Energy management device and architecture with multiple security levels
First Claim
1. An energy management device for use in an energy management architecture for managing the flow of energy in an energy distribution system, said energy management architecture comprising a network, said energy management device comprising:
- a sensor coupled with said energy distribution system and operative to measure an energy parameter from said energy distribution system;
a processor coupled with said sensor and operative to generate power management data based on said measured energy parameter;
a security module coupled with said processor and operative to encrypt said power management data wherein said encrypted power management data comprises first and second portions, said first portion associated with a first decryption key and said second portion associated with a second decryption key, such that said first portion is capable of being decrypted only with said first decryption key and said second portion is capable of being decrypted with said second decryption key; and
a network interface coupled with said processor and said network and operative to facilitate communications of said encrypted power management data over said network.
0 Assignments
0 Petitions
Accused Products
Abstract
A power management architecture for an electrical power distribution system that includes multiple intelligent electronic devices (“IED'"'"'s”) distributed throughout the power distribution system to manage the flow and consumption of power from the system is disclosed. The IED'"'"'s are linked via a network. Power management application components operate on the IED'"'"'s, and inter-operate via the network to implement a power management application. The architecture provides a secure framework of hardware and software upon which such power management applications can operate to manage the distribution and consumption of electrical power by one or more utilities/suppliers and/or customers which provide and utilize the power distribution system. In particular, each IED is capable of establishing multiple encryption keys that confer different access rights on the IED. The encryption keys affect access to commands that the IED receives and restricts access to communications that the IED sends out over the network.
222 Citations
32 Claims
-
1. An energy management device for use in an energy management architecture for managing the flow of energy in an energy distribution system, said energy management architecture comprising a network, said energy management device comprising:
-
a sensor coupled with said energy distribution system and operative to measure an energy parameter from said energy distribution system;
a processor coupled with said sensor and operative to generate power management data based on said measured energy parameter;
a security module coupled with said processor and operative to encrypt said power management data wherein said encrypted power management data comprises first and second portions, said first portion associated with a first decryption key and said second portion associated with a second decryption key, such that said first portion is capable of being decrypted only with said first decryption key and said second portion is capable of being decrypted with said second decryption key; and
a network interface coupled with said processor and said network and operative to facilitate communications of said encrypted power management data over said network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. An energy management device for use in an energy management architecture for managing the flow of energy in an energy distribution system, said energy management architecture comprising a network, said energy management device comprising:
-
a processor coupled with said energy distribution system and operative to process externally generated power management data;
a security module coupled with said processor and operative to receive said externally generated power management data from said network wherein said externally generated power management data comprises first and second portions, said first portion associated with a first decryption key and said second portion associated with a second decryption key, such that said first portion is capable of being decrypted only with said first decryption key and said second portion is capable of being decrypted with said second decryption key; and
a network interface coupled with said processor and said network and operative to facilitate communications of externally generated power management data over said network. - View Dependent Claims (14, 15, 16, 17)
-
-
18. An energy management device for use in an energy management architecture for managing the flow of energy in an energy distribution system, said energy management architecture comprising a network, said energy management device comprising:
-
an energy distribution system interface coupled with said energy distribution system and operative to perform first and second power management functions with respect to said energy distribution system, said first power management function being associated with a first authentication key and said second power management function being associated with a second authentication key;
a network interface coupled with said network and operative to facilitate communications thereover;
a security module coupled with said network interface and operative to receive a power management command from said network, said power management command operative to instruct said energy distribution system interface to perform at least one of said first power management function, said second power management function, or combinations thereof; and
a processor coupled with said security module and said energy distribution system interface and operative to respond to said power management command to cause said energy distribution system interface to perform said first power management function if said power management command includes said first authentication key and cause said energy distribution system interface to perform said second power management function if said power management command includes said second authentication key. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26)
-
-
27. An energy management architecture for managing the flow of energy in an energy distribution system comprising:
-
a network;
at least one energy management device coupled with a portion of said energy distribution system, each of said at least one energy management device operative to implement at least one power management function in conjunction with said portion of said energy distribution system, said at least one power management function operative to respond to at least one power management command and generate power management data, each of said at least one energy management device comprising;
a processor operative to process said at least one power management function;
a security module coupled with said processor and operative to encrypt said power management data wherein said encrypted power management data comprises first and second portions, said first portion associated with a first decryption key and said second portion associated with a second decryption key, such that said first portion is capable of being decrypted only with said first decryption key and said second portion is capable of being decrypted with said second decryption key; and
a network interface operative to couple said processor and said network, further operative to facilitate transmission of said encrypted power management data over said network and receive said at least one power management command over said network;
said architecture further comprising;
a power management application coupled with said network and operative to receive and process said power management data from said at least one energy management device and generate said at least one power management command to said at least one energy management device to implement said power management function. - View Dependent Claims (28, 29, 30, 31, 32)
-
Specification