专利摘要:
authentication of communication sources. methods, systems and apparatus including computer programs encoded on a computer storage medium for authenticating a source of communication are described. in one aspect, a method includes decrypting a token that has been received over a particular communication channel. the token is decrypted using a decryption key that is assigned to the particular communication channel. an error measure is calculated for the encrypted symbol. then a determination is made considering whether measurement error exceeds a measurement error threshold. if the error measure does not exceed the error measure threshold, decrypted symbol is identified as a valid symbol transmitted by a particular endpoint and recorded as such. if the error measurement exceeds the error measurement threshold, the decrypted symbol is identified as a symbol from a different endpoint.
公开号:BR112013007668B1
申请号:R112013007668-2
申请日:2011-09-08
公开日:2022-01-11
发明作者:Damian Bonicatto
申请人:Landis+Gyr Technologies, Llc;
IPC主号:
专利说明:

Cross-reference to related orders
[001] This application claims priority to US application no. Serial 12/894,438, filed on September 30, 2010, the content of which is incorporated by way of reference in full. background
[002] This descriptive report refers to data communications.
[003] Service providers use distributed networks to provide services to customers across large geographic areas. For example, communications companies use a distributed communications network to provide communications services to customers. Similarly, energy companies use a network of power lines and meters to supply energy to customers across a geographic region and receive data back on energy usage.
[004] These service providers rely on the proper operation of their respective networks to provide services to customers and receive data back in relation to the services provided. For example, the service provider may want to access daily usage reports to efficiently charge its customers for resources that are consumed or otherwise used by the customers. Therefore, it is important that data specifying resource usage and other information be transmitted securely and/or received at specified intervals.
[005] In power line communication (PLC) networks, terminals (e.g. meters, load control switches, remote service switches, and other terminals) on the network can provide up-to-date information (e.g. consumption information and/or operating status information) to a network management device by transmitting data over power lines. Each terminal that communicates through a specific PLC network can be implemented to communicate through a different specified channel, such that each terminal on that PLC network communicates through a different channel. However, terminals in neighboring PLC networks can communicate over the same or nearby channels. Therefore, it is possible that communications received over a specific channel of a PLC network may actually be communications transmitted by a neighboring terminal on a neighboring PLC network that have been coupled to the PLC network. If these communications are not identified as being from the neighboring terminal, they could be improperly recorded. summary
[006] In general, an innovative aspect of the matter described in this descriptive report can be incorporated in methods that include the actions of receiving a symbol along a specific communication channel; decrypting the token using a decryption key that is assigned to a specific terminal, which is assigned to the specific communications channel; compute a decrypted symbol error measure; determining whether the measurement error exceeds an error measurement threshold; in response to the determination that the measurement error exceeds the measurement error threshold, identify the decrypted symbol as a symbol from a different terminal; and in response to the determination that the error measurement does not exceed the error measurement threshold: identify the decrypted symbol as a valid symbol transmitted by the specific terminal, and record the valid symbol. Other embodiments of this aspect include systems, apparatus and corresponding switch programs configured to perform the actions of the methods encoded in computer storage devices.
[007] These and other embodiments may each optionally include one or more of the following aspects. Methods can include actions to generate, from the specific terminal, the symbol to include payload data and error correction data; encrypt, from the specific terminal, the token using an encryption key that is assigned to the specific terminal; and transmitting, from the specified terminal, the encrypted symbol over the specified communications channel.
[008] Symbol generation may include inserting an error correction code into the payload data, and symbol encryption may include encrypting the symbol after inserting the error correction code. Receiving a symbol may include receiving a plurality of different symbols over a plurality of different communication channels, each different communication channel being assigned to a different terminal; and decryption of the symbol may include, for each of the different communication channels, decrypting the symbol using a decryption key which is assigned to the terminal to which the communications channel is assigned.
[009] The methods may also include the actions of retrieving, for each different terminal, a different decryption key, which is assigned to the different terminal. Decryption of the token may include decrypting the token with a symmetric key that has been assigned to the specific endpoint. Computing an error measurement comprises computing a bit error rate for the decrypted symbol, and determining whether the error measurement exceeds a measurement error threshold comprises determining whether the bit error rate exceeds a threshold bit error rate.
[010] Receiving a symbol from a specific terminal may include receiving the symbol from a specific meter, along a specific channel of a power line communications network. Symbol decryption comprises decrypting the symbol with a decryption key that is assigned to the specific meter.
[011] Specific modalities of the matter described in this descriptive report can be implemented in order to realize one or more of the following advantages. The source of communications (ie, a sender identity) can be determined and/or confirmed based on the decryption key that properly decrypts the data. The source of communications can be determined independently of any other source identifying data being included in communications. A decryption key used to decrypt communications can be discovered without knowledge of the content of the communication. Interfering signals can be ignored by determining that the signals were not transmitted by an expected source and discarding those interfering signals.
[012] The details of one or more modalities of the matter described in this descriptive report are exposed in the attached drawings and the description below. Other features, aspects and advantages of the subject will become apparent from the description, drawings and claims. Brief description of drawings
[013] Figure 1 is a block diagram of an example network environment in which terminals transmit data.
[014] Figure 2 is a block diagram illustrating an example process flow to authenticate the data communications source.
[015] Figure 3 is a flowchart of an example process to determine the source of incoming communications.
[016] Figure 4 is a flowchart of an example process to generate encrypted data with which the data source can be determined based on the decryption key that properly decrypts the data.
[017] Figure 5 is a block diagram of an example system that can be used to facilitate verification of a communication source.
[018] Similar reference numbers and designations in the various drawings indicate similar elements. Detailed Description
[019] A source of data received over a communication network is determined based on a decryption key that is used to decrypt the data and/or an error measure for the decrypted data. For example, each transmitter on a communication network can be assigned a unique encryption/decryption key pair (or a shared key). Transmitters individually transmit data that is encrypted using their respective unique encryption key, and receivers can be endowed with unique decryption keys that have been assigned to the respective transmitters.
[020] Encrypted data includes error correction data such as early error correction data that was entered prior to data encryption. Therefore, error correction data will be recovered when the data is decrypted, such that a number of bit errors can be determined for the decrypted data. The amount of bit errors that are detected in data that was decrypted using the appropriate decryption key (that is, the decryption key that is paired with the encryption key that was used to encrypt the data) will be lower than the amount of bit errors that are detected in data that was decrypted with another decryption key. In this way, the source of communications can be determined to be the transmitter that has been assigned the decryption key that provides the lowest amount of bit errors.
[021] The description that follows discusses determining whether a specific terminal in a PLC network has transmitted a specific symbol that was received over a specific channel. The description that follows is also applicable to identifying and/or authenticating a source of other data received over a communications channel.
[022] Figure 1 is a block diagram of an example network environment 100 in which terminals 102 transmit data. Network environment 100 includes a service network 101 in which a plurality of terminals 102a-102f are coupled (e.g., communicatively coupled) to substation processing units 104a, 104b. Terminals 102 can be any device capable of transmitting data in the network environment 100. For example, terminals 102 can be meters in a utility network, computing devices, television frequency converter terminals or telephones. which transmit data on the service network 101. The description that follows refers to the terminals 102 as energy meters in a power distribution network. However, the description that follows is applicable to other types of terminals 102 in utility or other networks. For example, the description that follows is applicable to gas meters and water meters which are respectively installed in gas and water distribution networks.
[023] Terminals 102 can be implemented to monitor and report various operating characteristics of the service network 101. For example, in a power distribution network, meters can monitor characteristics related to energy usage in the network. Example characteristics related to grid power usage include average or total power consumption, power surges, power outages, and load changes, among other characteristics. In gas and water distribution networks, meters can measure similar characteristics that are related to gas and water usage (eg pressure and total flow).
[024] Terminals 102 report the operational characteristics of the network 101 through communications channels. Communication channels are portions of spectrum over which data is transmitted. The center frequency and bandwidth of each communication channel may depend on the communications system in which they are implemented. In some implementations, communication channels for utility meters (e.g. energy, gas and/or water meters) may be implemented in power line communication networks that dynamically allocate available bandwidth according to an orthogonal frequency division multiple access (OFDMA) spectrum allocation technique or other channel allocation technique (e.g., time division multiple access, code division multiple access, and other division multiple access techniques frequency).
[025] When 102 terminals are implemented as energy meters in a power distribution network, the energy meters transmit report data that specifies up-to-date meter information that may include measurements of total energy consumption, energy consumption during a specified period of time, peak power consumption, instantaneous voltage, peak voltage, minimum voltage, and other measures related to energy consumption and power management (eg, load information). Each of the power meters can also transmit status data that specifies a status of the power meter (e.g., operating in a normal operating mode, emergency power mode, or another state such as a recovery state after a power outage). energy).
[026] In some implementations, 106 symbols (ie, one or more bits) including report and/or status data are continuously or intermittently transmitted during a specified unit interval. A unit range is a period of time over which a specific symbol is transmitted. A unit interval for each symbol transmitted by a power meter can be less than or equal to the time interval (ie 1/refresh rate) at which updated meter information is required to be provided.
[027] For example, assume that a specific meter is required to provide meter information updated every 20 minutes (ie, the refresh rate specified for the meter). In this example, a meter might transmit a symbol that represents a first set of updated meter information for twenty minutes, and then transmit another symbol that represents a next set of updated meter information for a subsequent twenty-minute period. The refresh rate and/or unit range for a meter can be specified by a network administrator based on, for example, the types and amounts of meter update information being received from the meter, a customer's preferences (for example , a power company) to whom the data is being supplied, and/or channel characteristics of the channel over which the data is being transmitted. A refresh rate of 20 minutes is used for example purposes, but other refresh rates (eg 1 minute, 5 minutes, 10 minutes, 1 hour or 1 day) can be used.
[028] In figure 1, terminals 102a-102c and 102d-102f transmit symbols 106a, 106b over communication channels to substation processing units 104a, 104b, respectively. A substation processing unit (SPU) 104 is a data processing apparatus that receives communications from terminals 102 to manage the service network 101 or for transmission to a network management apparatus 112 and/or over a network. 110. For example, an SPU 104 may include a receiver that receives symbols 106 from terminals 102 and records data from symbols 106. An SPU 104 may also act on data received from terminals 102 and transmit symbols 106 to a network management apparatus 112 that manages the service network 101. SPUs 104 may transmit individual symbols 106 or generate a consolidated packet 108 that includes multi-symbol data 106 received from terminals 102.
[029] In some implementations, a single SPU 104 may be configured to receive tokens 106 from thousands of terminals 102 and transmit tokens 106 to a network management apparatus 112. A network management apparatus 112 is a data processing apparatus. data that processes communications that are received from SPUs 104 and/or controls aspects of the service network based, at least in part, on information extracted from symbols 106 that were received from SPUs 104a, 104b.
[030] For example, in a PLC network, the network management apparatus 112 may receive data indicating that energy usage is significantly higher in a specific portion of a power network than in other portions of the power network. Based on this data, the network management apparatus 112 can allocate additional resources to that specific portion of the network (i.e., load balance) or provide data specifying that there is increased energy usage in the specific portion of the power network.
[031] In some implementations, the network management apparatus 112 provides data to user devices 118 that can be accessed, for example, by the network operator, maintenance personnel and/or customers. For example, data identifying the increased use of energy described above can be provided to a user device 118 accessible by the network operator, which can in turn determine appropriate action in relation to the increased use. Additionally, data identifying a usage time measurement and/or a peak demand measurement may also be provided to user device 118. Similarly, if there is a power outage, network management apparatus 112 may provide data to user device 118. 118 that are accessible by clients to provide information regarding the existence of outage and potentially provide information estimating an outage duration.
[032] The data network 110 can be a wide area network (WAN), local area network (LAN), Internet, or any other communications network. The data network 110 can be implemented as a wired or wireless network. Wired networks may include any media-limited networks including, but not limited to, networks implemented using metallic wire conductors, fiber optic materials or waveguides. Wireless networks include all free space propagating networks including, but not limited to, networks implemented using free space optical and radio wave networks. Although only two SPUs 104a, 104b and a network management appliance 112 are shown, the service network 101 may include many different SPUs 104 that can communicate individually with thousands of terminals 102 and many different network management appliances 112 that can individually communicate with multiple SPUs 104.
[033] Symbols 106 from a specific terminal 102 (e.g. 1'02a) can be transmitted over one of thousands of communications channels in a PLC system. For example, each terminal 102 can be assigned a specific channel using OFDMA or another channel allocation technique. Channel assignments for terminals 102 that communicate with specific SPUs may be stored, for example, in an assignment data store 114 that is accessible to network management apparatus 112 and/or SPUs 104a, 104b. For example, as illustrated in Figure 1, the assignment store can maintain an index of endpoints (e.g. EP1-EPi), the channel that the terminal was assigned to (C1-Ci) and the SPU (e.g. SPU1-SPUx ) which is responsible for receiving symbols transmitted by the respective terminals.
[034] An SPU 104 may use channel assignments, for example, to determine which terminal 102 has transmitted symbols 106 that are received over each of the communications channels. In turn, the SPU 104 can register (i.e., store) the symbols 106 based on the identity of the terminal 102 that transmitted the symbol 106. For example, using channel assignments, the SPU 104b can determine that the terminal 102b has been channel 1 is assigned. In this example, when the SPU 104b receives symbol 106b through channel 1, the SPU 104b may record the symbol 106b in memory as a symbol for the terminal 102d.
[035] Generally, the channel through which a token 106 is received is a secure indicator of the terminal 102 from which the token 106 was received. For example, when the service network 101 is operating in a normal operating state, transmissions by a specific terminal 102 over a specific channel will generally have magnitudes that are higher than any interfering signals present on the specific channel. Therefore, symbols 106 that are received over the specific channel are likely to be the symbols that were transmitted by the specific terminal 102 that was assigned the specific channel.
[036] However, as characteristics of the service network 101 change the signal characteristics (eg, signal-to-noise ratios and signal amplitude) of symbols 106 and other data transmitted over the channel also change. For example, when a capacitor bank is activated, the amplitudes of symbols received at one or more of the SPUs 104a, 104b and/or one or more of the terminals 102a-102f may drop because the impedance of the capacitor bank may be lower than than that of the SPUs 104a, 104b and/or the terminals 102a-102f, respectively. Therefore, more current flows to the capacitor bank than SPUs 104a, 104b and/or terminals 102a-102f. therefore, the amplitude of symbols 106 received at SPUs 104a, 104b may drop when the capacitor bank is activated.
[037] Transmission characteristics of the individual channels may also vary over time, for example due to changes in the environment in which the service network 101 is located (e.g. increased noise from noise sources near network components). or interfering signals from neighboring networks). As the transmission characteristics of the service network 101 change, the amplitude of symbols 106 being received by an SPU 104 through one or more channels may drop, such that interfering signals on the channel may have higher amplitudes than the symbols. 106 that are being transmitted by the terminal that has been assigned to the channel. When the amplitudes of interfering signals (e.g. 152) on a specific channel are higher than the amplitude of symbols (e.g. 106b) being transmitted by a specific terminal (e.g. 102d) that has been assigned to the channel, the SPU (eg, 104b) can record the interfering signals as symbols 106 that were received from the specific terminal.
[038] For example, a power outage in the utility network 101 can cause the amplitudes of symbols 106b transmitted by terminal 102d to approach zero. As the amplitude of symbols 106b drops, the amplitude of interfering data 152 that is electrically coupled on the specific channel from a neighboring service network 150 may exceed the amplitude of symbols 106b. therefore, the SPU 104b can record the interfering data 152 as a symbol 106b from the terminal 102d unless the SPU 104 can determine that the interfering data 152 is not transmitted by the terminal 102d.
[039] Symbols 106 transmitted over a power line communication network are generally limited in the number of bits that are transmitted during a unit interval. Therefore, symbols 106 may not include data identifying a source of the symbol. Therefore, it can be difficult to determine whether data received at an SPU 104 was transmitted by the specific terminal 102 that is assigned to the specific channel over which the data was received.
[040] Instead of (or in addition to) inserting data into a symbol that identifies the source of a symbol (eg, the terminal that transmitted the symbol), encryption techniques can be used to identify a source of a specific symbol. In some implementations, each of the terminals 102 is assigned a unique encryption key that the terminal 102 uses to encrypt symbols 106 that are transmitted by the terminal 102, and a unique decryption key that is used to decrypt symbols 106 that have been transmitted by terminal 102. Unique encryption and decryption keys may be assigned, for example, by SPU 104 and/or network management apparatus 112. In some implementations, each of terminals 102 is assigned Advanced encryption and decryption keys Encryption Standard (“AES”). The AES encryption technique is provided for example purposes, but other encryption techniques can also be used. Encryption keys for each of the endpoints may be stored, for example, in assignment data store 114 in a similar manner to that used to store channel assignments for the endpoints.
[041] When symbols 106 transmitted by different terminals respectively require a different decryption key to retrieve the data of the respective symbols, the specific terminal that transmitted a specific symbol can be identified based on the decryption key that was used to retrieve the data from the symbol. For example, different unique decryption keys may be required to properly decrypt symbols 106 that are transmitted by each of the terminals 102a-102f. in this example, when a token is properly decrypted (e.g., retrieved accurately with less than a threshold amount of errors) using the decryption key unique to terminal 102b, the source of token 106 can be identified as terminal 102b. similarly, when a specific symbol is properly decrypted using the unique decryption key that has been assigned to terminal 102d, the source of that specific symbol can be identified as 102d.
[042] When the original data that was included in unencrypted symbols is available to the SPU 104 (or other data processing apparatus) which decrypts the symbols using a specific decryption key, the SPU 104 can compare the decrypted symbols with the original data to determine if the symbols were properly decrypted using the specific decryption key. For example, the SPU 104 can perform a bit-by-bit or word-by-word analysis of the data to determine whether the decrypted symbols match the original data.
[043] When the original data is not available to the SPU 104 which decrypts the symbols using the specific decryption key, a data encoding technique such as an early error correction technique (e.g. Reed-Solomon encoding) may be used to determine whether the decrypted symbols match the original data. As described in more detail below, before encrypting the original data, the terminal 102 may insert early error correction data into the symbols. This early error correction data can be used post-decryption by the SPU 104 to determine an error measurement (eg, a bit error rate or amount of bit errors) for the decrypted symbols.
[044] The SPU 104 can use error measurement to determine whether to record symbols as valid symbols and/or which terminal transmitted the symbols. For example, if the SPU 104 determines that the error measurement for the symbols does not exceed a threshold error measurement, the SPU 104 can determine that the symbols were properly decrypted using the specific decryption key. Therefore, the SPU 104 may determine that the tokens were transmitted by the terminal 102 to which the specific decryption key was assigned, and record the tokens as valid tokens for that terminal 102. If the SPU 104 determines that the error measurement for symbols is above an error threshold, the SPU 104 may determine that the symbols were not properly decrypted and ignore and/or discard the symbols.
[045] Figure 2 is a block diagram illustrating an example process flow 200 for authenticating the data communications source. The process flow begins with a terminal 102 generating or receiving payload data 202 to be transmitted over a communications network. Payload data may be, for example, report data, status data and/or other data to be transmitted by terminal 102.
[046] The payload data 202 is input to an error correction apparatus 204. The error correction apparatus 204 is a data processing apparatus which is configured to create an encoded symbol 206 that includes the payload data 202 and error correction data. For example, the error correction apparatus may include one or more processors that are configured to encode the payload data with redundant data that can be used to facilitate an early error correction technique. Error correction apparatus 204 transmits encoded symbol 206 which includes payload data and error correction data.
[047] The encoded token 206 is then input into a cryptographic apparatus 208. The encryption apparatus 208 is a data processing apparatus that is configured to encrypt the encoded token 206. For example, the encryption apparatus 208 may include a or more processors that are configured to encrypt the encrypted token 206 using an AES encryption key that has been uniquely assigned to the terminal 102. The encryption apparatus 208 may also utilize other types of encryption algorithms that have been used to generate encryption keys that have been assigned to terminal 102. Encryption apparatus 208 may obtain the encryption key that has been assigned to terminal 102, for example, from a data store in which encryption keys are indexed according to the terminal to which each encryption key respective has been assigned. The encryption apparatus 208 transmits an encrypted symbol 210 for transmission over the communications network.
[048] The encrypted symbol is received by an SPU 104 which includes a decryption apparatus 212. The decryption apparatus 212 is a data processing apparatus which is configured to decrypt encrypted symbols 210. For example, the decryption apparatus 212 may include one or more processors that are configured to decrypt the encrypted token 210 using an AES decryption key that has been uniquely assigned to the terminal 102. The decryptor 212 may also utilize other types of decryption techniques that have been used to generate decryption keys which have been assigned to the terminal 102. The decryption apparatus 212 can obtain the decryption key for the terminal, for example, from a data store in which the decryption keys are indexed according to the terminal to which each decryption key respective decryption has been assigned. The decryption apparatus transmits decrypted data 214.
[049] The decrypted data 214 is provided as input to an error correction apparatus 216. The error correction apparatus 216 is a data processing apparatus which is configured to perform an error correction technique using the decrypted data 214 For example, the error correction apparatus 216 may include one or more processors that are configured to recover payload data 202 from the decrypted data. The error correction apparatus 216 may also be configured to compute an error measurement for the decrypted data 214. For example, the error correction apparatus may compute an amount of bit errors, a bit error rate and /or other error measurements using the decrypted data and the selected error correction technique.
[050] Error correction apparatus 216 transmits an error measurement of payload data 218 (eg, a bit error rate) and/or recovered payload data. The SPU 104 acts based on the magnitude of the payload error measurement, as described in more detail with reference to Figure 3. For example, the SPU 104 may ignore and/or discard retrieved payload error data when the payload error measurement payload 218 exceeds a prespecified error threshold, and record the retrieved payload data as valid data when the payload error measurement 218 does not exceed the prespecified error threshold.
[051] Figure 3 is a flowchart of an example process 300 for determining the source of incoming communications. Process 300 is a process by which a symbol is received over a specific communications channel. The token is decrypted using a decryption key that is assigned to a specific terminal assigned to the specific communications channel. An error measurement is computed for the decrypted symbol, and a determination is made whether the error measurement exceeds a threshold error. If the measurement error exceeds the threshold error, the symbol is identified as a symbol from a different terminal. If the error measurement does not exceed the error threshold error, the symbol is identified as a valid symbol transmitted by the specific terminal, and recorded as such.
[052] Process 300 may be implemented, for example, by SPU 104 and/or network management apparatus 112 of figure 1. In some implementations, one or more processors are configured to perform actions of process 300. In other implementations, computer readable media may include instructions that when executed by a computer cause the computer to perform actions of process 300. Process 300 is described with reference to symbols that are received through channels of a PLC network, but process 300 may also be implemented in other communications environments.
[053] A token is received over a specific communications channel (302). In some implementations, the specific communications channel is a specific channel in a PLC network over which a specific terminal communicates. For example, as described with reference to Figure 1, channels in a PLC network can be dynamically allocated (assigned) to terminals using ODFM or another channel allocation technique. Channel assignments (e.g. a mapping and/or table of channels that are assigned to respective terminals) can be stored in a data store and/or provided to the device, such as terminals and/or network management device, which are implemented on the network. Channel assignments can also be stored in high speed memory (eg Random Access Memory) which is accessible to the device which are implemented in the PLC network.
[054] In some implementations, many different symbols are received over many different communications channels. For example, many different terminals that are individually respectively assigned different communications channels can be received simultaneously (or within a threshold time period) by one terminal. In these implementations, the specific endpoint that is assigned to each of the specific channels over which symbols are being received can be determined using stored channel assignments. For example, stored channel assignments may specify that channel 1 is assigned to terminal 1 while channel 2 is assigned to terminal 2, such that if communications are received simultaneously over channels 1 and 2 it is assumed that communications are terminals 1 and 2, respectively.
[055] The token is decrypted using a decryption key that is assigned to the specific terminal for the specific communications channel (304). As described above, each individual endpoint can be assigned unique encryption/decryption keys. Therefore, the unique decryption key that is assigned to a specific endpoint must be used to properly decrypt symbols that are transmitted by the specific endpoint. Encryption/decryption keys can be symmetric keys that are used, for example, in AES encryption techniques or non-symmetric keys that are used for other encryption techniques.
[056] In some implementations, the encryption/decryption keys that have been assigned to each of the endpoints may be stored in a decryption table that is stored, for example, with channel assignments and/or indexed according to the channel of communications to which keys are assigned. For example, the decryption table may specify that symbols from terminal 1 (i.e., symbols received through channel 1) are to be decrypted using decryption key 1, while symbols received from terminal 1 (i.e., symbols received through channel 1 2) must be decrypted using decryption key 2. Thus, when symbols are received through channel 1, decryption key 1 can be selected and used to decrypt the symbols, while decryption key 2 can be selected and used to decrypt symbols that are received over channel 2.
[057] When multiple symbols are received through multiple channels at substantially the same time, the decryption keys that are assigned to each respective channel (and/or terminal) can be retrieved and used to decrypt the symbols that are received through the respective channels. . For example, each SPU may include multiple decryption devices that are individually respectively assigned to one or more channels. Each of these decryption devices can independently retrieve, access or otherwise obtain the unique decryption key that has been assigned to the endpoint assigned to the channel. In this way, each of the decryption apparatus can simultaneously decrypt symbols received through their respective channels using the appropriate decryption key (i.e., the key that has been assigned to the terminal and/or channel).
[058] An error measurement is computed for the decrypted symbol (306). In some implementations, error measurement is computed for the decrypted symbol as part of an error correction technique that is performed using the decrypted symbol. For example, an early error correction technique (e.g. Reed-Solomon) can be used to perform an error check (e.g. whether the data is valid data), correct bit errors, and/or compute error measurements. for decrypted symbols (for example, based on a number of corrected bits against a total number of bits). Error measurements may include, for example, a total amount of detected bit errors and/or a bit error rate.
[059] A determination is made if the error measurement exceeds a threshold error measurement (308). This determination is referred to as an error check. In some implementations, the decrypted symbol is considered to have passed error checking, for example, when the bit error rate (or other error measurement) does not exceed a threshold bit error rate (or other error rate). threshold). The decrypted symbol fails error checking when the bit error rate (or other error measurement) exceeds the threshold bit error rate (or other threshold error rate).
[060] The threshold error rate can be selected, for example, to ensure that the decrypted symbol is a valid symbol (ie, accurately represents the original payload data in the symbol) with at least a threshold probability. For example, the threshold error rate can be selected as a bit error rate (or other error measurement) at which there is at least a 75% probability that the decrypted symbol is valid.
[061] In response to the determination that the error measurement does not exceed the threshold error measurement, the symbol is identified as a valid symbol that has been transmitted by the specific terminal that is assigned to the channel (310). In some implementations, symbols having an error rate that does not exceed the threshold error rate are determined to have been properly decrypted using the selected decryption key (ie, the decryption key assigned to the specific endpoint). Therefore, when each endpoint is assigned unique decryption keys, symbols that are properly decrypted (i.e., have an error rate that does not exceed the threshold error rate) using the decryption key for a specific endpoint, the symbols can be identified. as symbols that were transmitted by that particular terminal because if the symbols are decrypted using a different decryption key, the error rates for the symbols will generally be above the threshold error rate.
[062] In response to the determination that the token is a valid token, the valid token is registered (eg, stored and/or indexed) as a valid token that was received from the specific terminal (312). The valid symbol may be registered, for example, in a data store which stores valid symbols in association with (that is, in memory locations assigned to or stored with reference to) the specific terminal from which the symbol was received.
[063] In response to the determination that the error measurement exceeds the threshold error measurement, the symbol is identified as a symbol for a different terminal (314). When the symbol is not properly decrypted (that is, has an error rate that exceeds the threshold error rate) using the decryption key of the terminal that is assigned the specific channel, it is likely that the symbol was not transmitted by the specific terminal. Therefore, the symbol can be identified as not having been transmitted by the specific terminal, but rather as having been transmitted by a terminal (or other device) other than the specific terminal. In some implementations, the symbol may be ignored and/or discarded in response to the determination that the error measurement exceeds the threshold error measurement.
[064] Although a symbol may not have been properly decrypted using the selected decryption key, the symbol may still include valid data. For example, the symbol may have been transmitted by another terminal (eg another meter) that belongs to the same communications network as the specific terminal. In this example, the received token may continue to be processed to determine the identity of the terminal that transmitted the token and/or record the data.
[065] In some implementations, the received symbol can be decrypted using another decryption key (316). For example, using the decryption key that is assigned to another terminal that communicates over an adjacent channel (or any other channel) can be selected (eg using the decryption table) to decrypt the token. In these implementations, after the symbol has been decrypted using the other decryption key, an error measurement can be re-computed for the decrypted symbol (306) and a determination can be made whether the error measurement exceeds the error threshold (308).
[066] Decryption (316), error measurement computation (306) and determination of whether the error measurement exceeds the error measurement threshold (308) can be iteratively performed until a decryption key that properly decrypts the symbol is identified, or until all available decryption keys have been used to decrypt the symbol. After a decryption key has been identified a decryption key that properly decrypts the token, the token can be registered as a valid token for the endpoint to which the identified decryption key has been assigned.
[067] In some implementations, the iterative process of decrypting symbols and analyzing the error rate associated with the decrypted symbol can also be used to discover other encoded data without first knowing the content or source of the encoded data. For example, if the location of the error correction bits is known for a specific set of data, the data can be iteratively decrypted using different decryption keys, and error checks can be performed for each instance of the decrypted data. The decryption key that produces decrypted data that passes error checking (eg, has an error rate that does not exceed the threshold error rate) can be selected as the decryption key required to decrypt the symbols. In these implementations, different decryption key permutations and different error checking techniques can be used to identify the decryption/error checking key pair that produces the lowest error rate.
[068] Figure 4 is a flowchart of an example process 400 for generating encrypted data with which the source of the data can be determined based on the decryption key that properly decrypts the data. Process 400 is a process by which a symbol that includes payload data and error correction data is generated. The token is encrypted using an encryption key that is uniquely assigned to the specific terminal, and transmitted over a communications channel. The source of the encrypted symbol may be determined, for example, in a manner similar to that described with reference to Figure 3 regardless of whether the symbol includes payload data identifying the source of the symbol.
[069] Process 400 may be implemented, for example, by terminals 102, SPU 104, and/or network management apparatus 112 of figure 1. In some implementations, one or more processors are configured to perform actions of process 400 In other implementations, computer readable media may include instructions that when executed by a computer cause the computer to perform actions of process 400. Process 400 is described with reference to symbols that are received through channels of a PLC network, however process 400 can also be implemented in other communication environments.
[070] A symbol that includes payload data and error correction data is generated (402). The symbol can be generated, for example, by inserting redundant bits of data into the symbol, where the redundant bits of data can be used to correct errors that may occur during transmission. For example, early error correction techniques can be used to encode payload data.
[071] The token is encrypted using an encryption key that is assigned to the specific endpoint (404). In some implementations, the symbol is encrypted after inserting the error correction data. The encryption key that is assigned to the specific endpoint can be a symmetric encryption key for an AES encryption technique or another encryption key used by another encryption technique. The encryption key can be obtained, for example, from an encryption table that lists encryption keys and endpoints to which encryption keys have been assigned.
[072] The encrypted symbol is transmitted over a communications channel (406). In some implementations, the encrypted token is transmitted over a specific communications channel that has been assigned to a device transmitting the encrypted token. For example, the specific channel may be a channel of a PLC network through which a specific terminal has been authorized to transmit symbols. The channel over which the encrypted symbol is transmitted can be selected, for example, on the basis of a set of channel assignments that specify specific endpoints and specific channels that have been respectively allocated to specific endpoints. symbols from each different device may be transmitted over a different channel.
[073] Figure 5 is a block diagram of an example system 500 that can be used to facilitate verification of a communication source, as described above. System 500 includes a processor 510, memory 520, storage device 530, and input/output device 540. Each of components 510, 520, 530, and 540 may be interconnected, for example, using a system bus 550 Processor 510 is capable of processing instructions for execution on system 500. In one implementation, processor 510 is a single-threaded processor. In another implementation, processor 510 is a multithreaded processor. Processor 510 is capable of processing instructions stored in memory 520 or storage device 530.
[074] Memory 520 stores information on system 500. In one implementation, memory 520 is computer readable media. In one implementation, the 520 memory is a volatile memory unit. In another implementation, the 520 memory is a non-volatile memory unit.
[075] Storage device 530 is capable of providing mass storage for system 500. In one implementation, storage device 530 is computer readable media. In several different implementations, storage device 530 may include, for example, a hard disk device, an optical disk device, or some other large capacity storage device.
[076] Input/output device 540 provides input/output operations to system 500. In one implementation, input/output device 540 may include one or more than one network interface device, for example, a card Ethernet, a serial communication device, for example an RS-232 port, and/or a wireless interface device, for example, and an 802.11 card. in another implementation, the input/output device may include trigger devices configured to receive input data and send output data to other input/output devices, eg keyboard, printer, and 560 display devices. Other implementations, however, can also be used, such as mobile computing devices, mobile communication devices, frequency converter television client devices, etc.
[077] Although an example processing system has been described in Figure 5, implementations of matter and functional operations described in this specification may be implemented in other types of digital electronic circuit assemblies, or in computer software, firmware or hardware, including the structures disclosed in this specification and their structural equivalents, or in combinations of one or more of them.
[078] The subject modalities and operations described in this specification may be implemented in digital electronic circuit assemblies, or in computer software, firmware or hardware, including the structures disclosed in this specification and their structural equivalents, or in combinations of one or more of them. Embodiments of the subject matter described in this specification may be implemented as one or more computer programs, i.e., one or more modules of computer program instructions, encoded on computer storage media for execution by, or for controlling the operation of, the data processing device. Alternatively or additionally, program instructions may be encoded into an artificially generated propagated signal, for example a machine generated electrical, optical or electromagnetic signal, which is generated to encode information for transmission to appropriate receiving apparatus for execution by a data processing device. A computer-readable media may be, or be included in, a computer-readable storage device, a computer-readable storage substrate, a serial or random-access memory device or array, or a combination of one or more thereof. . Furthermore, although a computer storage medium is not a propagated signal, a computer storage medium can be a source or destination of computer program instructions encoded in an artificially generated propagated signal. Computer storage media may also be, or be included in, one or more separate physical components or media (eg, multiple CDs, discs, or other storage devices).
[079] The operations described in this specification may be implemented as operations performed by a data processing apparatus on data stored on one or more computer-readable storage devices or received from other sources.
[080] The term “data processing apparatus” encompasses all types of apparatus, devices and machines for processing data, including by way of example a programmable processor, a computer, a system on a chip, or multiples, or combinations of the above. The apparatus may include special-purpose logic circuitry, for example, an FPGA (field programmable gate array) or an ASIC (application-specific integrated circuit). The apparatus may also include, in addition to hardware, code that creates an execution environment for the computer program in question, for example, code that constitutes processor firmware, a protocol stack, a database management system, a operating system, a cross-platform runtime environment, a virtual machine, or a combination of one or more of them. The appliance and execution environment can realize many different computing model infrastructures, such as network services, grid computing infrastructures, and distributed computing.
[081] A computer program (also known as a program, software, software application, script, or code) can be written in any form of programming language, including compiled or interpreted languages, declaration or procedural languages, and can be deployed in any form, including as a standalone program or as a module, component, subroutine, object, or other unit suitable for use in a computing environment. A computer program can, but need not, correspond to a file on a file system. A program may be stored in a portion of a file that holds other programs or data (e.g., one or more scripts stored in a markup language document), in a single file dedicated to the program in question, or in multiple coordinated files. (e.g. files that store one or more modules, subprograms, or chunks of code). A computer program can be deployed to run on one computer or on multiple computers that are located at one site or distributed across multiple sites and interconnected by a communications network.
[082] The processes and logic flows described in this specification may be performed by one or more programmable processors executing one or more computer programs to perform actions by operating on input data and generating output. Processes and logic flows can also be realized by and apparatus can also be implemented as special-purpose logic circuitry, for example, an FPGA (field programmable gate array) or an ASIC (application-specific integrated circuit) .
[083] Processors suitable for executing a computer program include, by way of example, both general and special purpose microprocessors, and any one or more processors of any type of digital computer. Generally, a processor will receive instructions and data from read-only memory or random access memory or both. The essential elements of a computer are a processor to perform actions according to instructions and one or more memory devices to store instructions and data. Generally, a computer will also include, or be operably coupled to, receive data from or transfer data to, or both, one or more mass storage devices for storing data, for example, magnetic, magneto-optical, or optical disks. However, a computer need not have such devices. In addition, a computer can be embedded in another device, for example, a mobile phone, a personal digital assistant (PDA), a mobile audio or video player, a game console, a Global Positioning System (GPS) receiver. , or a portable storage device (eg, a universal serial bus (USB) flash drive, to name just a few. Appropriate devices for storing computer program instructions and data include all forms of nonvolatile memory, memory devices, and media, including, for example, semiconductor memory devices, for example, EPROM, EEPROM, and flash memory devices; magnetic disks, for example, internal hard disks or removable disks; magneto-optical disks; and CD-ROM and DVD-ROM disks The processor and memory may be supplemented by, or incorporated into, special-purpose logic circuitry.
[084] To provide interaction with a user, modalities of the matter described in this specification may be implemented in a computer having a display device, for example, a CRT (cathode radio tube) or LCD (liquid crystal display) monitor, to display information to the user and a keyboard and pointing device, for example a mouse or a TrackBall, by which the user can provide input to the computer. Other types of devices may be used to provide interaction with a user as well; for example, feedback provided to the user may be any form of sensory feedback, eg visual feedback, auditory feedback, or tactile feedback; and input from the user can be received in any form, including acoustic, speech or tactile input. In addition, a computer can interact with a user by sending documents to and receiving documents from a device that is used by the user; for example, by sending web pages to a web browser on a user's client device in response to requests received from the web browser.
[085] While this specification contains many specific implementation details, these should not be interpreted as limitations on the scope of any inventions or what can be claimed, but rather as descriptions of specific aspects of specific embodiments of specific inventions. . Certain aspects that are described in this specification in the context of separate modalities can also be implemented in combination in a single modality. Conversely, various aspects that are described in the context of a single modality may also be implemented in multiple modalities separately or in any appropriate subcombination. Furthermore, while aspects may be described above as acting in certain combinations and even initially claimed as such, one or more aspects of a claimed combination may in some cases be severed from the combination, and the claimed combination may be directed to a sub-combination or variation. of a subcombination.
[086] Similarly, although operations are depicted in the drawings in a specific order, this should not be understood as requiring that such operations be performed in the specific order shown or in sequential order, or that all illustrated operations be performed, to obtain desirable results. . In certain circumstances multi-threading and parallel processing can be advantageous. Furthermore, the separation of various system components in the embodiments described above is not to be understood as requiring such separation in all embodiments, and it should be understood that the described program components and systems may be generically integrated together into a single software product. or bundled with multiple software products.
[087] In this way, specific modalities of the matter were described. Other embodiments are within the scope of the claims below. In some cases, the actions mentioned in the claims may be performed in a different order and still get desirable results. Furthermore, the processes depicted in the accompanying figures do not necessarily require the specific order shown, or sequential order, to obtain desirable results. In certain implementations, parallel and multi-thread processing can be advantageous.
权利要求:
Claims (15)
[0001]
1. Method performed by a substation processing unit, SPU, the method CHARACTERIZED by comprising: receiving a symbol (106; 206) from a specific terminal device (102) and along a specific communications channel over lines power lines in a power line communication system (101), wherein the specific terminal device (102) is one of a plurality of terminal devices respectively located at different locations to monitor power supplied to loads via the power lines in the system line communication system (101), each of the plurality of end devices being associated with a different communications channel over which the end device communicates over the power lines in the power line communication system (101) ; decrypting the token (106; 206) using a decryption key that is uniquely assigned to the specific terminal device (102), which is assigned to the specific communications channel; calculate an error measure for the decrypted symbol; determining whether the error measure exceeds a threshold error measure; in response to determining that the error measure exceeds the threshold error measure, identifying the decrypted symbol as a symbol of a different terminal device among the plurality of terminal devices; and in response to determining that the error measure does not exceed the threshold error measure: identifying the decrypted symbol as a valid symbol transmitted by the specific terminal device; and register the valid symbol for the specific terminal device (102).
[0002]
2. Method according to claim 1, CHARACTERIZED in that the specific communications channel is allocated for repeated data communications along power lines from a specific terminal device (102), the method further comprising: generating, by the specific terminal device (102), the symbol (206) to include payload data (202) and the error correction data; encrypting, by the specific terminal device (102), the token (206) using an encryption key that is assigned to the specific terminal device (102); and transmitting, by the specified terminal device (102), the encrypted symbol (210) over the specified communications channel.
[0003]
3. Method according to claim 2, CHARACTERIZED by the fact that: generating the symbol comprises inserting an error correction code into the payload data (202), and encrypting the symbol comprises encrypting the symbol (206) after entering the error correction code.
[0004]
4. Method according to claim 1, CHARACTERIZED in that: receiving a symbol (106; 206) comprises receiving a plurality of different symbols over a plurality of different communications channels, each different communications channel being assigned to a different terminal device (102); and decrypting the token (106; 206) comprises, for each of the different communications channels, decrypting the token (106; 206) using a decryption key that is assigned to the terminal device (102) for which the communications channel is assigned.
[0005]
Method, according to claim 4, CHARACTERIZED in that it further comprises retrieving, for each different terminal device (102), a different decryption key, which is assigned to the different terminal device (102).
[0006]
6. Method, according to claim 1, CHARACTERIZED by the fact that decrypting the symbol (210) comprises decrypting the symbol with a symmetric key that has been assigned to the specific terminal device (102).
[0007]
7. Method according to claim 1, CHARACTERIZED by the fact that: calculating an error measure comprises calculating a bit error rate for the decrypted symbol, and determining whether the error measure exceeds a threshold error measure comprises determining if the bit error rate exceeds a threshold bit error rate.
[0008]
8. Method, according to claim 1, CHARACTERIZED by the fact that receiving a symbol from a specific terminal device (102) comprises receiving the symbol from a specific meter, along a specific channel of a line communications network. energy; and wherein decrypting the token comprises decrypting the token with a decryption key that is assigned to the specific meter.
[0009]
Method according to claim 1, CHARACTERIZED in that it comprises: determining that the symbol has been transmitted by the specific terminal device (102), the determination being made based on the error measure for the decrypted symbol not exceeding a threshold error measure ; and in response to determining that the token was transmitted by the specific terminal device (102), recording the decrypted token as a valid token for the specific terminal device (102).
[0010]
10. System CHARACTERIZED in that it comprises: a set of endpoint devices (102a to 102f) in a power line communications network (101), each of the endpoint devices (102a to 102f) in the set being assigned to a different communications channel along which the terminal device communicates via the power lines in the power line communication system (101) and being respectively situated at different locations to monitor power supplied to loads via the power lines; a substation processing unit, SPU, (104a; 104b), coupled to the set of terminal devices (102a to 102f), the SPU (104a; 104b), including one or more processors configured to interact with the set of terminal devices ( 102a to 102f) and further configured to: receive, from a specific terminal device, a token (106; 206) over a specific communications channel; decrypting the token (106; 206) using a decryption key that is uniquely assigned to the specific terminal device that has been assigned to the specific communications channel; calculate an error measure for the decrypted symbol; determining whether the error measure exceeds a threshold error measure; in response to the determination that the error measure exceeds the threshold error measure, identifying the decrypted symbol as a symbol from a different terminal device among the set of terminal devices; and in response to the determination that the error measure does not exceed the threshold error measure: identify the decrypted symbol as a valid symbol transmitted by the specific terminal device, and record the valid symbol for the specific terminal device.
[0011]
11. System according to claim 10, CHARACTERIZED by the fact that the SPU (104a; 104b) is further configured to identify a decryption key that is assigned to the specific terminal based on the specific communications channel.
[0012]
12. System, according to claim 10, CHARACTERIZED by the fact that at least one of the terminal devices (102a to 102f) is still configured to: generate the symbol (106; 206) to include the payload data (202) and error correction data; encrypting the token (106; 206) using an encryption key that is assigned to the specific terminal device; and transmitting the encrypted symbol over the specified communications channel; and wherein at least one terminal device is further configured to: insert an error correction code into the payload data (202); and encrypt the symbol after entering the error correction code.
[0013]
13. System according to claim 10, CHARACTERIZED by the fact that the SPU (104a; 104b) is further configured to: receive a plurality of different symbols (106; 206) over a plurality of different communication channels, each different communications channel being assigned to a different terminal device (102a to 102f); and for each of the different communications channels, decrypting the symbol received over the communications channel using a decryption key that is assigned to the terminal device to which the communications channel is assigned; and wherein the SPU (104a; 104b) is further configured to retrieve, for each different endpoint device, a different decryption key that is assigned to the different endpoint device.
[0014]
14. System according to claim 10, CHARACTERIZED by the fact that the SPU (104a; 104b) is further configured to: calculate a bit error rate for the decrypted symbol, and determine if the bit error rate exceeds a threshold bit error rate; and wherein the set of terminal devices (102a to 102f) is a set of meters in the power line communications network (101).
[0015]
15. System, according to claim 10, CHARACTERIZED by the fact that the SPU (104a; 104b) is further configured to iteratively decrypt the received symbol using different decryption keys, and determine that the symbol is from a terminal device specific based on the decryption key for which the decrypted symbol has a smaller error measure for the symbol.
类似技术:
公开号 | 公开日 | 专利标题
BR112013007668B1|2022-01-11|METHOD CARRIED OUT BY A SUBSTATION PROCESSING UNIT AND SYSTEM FOR AUTHENTICATION OF COMMUNICATION SOURCES
CN106982203B|2020-05-22|Robust ATM network system based on block chain technology and information processing method thereof
BR112013010750B1|2022-01-11|METHOD AND SYSTEM FOR DETECTION AND ASSIGNMENT OF VARIABLE SYMBOL PERIOD
US8325728B2|2012-12-04|Dynamic data routing in a utility communications network
US8615668B2|2013-12-24|Confidential search system and cryptographic processing system
Anzalchi et al.2015|A survey on security assessment of metering infrastructure in smart grid systems
CN103714638A|2014-04-09|Method and system for quickly locating terminal master key downloading failure
US20120078548A1|2012-03-29|Utility Device Management
BR112018011353B1|2020-03-17|METHOD AND SYSTEM FOR PROVISION AND STORAGE OF CRYPTOGRAPHED KEY DISTRIBUTED VIA ELYPTIC CURVE CRYPTOGRAPHY
CN102668503A|2012-09-12|Secure kerberized access of encrypted file system
TWI714219B|2020-12-21|Block chain-based business data encryption method and device
US20130259227A1|2013-10-03|Information processing device and computer program product
US10402172B1|2019-09-03|Multi-source entropy and randomness aggregation and distribution network
CN105119719B|2018-05-04|A kind of key management method of safe storage system
CN108882030A|2018-11-23|A kind of monitor video classification encryption and decryption method and system based on time-domain information
Xu et al.2016|A blockchain based micro payment system for smart devices
US9754100B1|2017-09-05|Credential synchronization management
KR101512502B1|2015-04-16|Ami security system applied with hardware security module
US20180060976A1|2018-03-01|Privacy-preserving smart metering
CN106899550A|2017-06-27|A kind of cloud platform resource monitoring method and device
El-Halabi et al.2012|A distortion-theoretic perspective for redundant metering security in a smart grid
Cheng et al.2013|Design and Implementation of Data Encryptionin Cloud based on HDFS
Xie et al.2015|Privacy-preserving power consumption data measuring protocol for smart grid
Liu et al.2020|Blockchain-based privacy protection scheme for electric energy metering data
EP3859652A1|2021-08-04|Technique for trustless cryptographic verification of energy allocations
同族专利:
公开号 | 公开日
US9009467B2|2015-04-14|
US20120084559A1|2012-04-05|
CA2813175C|2017-01-03|
EP2622787A4|2017-08-02|
BR112013007668A2|2016-08-09|
EP2622787B1|2019-08-28|
US9306736B1|2016-04-05|
MX2013003670A|2013-06-28|
WO2012050690A1|2012-04-19|
US20140126720A1|2014-05-08|
EP2622787A1|2013-08-07|
CA2813175A1|2012-04-19|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题

US5581229A|1990-12-19|1996-12-03|Hunt Technologies, Inc.|Communication system for a power distribution line|
US5477216A|1992-10-30|1995-12-19|General Electric Company|Electrical metering device and associated method for temporarily storing data during transmission of the data to a remote communications device|
US6437692B1|1998-06-22|2002-08-20|Statsignal Systems, Inc.|System and method for monitoring and controlling remote devices|
US6154488A|1997-09-23|2000-11-28|Hunt Technologies, Inc.|Low frequency bilateral communication over distributed power lines|
US6836737B2|2000-08-09|2004-12-28|Statsignal Systems, Inc.|Systems and methods for providing remote monitoring of consumption for a utility meter|
US6170744B1|1998-09-24|2001-01-09|Payformance Corporation|Self-authenticating negotiable documents|
US6177884B1|1998-11-12|2001-01-23|Hunt Technologies, Inc.|Integrated power line metering and communication method and apparatus|
US6529883B1|1999-08-20|2003-03-04|Motorola, Inc.|Prepayment energy metering system with two-way smart card communications|
US6959384B1|1999-12-14|2005-10-25|Intertrust Technologies Corporation|Systems and methods for authenticating and protecting the integrity of data streams and other data|
US6832314B1|1999-12-15|2004-12-14|Ericsson, Inc.|Methods and apparatus for selective encryption and decryption of point to multi-point messages|
US7346463B2|2001-08-09|2008-03-18|Hunt Technologies, Llc|System for controlling electrically-powered devices in an electrical network|
US20030036810A1|2001-08-15|2003-02-20|Petite Thomas D.|System and method for controlling generation over an integrated wireless network|
KR100962153B1|2001-12-05|2010-06-10|퀄컴 인코포레이티드|System and method for adjusting quality of service in a communication system|
US20040107398A1|2002-07-02|2004-06-03|Johnson Ian Robert|Error detection in received data transmissions|
US7742393B2|2003-07-24|2010-06-22|Hunt Technologies, Inc.|Locating endpoints in a power line communication system|
US7102490B2|2003-07-24|2006-09-05|Hunt Technologies, Inc.|Endpoint transmitter and power generation system|
US7180412B2|2003-07-24|2007-02-20|Hunt Technologies, Inc.|Power line communication system having time server|
US7236765B2|2003-07-24|2007-06-26|Hunt Technologies, Inc.|Data communication over power lines|
US7145438B2|2003-07-24|2006-12-05|Hunt Technologies, Inc.|Endpoint event processing system|
US6998963B2|2003-07-24|2006-02-14|Hunt Technologies, Inc.|Endpoint receiver system|
US20060075229A1|2004-09-30|2006-04-06|Marek James A|Method and apparatus for maintaining a communications connection while guarding against bandwidth consuming attacks|
US7443313B2|2005-03-04|2008-10-28|Hunt Technologies, Inc.|Water utility meter transceiver|
US7706320B2|2005-10-28|2010-04-27|Hunt Technologies, Llc|Mesh based/tower based network|
KR101209248B1|2006-02-16|2012-12-06|삼성전자주식회사|Method of data communication between PLC stations belonging to different PLC cells and apparatus therefor|
EP1990934B1|2006-03-01|2014-11-19|NEC Corporation|Wireless communication system, communication terminal, transmission power control method and program for the comunication terminal|
US7450010B1|2006-04-17|2008-11-11|Tc License Ltd.|RFID mutual authentication verification session|
EP1898396A1|2006-09-07|2008-03-12|Deutsche Thomson-Brandt Gmbh|Method and apparatus for encoding/decoding symbols carrying payload data for watermarking of an audio or video signal|
BRPI0807962A2|2007-03-01|2017-05-30|Hunt Tech Llc|signal interruption detection|
WO2008154365A1|2007-06-06|2008-12-18|Hunt Technologies, Llc.|Dsp workload distribution in a power line carrier system|
BRPI0812690A2|2007-07-09|2016-10-04|Gregor Garbajs|"system and method for securely communicating content on demand from a closed network to dedicated devices, and for compiling closed content content usage data to securely communicate content to dedicated devices"|
SE535727C2|2007-10-26|2012-11-27|Damian Bonicatto|Programmable signal splitter|
US8194789B2|2007-12-05|2012-06-05|Hunt Technologies, Llc|Input signal combiner system and method|
US9336160B2|2008-10-30|2016-05-10|Qualcomm Incorporated|Low latency block cipher|
US7954010B2|2008-12-12|2011-05-31|At&T Intellectual Property I, L.P.|Methods and apparatus to detect an error condition in a communication network|
US8144820B2|2008-12-31|2012-03-27|Hunt Technologies, Llc|System and method for relative phase shift keying|
US8238263B2|2009-03-18|2012-08-07|Landis+Gyr Technologies, Llc|Network status detection|
TWI403135B|2009-10-22|2013-07-21|Univ Nat Taiwan|Transmitter, receiver and method for detecting and compensating the carrier frequency offset|
US8666355B2|2010-01-15|2014-03-04|Landis+Gyr Technologies, Llc|Network event detection|
US9037305B2|2010-03-02|2015-05-19|Landis+Gyr Technologies, Llc|Power outage verification|
US8681619B2|2010-04-08|2014-03-25|Landis+Gyr Technologies, Llc|Dynamic modulation selection|
US8325728B2|2010-09-07|2012-12-04|Landis+Gyr Technologies, Llc|Dynamic data routing in a utility communications network|
US8675779B2|2010-09-28|2014-03-18|Landis+Gyr Technologies, Llc|Harmonic transmission of data|
US20120084559A1|2010-09-30|2012-04-05|Hunt Technologies, Llc|Communications Source Authentication|
US8731076B2|2010-11-01|2014-05-20|Landis+Gyr Technologies, Llc|Variable symbol period assignment and detection|US8666355B2|2010-01-15|2014-03-04|Landis+Gyr Technologies, Llc|Network event detection|
US9037305B2|2010-03-02|2015-05-19|Landis+Gyr Technologies, Llc|Power outage verification|
US8681619B2|2010-04-08|2014-03-25|Landis+Gyr Technologies, Llc|Dynamic modulation selection|
US8675779B2|2010-09-28|2014-03-18|Landis+Gyr Technologies, Llc|Harmonic transmission of data|
US20120084559A1|2010-09-30|2012-04-05|Hunt Technologies, Llc|Communications Source Authentication|
US8731076B2|2010-11-01|2014-05-20|Landis+Gyr Technologies, Llc|Variable symbol period assignment and detection|
US8750176B2|2010-12-22|2014-06-10|Apple Inc.|Methods and apparatus for the intelligent association of control symbols|
US8693580B2|2011-03-30|2014-04-08|Landis+Gyr Technologies, Llc|Grid event detection|
US8619846B2|2011-04-21|2013-12-31|Landis+Gyr|Amplitude control in a variable load environment|
US8958487B2|2011-12-22|2015-02-17|Landis+Gyr Technologies, Llc|Power line communication transmitter with amplifier circuit|
US8811529B1|2011-12-22|2014-08-19|Landis+Gyr Technologies, Llc|Power line communication transmitter with gain control|
US8762820B1|2011-12-22|2014-06-24|Landis+Gyr Technologies, Llc|Data communications via power line|
US8737555B2|2011-12-22|2014-05-27|Landis+Gyr Technologies, Llc|Digital signal processing for PLC communications having communication frequencies|
US8842563B1|2011-12-22|2014-09-23|Landis + Gyr Technologies, LLC|Communication and processing for power line communication systems|
US9019121B1|2011-12-22|2015-04-28|Landis+Gyr Technologies, Llc|Configuration over power distribution lines|
US8875003B1|2011-12-22|2014-10-28|Landis+Gyr Technologies, Llc|Interleaved data communications via power line|
US8693605B2|2011-12-22|2014-04-08|Landis+Gyr Technologies, Llc|Coordinating power distribution line communications|
US9106317B1|2011-12-22|2015-08-11|Landis+Gyr Technologies, Llc|Assignment and setup in power line communication systems|
US8848521B1|2011-12-22|2014-09-30|Landis+Gyr Technologies, Llc|Channel allocation and device configuration|
US8989693B1|2011-12-22|2015-03-24|Landis+Gyr Technologies, Llc|Power line network apparatus, system and method|
US8750395B1|2011-12-22|2014-06-10|Landis+Gyr Technologies, Llc|Power line network system and method|
US9106365B1|2011-12-22|2015-08-11|Landis+Gyr Technologies, Llc|Time-keeping between devices using power distribution line communications|
US8711995B2|2011-12-22|2014-04-29|Landis+ Gyr Technologies, LLC|Powerline communication receiver|
US9838226B2|2012-01-27|2017-12-05|Apple Inc.|Methods and apparatus for the intelligent scrambling of control symbols|
US8897398B2|2012-01-27|2014-11-25|Apple Inc.|Methods and apparatus for error rate estimation|
US8990645B2|2012-01-27|2015-03-24|Apple Inc.|Methods and apparatus for error rate estimation|
US9647495B2|2012-06-28|2017-05-09|Landis+Gyr Technologies, Llc|Power load control with dynamic capability|
US9667315B2|2012-09-05|2017-05-30|Landis+Gyr Technologies, Llc|Power distribution line communications with compensation for post modulation|
US9042256B2|2012-10-15|2015-05-26|Broadcom Corporation|Network isolation system|
US9450790B2|2013-01-31|2016-09-20|Apple Inc.|Methods and apparatus for enabling and disabling scrambling of control symbols|
US8917194B2|2013-03-15|2014-12-23|Apple, Inc.|Methods and apparatus for context based line coding|
US9210010B2|2013-03-15|2015-12-08|Apple, Inc.|Methods and apparatus for scrambling symbols over multi-lane serial interfaces|
US9081684B2|2013-08-28|2015-07-14|Landis+Gyr Technologies, Llc|Data recovery of data symbols received in error|
US9306624B1|2015-03-31|2016-04-05|Landis+Gyr Technologies, Llc|Initialization of endpoint devices joining a power-line communication network|
US9461707B1|2015-05-21|2016-10-04|Landis+Gyr Technologies, Llc|Power-line network with multi-scheme communication|
US9525462B1|2015-12-04|2016-12-20|Landis+Gyr Technologies, Llc|Data recovery of data symbols|
US10191506B2|2016-09-29|2019-01-29|Enel X North America, Inc.|Demand response dispatch prediction system including automated validation, estimation, and editing rules configuration engine|
US10270491B2|2017-08-31|2019-04-23|Landis+Gyr Technologies, Llc|Power-line communication systems AMD methods having location-extendable collector for end-point data|
US10340980B1|2018-05-07|2019-07-02|Landis+Gyr Technologies, Llc|Time synchronization apparatuses and methods for power-distribution systems and the like|
US20200145824A1|2018-11-05|2020-05-07|Comcast Cable Communications, Llc|Localized Multi-Factor Network Authentication|
CN109547118B|2018-12-03|2020-09-25|北京捷安通科技有限公司|Method for data transmission by using near-noise bit and client|
法律状态:
2018-12-26| B06F| Objections, documents and/or translations needed after an examination request according [chapter 6.6 patent gazette]|
2020-05-12| B15K| Others concerning applications: alteration of classification|Free format text: A CLASSIFICACAO ANTERIOR ERA: H04L 9/32 Ipc: H04B 3/54 (2006.01), H04L 9/06 (2006.01) |
2020-05-12| B06U| Preliminary requirement: requests with searches performed by other patent offices: procedure suspended [chapter 6.21 patent gazette]|
2021-11-09| B09A| Decision: intention to grant [chapter 9.1 patent gazette]|
2022-01-11| B16A| Patent or certificate of addition of invention granted [chapter 16.1 patent gazette]|Free format text: PRAZO DE VALIDADE: 20 (VINTE) ANOS CONTADOS A PARTIR DE 08/09/2011, OBSERVADAS AS CONDICOES LEGAIS. PATENTE CONCEDIDA CONFORME ADI 5.529/DF, QUE DETERMINA A ALTERACAO DO PRAZO DE CONCESSAO. |
优先权:
申请号 | 申请日 | 专利标题
US12/894,438|US20120084559A1|2010-09-30|2010-09-30|Communications Source Authentication|
US12/894,438|2010-09-30|
PCT/US2011/050850|WO2012050690A1|2010-09-30|2011-09-08|Communications source authentication|
[返回顶部]