Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

MAC address encryption and decryption methods and apparatuses

A MAC address, encryption and decryption technology, applied in the field of embedded software copyright control in production, can solve the problems of low efficiency, poor flexibility, increased labor and time costs, etc.

Active Publication Date: 2016-08-17
SHENZHEN NEW GREENNET TECH +1
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The above two methods have their own disadvantages: the first method requires the software owner to pre-program the Flash chip, place the Flash chip on the chip holder of the prototype, power on and run to modify the MAC address, remove the Flash chip, and provide the chip to the OEM. Increased manpower and time costs; the second method requires the device to be connected to the Internet, which has potential safety hazards, and cannot be used when there is no network connection, poor flexibility and low efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • MAC address encryption and decryption methods and apparatuses
  • MAC address encryption and decryption methods and apparatuses
  • MAC address encryption and decryption methods and apparatuses

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] The present invention will be further described in detail with an embodiment below, but it should be noted that the protection scope of the present invention is not limited thereto.

[0049] In the production process of network equipment, the MAC address of the equipment is often modified with plaintext MAC address commands. In order to protect the copyright of embedded software, the MAC address needs to be encrypted before being set and saved to the equipment; the equipment is decrypted during operation. Get the real MAC address.

[0050] Such as figure 1 , image 3 Shown, the MAC address encryption method of the present invention is as follows:

[0051] Step S01: performing a hash function operation on the MAC address to obtain a check code;

[0052] Step S02: performing a first sequence of functional operations on the MAC address and the check code in step S01 to obtain a pseudo-interference code;

[0053] Step S03: performing a hash function operation on the pse...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses MAC address encryption and decryption methods and apparatuses. The encryption method comprises the following steps: performing a hash function operation on an MAC address to obtain a check code; performing a first sequence function operation on the MAC address and the check code to obtain a pseudo-interference code; performing the hash function operation on the pseudo-interference code to obtain an interference code; performing an exclusive-OR operation on first eleven bits of the MAC address and the interference code to obtain a feature code; and performing a second sequence function operation on the check code, the interference code and the feature code to obtain an MAC key. The method and apparatus disclosed by the present invention free software owners from cumbersome steps of burning the Flash and modifying the MAC address, and a network connection is not required, and efficiency, security and flexibility are greatly improved in addition that the software copyright is protected.

Description

technical field [0001] The invention relates to the field of embedded software copyright control in production, in particular to a method and device for encrypting and decrypting MAC addresses. Background technique [0002] With the continuous advancement of informatization, the development of the Internet has become a national strategy. As the infrastructure for the development of the Internet, the demand for network equipment at all levels is increasing day by day, and the production and processing of network equipment has gradually developed from the traditional self-production method to an OEM factory. The way of cooperation, meanwhile, requires a reliable copyright protection method for embedded software to protect embedded software from being illegally exploited by cooperative foundries. During the production of network devices, the embedded software is usually stored in the Flash device by direct programming, and then the MAC address of the device is modified. If the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/12
CPCG06F21/12G06F21/1011
Inventor 霍焕松
Owner SHENZHEN NEW GREENNET TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products