User manual for poly-phase meter
33
16 Client management
The meter shall fully support DLMS Security as described in the DLMS/COSEM
Green Book, 8th. And it can transmit the data with/without encryption and
authentication.
Several authentication mechanisms are used to authenticate communication
entities during AA establishment. Data transportation security is based on a role-based
security. Each role has its own access privileges. And all these authentication and
encryption algorithms are limited to security policy. Here below table lists all the roles,
their privileges, authentication mechanism:
Read limited
meter
information, like
the meter serial
number, clock, etc.
Accessible via remote communication
and local interface without any
security
Read meter data
and parameters
Established with authentication HLS
(LLS backup)
Data transmission with none security,
or authentication and encryption
Read meter data,
configure meter
parameters and
control meter
Established with authentication HLS
(LLS backup)
Data transmission with none security,
or authentication and encryption
Receive broadcast
commands, and
push data
Accessible only via remote
communication
Always Established
Data transmission with none security,
or authentication and encryption