Secure remote meter access
First Claim
1. A method of securely accessing a meter from a mobile meter reader, the method comprising:
- identifying, from a plurality of meters, a first one of the meters scheduled to be accessed in a first area in which the mobile meter reader is likely unable to communicate with a host computing system via a network communication;
identifying, from the plurality of meters, a second one of the meters scheduled to be accessed in a second area in which the mobile meter reader is likely able to communicate with the host computing system via the network communication;
before the mobile meter reader is taken to the first area and while the mobile meter reader is in communication with the host computing system;
issuing a first request for authorization to access the first one of the meters, the first request for authorization being issued from the mobile meter reader to the host computing system; and
when the mobile meter reader has sufficient rights to access the first one of the meters, storing a digital signature received from the host computing system that identifies that the mobile meter reader is authorized to communicate with the first one of the meters;
when the mobile meter reader is located in the first area, transmitting an authorization command to the first one of the meters from the mobile meter reader, wherein the authorization command includes the digital signature received from the host computing system before the mobile meter reader was located in the first area; and
when the mobile meter reader is located in the second area, utilizing the network communication to dynamically issue a second request for authorization to access the second one of the meters, the second request for authorization being issued from the mobile meter reader to the host computing system while the mobile meter reader interacts with the second one of the meters.
3 Assignments
0 Petitions
Accused Products
Abstract
Generally described, the disclosed subject matter is directed to improved processes for securely accessing a meter. In accordance with one embodiment, a method for providing a mobile meter reader with an authorization that may be used to establish a secure session with a meter is implemented. In particular, the method includes issuing a request for authorization to access the meter from the mobile meter reader. If the mobile meter reader maintains sufficient rights, an authorization having an encoded digital signature is generated at a host computer system and provided to the mobile meter reader. Then the method formulates and transmits an authorization command to the meter having the encoded digital signature that was generated by the host computing system.
7 Citations
29 Claims
-
1. A method of securely accessing a meter from a mobile meter reader, the method comprising:
-
identifying, from a plurality of meters, a first one of the meters scheduled to be accessed in a first area in which the mobile meter reader is likely unable to communicate with a host computing system via a network communication; identifying, from the plurality of meters, a second one of the meters scheduled to be accessed in a second area in which the mobile meter reader is likely able to communicate with the host computing system via the network communication; before the mobile meter reader is taken to the first area and while the mobile meter reader is in communication with the host computing system; issuing a first request for authorization to access the first one of the meters, the first request for authorization being issued from the mobile meter reader to the host computing system; and when the mobile meter reader has sufficient rights to access the first one of the meters, storing a digital signature received from the host computing system that identifies that the mobile meter reader is authorized to communicate with the first one of the meters; when the mobile meter reader is located in the first area, transmitting an authorization command to the first one of the meters from the mobile meter reader, wherein the authorization command includes the digital signature received from the host computing system before the mobile meter reader was located in the first area; and when the mobile meter reader is located in the second area, utilizing the network communication to dynamically issue a second request for authorization to access the second one of the meters, the second request for authorization being issued from the mobile meter reader to the host computing system while the mobile meter reader interacts with the second one of the meters. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A host computing device comprising:
-
memory comprising machine-readable instructions; and a processor that, when executing the machine-readable instructions, causes the host computing device to; identify, from a plurality of meters, a first one of the meters scheduled to be accessed in a first area in which a mobile meter reader is likely unable to communicate with a host computing system via a network communication; identify, from the plurality of meters, a second one of the meters scheduled to be accessed in a second area in which the mobile meter reader is likely able to communicate with the host computing system via the network communication; receive, from the mobile meter reader before the mobile meter reader is located in the first area and while the mobile meter reader is in communication with the host computing system, a first request for authorization to access the first one of the meters before the mobile meter reader is located in the first area and if the mobile meter reader has sufficient rights to access the first one of the meters, provide a digital signature to the mobile meter reader that identifies that the mobile meter reader is authorized to communicate with the first one of the meters, wherein the mobile meter reader is to formulate an authorization command including the digital signature for transmission to the first one of the meters to activate a secure procedure of the first one of the meters, and wherein the first one of the meters is to decode the digital signature and to activate the secure procedure if the digital signature is authentic; and receive, from the mobile meter reader when the mobile meter reader is located in the second area, a dynamically issued second request via the network communication for authorization of the mobile meter reader to access the second one of the meters, the second request for authorization being issued while the mobile meter reader interacts with the second one of the meters. - View Dependent Claims (12, 13, 14, 15, 16)
-
-
17. A mobile meter reader, comprising:
-
a processor; an interface to communicate with a host computing system, wherein the mobile meter reader is expected to lose connectivity with the host computing system while servicing a first meter while located in a first area including the first meter; a radio-based communication device to communicate with the first meter; and a computer-readable media having computer-executable instructions that, when executed by the processor, cause the mobile meter reader to; when the mobile meter reader is scheduled to service a second meter located in a second area in which continuous connectivity with the host computing system is expected, utilize a network communication to dynamically obtain authorization from the host computing system to access the second meter while the mobile meter reader is located in the second area and interacts with the second meter; when the mobile meter reader is scheduled to service the first meter; request authorization from the host computing system to access the first meter before entering the first area and while in communication with the host computing system via the interface; store an encoded digital signature provided by the host computing system before the mobile meter reader is located in the first area, wherein the digital signature is provided if the mobile meter reader has sufficient rights to access the first meter, and wherein the digital signature identifies that the mobile meter reader is authorized to communicate with the first meter; formulate an authorization command for transmission to the first meter including the encoded digital signature to activate a secure procedure of the first meter; and establish a secure session with the first meter. - View Dependent Claims (18, 19, 20, 21, 22, 23)
-
-
24. A method of securely accessing a meter in a network from a mobile meter reader comprising:
-
determining first service instances in which network connectivity is likely unavailable when the mobile meter reader is deployed in a field of service; determining second service instances in which network connectivity is likely available when the mobile meter reader is deployed in the field of service; if one of the first service instances is scheduled; requesting an authorization to access a first meter corresponding to the scheduled one of the first service instances, wherein the request is issued from the mobile meter reader to a host computing system at a first time prior to deployment of the mobile meter reader in the field of service; storing a digital signature received from the host computing system in memory of the mobile meter reader, wherein the digital signature is provided if the mobile meter reader has sufficient rights to access the first meter, and wherein the digital signature identifies that the mobile meter reader is authorized to communicate with the first meter; and utilizing the stored digital signature after being deployed in the field of service to provide authorization to the first meter, wherein the digital signature is created at the host computing system using a private key, wherein the host computing system withholds the private key from the mobile meter reader; and if one of the second service instances is scheduled, utilizing a network communication after being deployed in the field of service to dynamically request authorization to access a second meter corresponding to the scheduled one of the second service instances, the request for authorization being issued while the mobile meter reader interacts with the second meter. - View Dependent Claims (25, 26, 27, 28, 29)
-
Specification