Unlock instant, AI-driven research and patent intelligence for your innovation.

Authentication method and system based on equipment MAC address

A technology of MAC address and authentication method, applied in the field of encryption of embedded network equipment, can solve the problems of easy forgetting or loss, being cracked, fixed, etc., to achieve enhanced security effect, improve security and reliability, and save manpower cost effect

Inactive Publication Date: 2013-09-25
SHANGHAI KEENSHINE ELECTRONIC TECH CO LTD
View PDF5 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] There are common defects in the existing methods: the key KEY must be pre-defined and fixed, so there are the following problems:
[0008] 1) It needs to be kept and burned into the OTP encryption chip by a special person, which is easy to leak
[0009] 2), easy to forget or lose, not easy to maintain
[0010] 3) Although the technical improvement has increased the difficulty of cracking, there is still a risk of being cracked. Once cracked, the product will be copied

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method and system based on equipment MAC address
  • Authentication method and system based on equipment MAC address
  • Authentication method and system based on equipment MAC address

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] In order to make the objectives, technical solutions, and advantages of the present invention clearer, the following further describes the present invention in detail with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, but not to limit the present invention.

[0050] See figure 2 , Is a flowchart of the authentication method in the embodiment of the present invention, including:

[0051] S101: The main control device obtains the MAC address of the device, and verifies the legality of the obtained device MAC address;

[0052] Since the MAC address of the device is unique, in the process of obtaining the MAC address of the device, its legality should also be verified. For example: when there are two devices with the same MAC address, it can be judged that one of the devices is illegal.

[0053] S102: The main control device converts the MAC address data ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of embedded network equipment encryption, and provides an authentication method and system based on an equipment MAC address. The authentication method comprises the steps of obtaining the MAC address, authenticating the legality of the MAC address, converting MAC address data into a dynamic secrete KEY through a specific conversion algorithm, conducting encryption on the secrete key and random numbers to generate an encrypted ciphertext, conducting decryption on the encrypted ciphertext to obtain a decrypted plaintext and comparing the decrypted plaintext with the random numbers. According to the authentication method and system, hardware and software are combined is the encryption method to execute the encryption function and the decryption function respectively. When equipment is started, the authentication process can only be completed through the matching of an encryption module and a decryption module, and only when the authentication process succeeds, can the equipment work normally. The MAC address is used for generating the secret keys through the secret key generating algorithm, and different secret KEYs can be generated according to different MAC addresses. The authentication method and system based on the equipment MAC address has the advantages that the MAC address is unique, the secret key is also unique, and therefore even if the secret key is cracked, the secret key cannot be used again.

Description

Technical field [0001] The invention relates to an encryption method for embedded network equipment, in particular to an authentication method and system based on the MAC address of the equipment. Background technique [0002] Due to the inherent characteristics of electronic products and the development of technology, more and more products are copied, intellectual property rights are infringed, and product copyright owners suffer economic losses. An encryption system to protect products from being copied is particularly important. Product encryption system Came into being. After years of fighting against cracking and anti-cracking, different encryption chip manufacturers have introduced unique encryption chips. There are two main ways: increase the encryption level to increase the difficulty of cracking or use a private protocol (i.e. I2C protocol) to increase the difficulty of cracking. The basic principle and system structure of this method are similar. The hardware include...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
Inventor 陈兵
Owner SHANGHAI KEENSHINE ELECTRONIC TECH CO LTD