A kind of authentication method and system based on device mac address
A MAC address and authentication method technology, applied in the encryption field of embedded network devices, can solve problems such as easy to forget or lose, be cracked, fixed, etc., achieve enhanced security effects, improve security and reliability, and save manpower cost effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0049] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.
[0050] refer to figure 2 , is a flowchart of the authentication method in the embodiment of the present invention, including:
[0051] S101. The master control device obtains the MAC address of the device, and verifies the validity of the obtained MAC address of the device;
[0052] Since the MAC address of the device is unique, its validity should also be verified during the process of obtaining the MAC address of the device. For example: when there are two devices with the same MAC address, it can be judged that one of the devices is illegal.
[0053] S102, the main control device converts th...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 