Unlock instant, AI-driven research and patent intelligence for your innovation.

Security processing device and system for electric meter data

A technology for safe processing and data, which is applied to measurement devices and key distribution, and can solve problems such as data encryption that cannot be authenticated

Active Publication Date: 2014-04-09
北京世通凌讯科技有限公司
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The SM1 algorithm is a commercial cipher grouping standard symmetric algorithm supervised by the State Cryptography Administration. The algorithm block length is 128 bits, the key length is 128 bits, and has a large password space, but the SM1 algorithm uses a key to convert 16 bytes The plaintext data block is encrypted into a ciphertext data block, and the authentication data in the smart meter system with the ESAM module is currently 8 bytes. Encrypt business data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security processing device and system for electric meter data
  • Security processing device and system for electric meter data
  • Security processing device and system for electric meter data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0024] Such as figure 1 As shown, it is a structural block diagram of the security processing device for electric meter data in the present invention, which includes: an identity authentication device 101 , a data encryption device 102 , a data decryption device 103 and a MAC verification device 104 . The 8-byte authentication data in the power grid system is converted into 16-byte input data that meets the SM1 algorithm requirements through the safety process...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a security processing device and a security processing system for electric meter data. The device comprises an identity authentication device, a data encryption device, a data decryption device and a measurement and control checking device, wherein an electricity card or power grid equipment accessed into an electric meter is subjected to security authentication and transmitted command data is processed; the security authentication data is negated; a 16-byte security authentication input data block is generated by adding the security authentication data and a negated value; instruction data is divided into sub data blocks with a unit of 16 bytes; and the security authentication input data block and the sub data blocks are encrypted by adopting an SM1 algorithm, so a 4-byte data processing result is generated.

Description

technical field [0001] The invention relates to a smart meter system, in particular to a smart meter system with an ESAM chip, in particular to a safe processing device and system for meter data. Background technique [0002] ESAM (Embedded Security Chip) implements functions such as data storage and security authentication in the smart meter, provides the data information of the user's use of power resources for the smart meter, and provides data information written back for the user card, and also provides charging for the MIS system. and statistics. [0003] Since the ESAM embedded security chip is responsible for the security control of the smart watch in the smart watch, controlling the security of the prepaid recharge and parameter update of the smart watch, the security of the ESAM embedded security chip is the overall security system of the CPU card meter system. important part of the. At present, ESAM embedded security chips are used in smart watches, which have h...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/08G01R22/10
Inventor 何中林常波
Owner 北京世通凌讯科技有限公司