Authentication method and system based on equipment MAC address
A technology of MAC address and authentication method, applied in the field of encryption of embedded network equipment, can solve the problems of easy forgetting or loss, being cracked, fixed, etc., to achieve enhanced security effect, improve security and reliability, and save manpower cost effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0049] In order to make the objectives, technical solutions, and advantages of the present invention clearer, the following further describes the present invention in detail with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, but not to limit the present invention.
[0050] See figure 2 , Is a flowchart of the authentication method in the embodiment of the present invention, including:
[0051] S101: The main control device obtains the MAC address of the device, and verifies the legality of the obtained device MAC address;
[0052] Since the MAC address of the device is unique, in the process of obtaining the MAC address of the device, its legality should also be verified. For example: when there are two devices with the same MAC address, it can be judged that one of the devices is illegal.
[0053] S102: The main control device converts the MAC address data ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 