Version 1: Release Note 28 November 2014

Encryption of Attributes in Remote Party Messages

Download 4.8 Mb.
Size4.8 Mb.
1   ...   86   87   88   89   90   91   92   93   ...   258

Encryption of Attributes in Remote Party Messages

In some Use Cases, some attributes are marked as Encrypted.

This Section 8 lays out requirements as to how such Encryption and related Decryption shall be undertaken.

    1. Approach - informative

Since ZSE and DLMS have differing data types to represent the same attribute of SMETS information, there are some differences in the format of the data that is encrypted. These differences are laid out in this Section 8. However, Encryption and Decryption use the same cryptographic AES GCM primitives in the same way in all cases, regardless of protocol. The usage is the same as that to generate MACs for Remote Party Message protection, and therefore as per the AES GCM approach laid out in the Green Book.

Encryption of SMETS attributes is required when:

  • the Supplier reads the amounts held in Time Debt Register [1..2] and Payment Debt Register. Each of these is a single integer value;

  • the Supplier reads the values held in the Active Import Register or Secondary Active Import Register. Each of these is a single integer value;

  • a Known Party or an Unknown Party reads one or more entries from a Log (with each entry in the specific log having a Log specific structure), specifically:

        • the current or previous Supplier reads the Billing Data Log (excluding the export related parts), the Daily Read Log or the Prepayment Daily Read Log. Note that a previous Supplier is an Unknown Remote Party as far as the meter is concerned;

        • the Supplier, Network Operator, or an Unknown Remote Party reads the Daily Consumption Log or the Profile Data Log (Consumption parts);

  • a Device sends an Alert containing a single entry from the Billing Data Log (excluding the export related parts).

    1. Directory: government -> uploads -> system -> uploads -> attachment data -> file
      file -> Remove this if sending to pagerunnerr Page Title Light Rail Security Recommended Best Practice
      file -> 8 Section 1 : Sport
      file -> Notice of exercise of additional powers of seizure under Sections 50 or 51 of the Criminal Justice and Police Act 2001
      file -> Home office circular 004/2014 Powers to search for and seize invalid travel documents in Schedule 8 to the Anti-social Behaviour, Crime and Policing Act 2014
      file -> Consultation on the Royal Parks and Other Open Spaces (Amendment) (No. 2) Regulations 2012
      file -> Crown copyright 2012
      file -> This is the Report to Government by the Film Policy Review Panel The brief
      file -> Impact Assessment (IA)
      file -> Dcms/Wolfson Museums and Galleries Improvement Fund a public-Private Partnership (2002-2010)

      Share with your friends:
1   ...   86   87   88   89   90   91   92   93   ...   258

The database is protected by copyright © 2020
send message

    Main page