Unlock instant, AI-driven research and patent intelligence for your innovation.

A kind of authentication method and system based on device mac address

A MAC address and authentication method technology, applied in the encryption field of embedded network devices, can solve problems such as easy to forget or lose, be cracked, fixed, etc., achieve enhanced security effects, improve security and reliability, and save manpower cost effect

Inactive Publication Date: 2016-12-28
SHANGHAI KEENSHINE ELECTRONIC TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] There are common defects in the existing methods: the key KEY must be pre-defined and fixed, so there are the following problems:
[0008] 1) It needs to be kept and burned into the OTP encryption chip by a special person, which is easy to leak
[0009] 2), easy to forget or lose, not easy to maintain
[0010] 3) Although the technical improvement has increased the difficulty of cracking, there is still a risk of being cracked. Once cracked, the product will be copied

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A kind of authentication method and system based on device mac address
  • A kind of authentication method and system based on device mac address
  • A kind of authentication method and system based on device mac address

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0050] refer to figure 2 , is a flowchart of the authentication method in the embodiment of the present invention, including:

[0051] S101. The master control device obtains the MAC address of the device, and verifies the validity of the obtained MAC address of the device;

[0052] Since the MAC address of the device is unique, its validity should also be verified during the process of obtaining the MAC address of the device. For example: when there are two devices with the same MAC address, it can be judged that one of the devices is illegal.

[0053] S102, the main control device converts th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of embedded network equipment encryption, and provides an authentication method and system based on an equipment MAC address. The authentication method comprises the steps of obtaining the MAC address, authenticating the legality of the MAC address, converting MAC address data into a dynamic secrete KEY through a specific conversion algorithm, conducting encryption on the secrete key and random numbers to generate an encrypted ciphertext, conducting decryption on the encrypted ciphertext to obtain a decrypted plaintext and comparing the decrypted plaintext with the random numbers. According to the authentication method and system, hardware and software are combined is the encryption method to execute the encryption function and the decryption function respectively. When equipment is started, the authentication process can only be completed through the matching of an encryption module and a decryption module, and only when the authentication process succeeds, can the equipment work normally. The MAC address is used for generating the secret keys through the secret key generating algorithm, and different secret KEYs can be generated according to different MAC addresses. The authentication method and system based on the equipment MAC address has the advantages that the MAC address is unique, the secret key is also unique, and therefore even if the secret key is cracked, the secret key cannot be used again.

Description

technical field [0001] The invention relates to an encryption method of an embedded network device, in particular to an authentication method and system based on the MAC address of the device. Background technique [0002] Due to the inherent characteristics of electronic products and the development of technology, more and more products are copied, intellectual property rights are violated, and product copyright owners suffer economic losses. It is particularly important to have an encryption system to protect products from being copied. Product encryption system Came into being. After years of fighting between cracking and anti-cracking, different encryption chip manufacturers have launched unique encryption chips. There are two main ways: increase the level of encryption to increase the difficulty of cracking or use a private protocol (imitation I2C protocol) to increase the difficulty of cracking. The basic principle and system composition of this method are similar, t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32
Inventor 陈兵
Owner SHANGHAI KEENSHINE ELECTRONIC TECH CO LTD