SECURE METER ACCESS FROM A MOBILE READER
First Claim
1. In a metering environment configured with devices for executing computer-executable instructions, a method of securely accessing a meter from a mobile meter reader, the method comprising:
- issuing a request for authorization to access the meter, the request for authorization being issued from the mobile meter reader to a host computing system;
if the mobile meter reader maintains sufficient rights to access the meter, receiving an authorization from the host computing system having a digital signature that uniquely identifies an authorized entity, the digital signature being provided without distributing a private key used for encoding the digital signature to the mobile meter reader; and
formulating and transmitting an authorization command to the meter from the mobile meter reader, wherein the authorization command includes the digital signature received from the host computing system.
3 Assignments
0 Petitions
Accused Products
Abstract
Generally described, the disclosed subject matter is directed to improved processes for securely accessing a meter. In accordance with one embodiment, a method for providing a mobile meter reader with an authorization that may be used to establish a secure session with a meter is implemented. In particular, the method includes issuing a request for authorization to access the meter from the mobile meter reader. If the mobile meter reader maintains sufficient rights, an authorization having an encoded digital signature is generated at a host computer system and provided to the mobile meter reader. Then the method formulates and transmits an authorization command to the meter having the encoded digital signature that was generated by the host computing system.
-
Citations
20 Claims
-
1. In a metering environment configured with devices for executing computer-executable instructions, a method of securely accessing a meter from a mobile meter reader, the method comprising:
-
issuing a request for authorization to access the meter, the request for authorization being issued from the mobile meter reader to a host computing system; if the mobile meter reader maintains sufficient rights to access the meter, receiving an authorization from the host computing system having a digital signature that uniquely identifies an authorized entity, the digital signature being provided without distributing a private key used for encoding the digital signature to the mobile meter reader; and formulating and transmitting an authorization command to the meter from the mobile meter reader, wherein the authorization command includes the digital signature received from the host computing system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system to prevent an unauthorized entity from tampering with a meter, the system comprising:
-
at least one host computing device configured to receive a request for authorization to access the meter from a mobile meter reader and provide a digital signature to the mobile meter reader that uniquely identifies an authorized entity if the mobile meter reader has sufficient rights to access the meter; a mobile meter reader operative to request authorization to access the meter, receive a digital signature generated by the host computing device, and formulate an authorization command for transmission to the meter to activate a secure procedure of the meter; a meter configured to decode the digital signature and allow activation of the secure procedure if the digital signature is authentic; and wherein activation of the secure procedure occurs without providing the mobile meter reader with access to a private key that is used to encode the digital signature. - View Dependent Claims (11, 12, 13, 14)
-
-
15. A mobile meter reader configured to exchange secure communications with a meter, comprising:
-
a processor; an interface for communicating data between the mobile meter reader and a host computing system; a radio-based communication device for communicating data between the mobile meter reader and a meter; a computer-readable media having computer-executable instructions that, when executed by the processor, cause the mobile meter reader to; request and receive authorization from the host computing system to access the meter; formulate an authorization command for transmission to the meter having a digital signature encoded at the host computing system; and establish a secure session with the meter, wherein a key used by the mobile meter reader to encode data during the secure session is separate from a private key used at the host computing system to encode the digital signature. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification