2011-04-21 2012-10-24 宁夏隆基宁光仪表有限公司 基于嵌入式cpu的智能电网监控装置

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113407252A (zh) * 2021-05-28 2021-09-17 威胜集团有限公司 电能表参数的配置方法、装置、设备及存储介质
CN113407252B (zh) * 2021-05-28 2023-06-02 威胜集团有限公司 电能表参数的配置方法、装置、设备及存储介质
CN113595591A (zh) * 2021-07-29 2021-11-02 宁波三星医疗电气股份有限公司 模组终端档案参数同步业务异常自恢复处理方法

Also Published As

Publication number Publication date
CN104283675A (zh) 2015-01-14

Similar Documents

Publication Publication Date Title
WO2015003512A1 (zh) 集中器、电表及其消息处理方法
CN108650227B (zh) 基于数据报安全传输协议的握手方法及***
CN104219228B (zh) 一种用户注册、用户识别方法及***
CN106941491B (zh) 用电信息采集***的安全应用数据链路层设备及通信方法
CN102983965B (zh) 变电站量子通信模型、量子密钥分发中心及模型实现方法
CN105162599B (zh) 一种数据传输***及其传输方法
CN104579679B (zh) 用于农配网通信设备的无线公网数据转发方法
CN105163309B (zh) 一种基于组合密码的无线传感器网络安全通信的方法
CN102111265A (zh) 一种电力***采集终端的安全芯片加密方法
CN109714360B (zh) 一种智能网关及网关通信处理方法
CN101385274A (zh) 受约束的密码术密钥
CN107800675A (zh) 一种数据传输方法、终端以及服务器
CN108900540B (zh) 一种基于双重加密的配电终端的业务数据处理方法
CN101610150B (zh) 第三方数字签名方法和数据传输***
CN111435390B (zh) 一种配电终端运维工具安全防护方法
CN103026657A (zh) 用于防操纵地提供密钥证书的方法和设备
CN109150526A (zh) 密钥协商方法、设备、终端、存储介质以及***
CN101738516A (zh) 一种电子式电能表数据安全传输的方法及电能表装置
WO2013134927A1 (zh) 基于传输层安全的密钥传递方法、智能抄表终端及服务器
KR101481403B1 (ko) 차량용 데이터의 인증 및 획득 방법
CN105208024A (zh) 不使用https的数据安全传输方法及***、客户端和服务端
CN104901803A (zh) 一种基于cpk标识认证技术的数据交互安全保护方法
CN104200154A (zh) 一种基于标识的安装包签名方法及其装置
CN112672342B (zh) 数据传输方法、装置、设备、***和存储介质
CN106453353B (zh) 一种用户终端认证云端的方法

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14823663

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 14823663

Country of ref document: EP

Kind code of ref document: A1