Method for the secure operation of an electronic consumption data module and consumption data module
10900807 ยท 2021-01-26
Assignee
Inventors
- Thomas Blank (Merkendorf, DE)
- Petra Joppich-Dohlus (Rathsberg, DE)
- Stefan Schmitz (Nuremberg, DE)
- Achim Schmidt (Weissenohe, DE)
- Christian Jambor (Nuremberg, DE)
Cpc classification
G06F16/1734
PHYSICS
H04L63/068
ELECTRICITY
H04Q2209/60
ELECTRICITY
H04Q9/00
ELECTRICITY
International classification
H04Q9/00
ELECTRICITY
Abstract
A method for operating an electronic consumption data module. Consumption data are transmitted via a communication system to a receiver, and different keys are provided for different software authorizations. Command authorizations are defined as software authorizations in the consumption data module. A consumption data module has a memory, a control and/or regulating unit, and a communication device for the consumption data transmission. Different keys are provided for different software authorizations, and the command authorizations are defined as software authorizations in the consumption data module. The consumption data module is operable by the method.
Claims
1. A method for operating an electronic consumption data meter, configured as an ultra sonic flow meter, which comprises the steps of: transmitting consumption data via a communication system to a receiver; providing different keys for different software authorizations of the electronic consumption data meter, wherein command authorizations are defined as the software authorizations in the electronic consumption data meter; protecting metrological characteristics of the electronic consumption data meter by a software authorization, which have write permissions, and contain the following characteristics individually or in combination: gauging, calibration and/or adjustment, the write permissions of the software authorization allowing changes to a calibration of the electronic consumption data meter: and protecting the metrological characteristics disposed in a metrological metering unit by a hardware encapsulation so that the calibration of the electronic consumption data module is accessed only via the software authorization.
2. The method according to claim 1, which further comprises: selecting the communication system from the group consisting of a radio communication system, a wired communication system and an optical communication system; and using at least one key to secure a radio transmission.
3. The method according to claim 1, which further comprises using at least one key to secure configuration data.
4. The method according to claim 1, wherein at least one key for software access authorization is notified selectively to an information recipient.
5. The method according to claim 1, wherein a command transmitted to the electronic consumption data meter without a key providing authorization for the command is not executable by the electronic consumption data meter, and the electronic consumption data meter generates an error signal in an event of an unauthorized command.
6. The method according to claim 1, which further comprises recording and storing an unauthorized access to metrological data.
7. The method according to claim 1, wherein the electronic consumption data meter has an individual identifier, and at least one key from a group of keys is valid for software authorization in a case of an individual identifier of the electronic consumption data meter.
8. The method according to claim 1, wherein validities of the keys for the software authorizations are time-limited.
9. The method according to claim 1, wherein a scope of the software authorization for a key is individually configurable.
10. The method according to claim 1, wherein the electronic consumption data meter is a consumption data radio meter.
11. A consumption data meter, configured as an ultra sonic flow meter, comprising: a memory; a control and/or regulating processor; a metrological meter for recording consumption data; a communication system fora consumption data transmission, and different keys are provided for different software authorizations; ultrasonic transducers connected to said metrological meter; command authorizations are defined as the software authorizations in the consumption data meter; said metrological meter being protected by a software authorization, containing write permissions. wherein it is provided that metrological characteristics of the consumption data meter are stored in said metrological meter and contain at least one of the following characteristics: gauging, calibration and/or adjustment, the write permissions of the software authorization allowing changes to a calibration of the consumption data meter and said metrological meter being protected by a hardware encapsulation so that the calibration of the consumption data module is accessed only via the software authorization.
12. The consumption data meter according to claim 11, further comprising a battery.
13. The consumption data meter according to claim 11, further comprising a module for managing the keys for the software authorizations, said module configured as a hardware and/or software component.
14. The consumption data meter according to claim 11, wherein said communication system has radio communication means, a wired communication means and/or an optical communication means, and at least one key is used to secure a radio transmission.
15. The consumption data meter according to claims 11, wherein at least one of said keys is used to secure configuration data.
16. The consumption data meter according to claim 11, wherein at least one of said keys for a software access authorization is notified selectively to an information recipient.
17. The consumption data meter according to claim 11, further comprising an individual identifier.
18. The consumption data meter according to claim 11, wherein validities of the keys for the software authorizations are time-limited.
19. The consumption data meter according to claim 11, wherein a scope of a software authorization for a key is individually configurable.
20. The consumption data meter according to claim 11, wherein said memory has a non-erasable memory.
21. The consumption data meter according to claim 11, wherein the consumption data meter is a consumption data radio meter.
Description
BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWING
(1)
(2)
(3)
DETAILED DESCRIPTION OF THE INVENTION
(4) Referring now to the figures of the drawings in detail and first, particularly to
(5) The command software authorization relates to rights for the command authorization in the consumption meters 1a-1b. The write software authorization relates to write access to the consumption meters 1a-1b. Further authorization levels may exist within the write access rights. A write permission in the configuration data of the consumption meter 1a-1b may relate, for example, to the transmission intervals for the consumption data and/or the format of the consumption data themselves. In
(6) The keys S.sub.1 and Sa.sub.2-Sb.sub.4 authorize access to different functions in the consumption meters 1a-1b. S.sub.1 thus enables read access in both consumption meters 1a and 1b. Since the consumption meters 1a-1b have individual identifiers and the authorizations of the keys Sa.sub.2-Sb.sub.4 are dependent on the individual identifier, the keys Sa.sub.2-Sa.sub.4 allow no read access in the second consumption meter 1b. The keys Sb.sub.2-Sb.sub.4 similarly grant access to the second consumption meter 1b only and not to the first consumption meter 1a. However, the keys Sa.sub.2-Sa.sub.3 additionally have command authorization rights or write permissions on the consumption meter 1a, The key S.sub.1 can be provided, for example, for an end consumer with a plurality of consumption meters, so that the end consumer can read out both consumption meters 1a-1b with one key S.sub.1, The keys Sa.sub.2 and Sa.sub.3 or Sb.sub.2 and Sb.sub.3 can be provided on the basis of the command authorization rights or write permissions, e.g., for the metering point operator, the network provider, the technical service and/or the manufacturer. The keys Sa.sub.4 and Sb.sub.4 are equipped with the additional metrology right. The user with the key Sa.sub.4 can, for example, modify the calibration of the metrological metering unit 13 of the consumption meter 1a. This facility to intervene in the core systems of the consumption meter 1a is available to highly trusted users only. Only the relevant calibration office or a comparable neutral body is normally a trusted user of this type.
(7) The keys Sa.sub.2-Sa.sub.4 thus grant access exclusively to functions of the first consumption meter 1a, whereas the keys Sb.sub.2-Sb.sub.4 similarly enable access exclusively to functions of the second consumption meter 1b. Conversely, the keys Sa.sub.2 Sa.sub.4 are excluded from access to the second consumption meter 1b and the keys Sb.sub.2-Sb.sub.4 are similarly excluded from access to the first consumption meter 1a.
(8)
(9) The key management module 12 is connected downstream of the communication module 11. Requests via a radio link are received by the communication module 11 and forwarded to the key management module 12. The key management module 12 monitors the keys or the authorizations of the requests which are made to the consumption meter 1. The memory 14 contains a non-erasable memory 14a which is designed here as a calibration log book. Unauthorized access to the metrological data or manipulations and manipulation attempts on the metrological data are noted and stored in this non-erasable memory 14a.
(10)
(11) The following is a summary list of reference numerals and the corresponding structure used in the above description of the invention: 1,1a,1b Consumption data module 2 Antenna 3 Input 4 Output 5a, 5b Ultrasonic transducer 6a, 6b Reflector 7 Metering path 8 Connection housing 10 Electronic module 11 Communication module 12 Key management module 13 Metrological metering unit 14 Memory 14a Non-erasable memory 15 Processor 16 Battery S.sub.1-n Key S.sub.1 Key for read rights S.sub.2 Key for command authorizations S.sub.3 Key for write permissions S.sub.4 Key for metrological characteristics S.sub.5 Key for securing the radio transmission S.sub.6 Key for securing the configuration data