A kind of information anti-lost method based on chip ID number and network/MAC address
Technical field
The invention belongs to computer security technical field, in particular to a kind of technology main control chip ID number and network MAC
The information anti-lost method of location.
Background technique
With the fast development of scientific and technological level, embedded electronic product is more and more general in daily life
And the anti-lost problem of information of electronic product annoyings always major embedded production piece manufacturer.Many embedded product manufacturers
Great effort is put into product development process to go to realize the protection of user information, prevents user's user information due to device losses
By unauthorized theft.
Such as it is disclosed in the patent application document that number of patent application is " 201510601211.5 " a kind of using movement
Internet-mobile phone is looked for something anti-lost method in conjunction with Bluetooth technology, belongs to wireless communication technique field.It looks for something anti-lost method, application
In including bluetooth anti-loss device, owner of lost property's terminal, the system of non-owner of lost property's terminal and server, comprising: answer bluetooth anti-loss device and terminal
It is bound with APP;Owner of lost property's article is lost;Blue tooth interface broadcast radio letter is begun through with the bluetooth anti-loss device for losing article binding
Breath;The information for having lost bluetooth anti-loss device is sent to server by owner of lost property's terminal;Non- owner of lost property's terminal scanning discovery Bluetooth broadcast letter
Breath, discovery lose the bluetooth anti-loss device of article binding, will be found bluetooth anti-loss device information and be sent to server, server analysis
If article has been stated to lose, the bluetooth anti-loss device information for notifying owner of lost property's terminal APP to be found, the bluetooth being found is anti-lost
It include location information in device information.In the invention using Bluetooth technology association anti-loss device and mobile phone, user is by anti-loss device and mobile phone
APP binding in terminal is realized article anti-loss, is lost searching articles with bluetooth connection channel between mobile phone and anti-loss device
Function.However, the application range of bluetooth is fairly limited, for executing the bluetooth transmission means of CLASS2 standard, by power
For, in the case where there is certain obstacle, Bluetooth signal can only transmit 10 meters or so, under conditions of accessible, strictly press
The product of sighting target quasi- manufacture, can reach 30 meters.And executing the blue-tooth device of CLASS1 standard there is obstacle transmission range is 100
Rice, accessible linear distance is up to 300 meters, and such transmission range is whether for anti-lost more demanding or lower use
Family, using effect are very unsatisfactory.
It is for another example disclosed in the patent application document that number of patent application is " 201621105430.0 " a kind of novel
Multi-functional medium and long distance radio frequency anti-lose system, Multifunctional lose-preventing system is connected multiple by anti-lost terminal and with anti-lost terminal
Anti-loss device composition;Anti-lost terminal is also connected with the client software for being equipped with operation anti-loss device;Anti-loss device includes at least main control module
And data transmission module, the power management module, medium and long distance radio-frequency communication module, alarm being connected respectively with main control module
Reminding module;Power management module includes external power interface and rechargeable battery;Anti-lost terminal passes through medium and long distance radio frequency
The mode of communication and multiple anti-loss devices are connected with each other, and are carried out data transmission;Long distance in anti-lost terminal main control module and anti-loss device
Networking function should all be supported from radio-frequency communication module, and it is anti-lost that anti-lost terminal can connect wherein one or more in radio-frequency region
Device.The utility model completes the connection between anti-lost terminal and anti-lost client using radio-frequency technique, and still, radio-frequency technique exists
Following disadvantage: firstly, the equipment connected using radio-frequency technique, manufacturing cost is generally higher, and the manufacture difficulty of radio-frequency apparatus
Also universal higher.Secondly, connection is to rely on radiofrequency signal between radio-frequency apparatus, radiofrequency signal is propagated be highly prone to ring in space
Border interference, finally, the privacy performance of radiofrequency signal is not high, illegal user is easy to interfere and steal the information of user.
Summary of the invention
To solve the above problems, the purpose of the present invention is to provide a kind of using the final equipment of equipment unique encodings and protects
The information anti-lost method based on chip ID number MAC Address of user information.
It is another object of the present invention to provide a kind of information anti-lost method based on chip id and MAC Address, the party
Method safe ready, convenient for operation, suitable for being widely popularized.
To achieve the above object, technical scheme is as follows:
The present invention provides a kind of information anti-lost method based on chip ID number and MAC Address, and this method includes following step
It is rapid:
S1: factory: system software reads the MAC of network chip in the unique ID number and equipment of main control chip in equipment
The ID number and MAC Address are saved on distal end or other servers by location by network, and the general including ID number and MAC Address
All data initializations are software configuration state;
S2: user's registration: after user obtains this equipment by legitimate channels, user is legal use by network registry
The ID number of this equipment and MAC Address are uploaded by network, are matched with legitimate user's account with activation equipment by family, system software,
Cloud or its data server match the corresponding ID number of equipment with MAC Address with account information, and modify this cloud device number
According to for user's state of activation;
S3: user setting: system software asks the user whether to open the anti-lost tracking of equipment automatically;
S4: judge user's use state: equipment normal use simultaneously connects network, and equipment reads IP address by MAC Address,
The IP address is identical as the last time connection IP address of network, then judges that equipment is in normal operating condition, equipment enters normal
Use pattern M1;Equipment connects network, and equipment reads IP address by MAC Address, the IP address and upper one of this connection network
The IP address of secondary connection network is different, then judges that equipment is in abnormal using state, equipment enters abnormal use pattern M2;As closed
Method user confirms that equipment has been lost, and gives application for change by cloud or the sending of other servers, then judges that equipment is in and lose
State, equipment are transferred to missing mode M3;As equipment chip ID number and MAC Address at least one change, then judge
Equipment is in service mode, and equipment is transferred to maintenance mode M4.
Main control chip is all had in smart machine, in the world, each main control chip has its unique ID number, and
The ID number of each main control chip can not be changed.And also equipment has network-control core in the smart machine of each access network
Piece, each network control chip also has unique mac address, and the MAC Address of each network control chip can not also be changed,
Before factory, the MAC Address of the ID number of main control chip and network control chip is uploaded to cloud or other services by system software
In device, the ID number of equipment and MAC Address is called to prepare for subsequent user.After user obtains equipment by legal means, utilize
Cloud or other server registrations be legitimate user, cloud or other servers by the account of legitimate user and equipment ID number and
MAC Address matches activation equipment, and equipment can be used normally in user since then.In use, system software, which reads equipment, connects network
IP, and user's use state is judged according to the IP, according to the different use state real-time tracing equipment dynamic of user, protection is used
Family information.
Further, it includes for following subprocessing step that equipment, which enters normal use mode M1: M11: equipment normal use
And network is connected, equipment reads IP address by MAC Address;
M12: the IP address is identical as the last time connection IP address of network;
M14: the IP address of this connection network, more new equipment link information are sent to cloud or other servers from the background.
When active user connects network, IP address is consistent with IP address when last connection network, then determines that it is normal use shape
State, facility information are normally opened to active user, and active user can normal use this equipment.
Further, it includes following subprocessing step that equipment, which enters abnormal use pattern M2:
M21: equipment connects network, and equipment reads IP address by MAC Address;
M22: the IP address of this connection network is different from the last time connection IP address of network;
M23: the IP address of this connection network is uploaded to cloud or other servers by system software, while backstage is wanted
Information is when active user being asked to input registration to verify user identity;
M24: judge whether the check information of active user's input is accurate, and success is verified if accurate, allows active user
Normal use, equipment is transferred to missing mode M3 if inaccuracy.When active user connects network, IP address connect net with the last time
IP address when network is inconsistent, then is determined as that non-normal use state, system report the exception use information and require current use
Family verifies identity, if active user inputs correct check information, then regards as original annotation volume user, record current IP address and on
The information is reported, facility information opens to active user, if active user can not input correct check information, is then determined as
Illegal user, opening of device missing mode facilitate legitimate user to inquire the IP of illegal user by cloud or other servers,
Effective tracing equipment.
Further, it includes following subprocessing step that equipment, which is transferred to missing mode M3:
M31: locking device forbids active user's access equipment information;
M32: system software reports and submits the IP address of active user's connection network by cloud or other servers;
M33: system software sends warning message to legitimate user by cloud or other servers.Equipment enters loss mould
After formula, equipment locking forbids active user to access user information, prevents active user from stealing the account information of legitimate user, into
One step, system software uploads the IP address of current operation, and legitimate user is facilitated to inquire and chase after by cloud or other servers
Track equipment, system are also alarmed to legitimate user, are reminded legitimate user to pay attention to all devices safety, are guarded against equipment and personal information quilt
It steals.
Further, it includes following subprocessing step that equipment, which is transferred to maintenance mode M4:
M41: system software detects current ID number and MAC Address, and such as only ID number changes, then is transferred to M42;Such as only MAC
Address changes, then is transferred to M43;If ID number changes with MAC Address, then M44 is transferred to;
M42: current ID number is uploaded to data column request verification identical with MAC Address by system software, and system software will
It is required that user inputs the number of registration of legitimate user, if inputting legal and unsuccessful verification, new ID number will upload again and MAC
The identical data column in address and more new data;Otherwise, this equipment will be transferred to missing mode M3;
M43: current MAC address is uploaded data column request verification identical with ID number by system software, will require user's weight
The number of registration of new input legitimate user, if inputting legal and unsuccessful verification, new MAC Address will upload and ID number phase again
Same data arrange and more new data;Otherwise, this equipment will enter missing mode M3;
No. M44:ID will change simultaneously with MAC, and after equipment is connected to network again, this equipment will enter missing mode M3,
User re-enters the registration information of former legitimate user, if inputting legal and unsuccessful verification, new ID number and MAC Address will
Again it uploads and the data of user's registration column and more new data;Otherwise, this equipment will be automatically into missing mode M3.Main control chip
Or network control chip is impaired, user needs to change or repairs main control chip and network control chip, after the completion of maintenance, equipment pair
The ID number for the main control chip answered or the MAC Address of network control chip will change, such as only one change, then only need by
The data to change upload and request to verify, and verifying can successfully assert again, and such as the two changes, then require former conjunction
Method user re-registers account information, and completing registration can normal use.
Present invention has an advantage that compared with the prior art, in the present invention, equipment uploads unique ID of main control chip
Number and network control chip unique mac address, ID number is matched with MAC Address with the account of user's lawful registration, in user
During using equipment, system software confirms that equipment connects the IP address of network, real-time tracing equipment by MAC Address in time
Position, while guaranteeing normal equipment, legal use, avoid equipment stolen, prevent user information from losing.
Detailed description of the invention
Fig. 1 is the flow chart of the information anti-lost method the present invention is based on chip ID number and MAC Address.
Fig. 2 is that the present invention is based on normal use mode M1 in chip ID number and the information anti-lost method of MAC Address
Subprocessing flow chart of steps.
Fig. 3 is that the present invention is based on use pattern M2 abnormal in chip ID number and the information anti-lost method of MAC Address
Subprocessing flow chart of steps.
Fig. 4 is that the present invention is based at the son of missing mode M3 in chip ID number and the information anti-lost method of MAC Address
Manage flow chart of steps.
Fig. 5 is that the present invention is based at the son of maintenance mode M4 in chip ID number and the information anti-lost method of MAC Address
Manage flow chart of steps.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to the accompanying drawings and embodiments, right
The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and
It is not used in the restriction present invention.
To achieve the above object, technical scheme is as follows:
Referring to shown in Fig. 1-2, the present invention provides a kind of information anti-lost method based on chip ID number and MAC Address, the party
Method includes following steps:
S1: factory: system software reads the MAC of network chip in the unique ID number and equipment of main control chip in equipment
The ID number and MAC Address are saved on distal end or other servers by location by network, and the general including ID number and MAC Address
All data initializations are software configuration state;
S2: user's registration: after user obtains this equipment by legitimate channels, user is legal use by network registry
The ID number of this equipment and MAC Address are uploaded by network, are matched with legitimate user's account with activation equipment by family, system software,
Cloud or its data server match the corresponding ID number of equipment with MAC Address with account information, and modify this cloud device number
According to for user's state of activation;
S3: user setting: system software asks the user whether to open the anti-lost tracking of equipment automatically;
S4: judge user's use state: equipment normal use simultaneously connects network, and equipment reads IP address by MAC Address,
The IP address is identical as the last time connection IP address of network, then judges that equipment is in normal operating condition, equipment enters normal
Use pattern M1;Equipment connects network, and equipment reads IP address by MAC Address, the IP address and upper one of this connection network
The IP address of secondary connection network is different, then judges that equipment is in abnormal using state, equipment enters abnormal use pattern M2;As closed
Method user confirms that equipment has been lost, and gives application for change by cloud or the sending of other servers, then judges that equipment is in and lose
State, equipment are transferred to missing mode M3;As equipment chip ID number and MAC Address at least one change, then judge
Equipment is in service mode, and equipment is transferred to maintenance mode M4.
Main control chip is all had in smart machine, in the world, each main control chip has its unique ID number, and
The ID number of each main control chip can not be changed.And also equipment has network-control core in the smart machine of each access network
Piece, each network control chip also has unique mac address, and the MAC Address of each network control chip can not also be changed,
Before factory, the MAC Address of the ID number of main control chip and network control chip is uploaded to cloud or other services by system software
In device, the ID number of equipment and MAC Address is called to prepare for subsequent user.After user obtains equipment by legal means, utilize
Cloud or other server registrations be legitimate user, cloud or other servers by the account of legitimate user and equipment ID number and
MAC Address matches activation equipment, and equipment can be used normally in user since then.In use, system software, which reads equipment, connects network
IP, and user's use state is judged according to the IP, according to the different use state real-time tracing equipment dynamic of user, protection is used
Family information.
Further, it includes for following subprocessing step that equipment, which enters normal use mode M1: M11: equipment normal use
And network is connected, equipment reads IP address by MAC Address;
M12: the IP address is identical as the last time connection IP address of network;
M14: the IP address of this connection network, more new equipment link information are sent to cloud or other servers from the background.
When active user connects network, IP address is consistent with IP address when last connection network, then determines that it is normal use shape
State, facility information are normally opened to active user, and active user can normal use this equipment.
Further, it includes following subprocessing step that equipment, which enters abnormal use pattern M2:
M21: equipment connects network, and equipment reads IP address by MAC Address;
M22: the IP address of this connection network is different from the last time connection IP address of network;
M23: the IP address of this connection network is uploaded to cloud or other servers by system software, while backstage is wanted
Information is when active user being asked to input registration to verify user identity;
M24: judge whether the check information of active user's input is accurate, and success is verified if accurate, allows active user
Normal use, equipment is transferred to missing mode M3 if inaccuracy.When active user connects network, IP address connect net with the last time
IP address when network is inconsistent, then is determined as that non-normal use state, system report the exception use information and require current use
Family verifies identity, if active user inputs correct check information, then regards as original annotation volume user, record current IP address and on
The information is reported, facility information opens to active user, if active user can not input correct check information, is then determined as
Illegal user, opening of device missing mode facilitate legitimate user to inquire the IP of illegal user by cloud or other servers,
Effective tracing equipment.
Further, it includes following subprocessing step that equipment, which is transferred to missing mode M3:
M31: locking device forbids active user's access equipment information;
M32: system software reports and submits the IP address of active user's connection network by cloud or other servers;
M33: system software sends warning message to legitimate user by cloud or other servers.Equipment enters loss mould
After formula, equipment locking forbids active user to access user information, prevents active user from stealing the account information of legitimate user, into
One step, system software uploads the IP address of current operation, and legitimate user is facilitated to inquire and chase after by cloud or other servers
Track equipment, system are also alarmed to legitimate user, are reminded legitimate user to pay attention to all devices safety, are guarded against equipment and personal information quilt
It steals.
Further, it includes following subprocessing step that equipment, which is transferred to maintenance mode M4:
M41: system software detects current ID number and MAC Address, and such as only ID number changes, then is transferred to M42;Such as only MAC
Address changes, then is transferred to M43;If ID number changes with MAC Address, then M44 is transferred to;
M42: current ID number is uploaded to data column request verification identical with MAC Address by system software, and system software will
It is required that user inputs the number of registration of legitimate user, if inputting legal and unsuccessful verification, new ID number will upload again and MAC
The identical data column in address and more new data;Otherwise, this equipment will be transferred to missing mode M3;
M43: current MAC address is uploaded data column request verification identical with ID number by system software, will require user's weight
The number of registration of new input legitimate user, if inputting legal and unsuccessful verification, new MAC Address will upload and ID number phase again
Same data arrange and more new data;Otherwise, this equipment will enter missing mode M3;
No. M44:ID will change simultaneously with MAC, and after equipment is connected to network again, this equipment will enter missing mode M3,
User re-enters the registration information of former legitimate user, if inputting legal and unsuccessful verification, new ID number and MAC Address will
Again it uploads and the data of user's registration column and more new data;Otherwise, this equipment will be automatically into missing mode M3.Main control chip
Or network control chip is impaired, user needs to change or repairs main control chip and network control chip, after the completion of maintenance, equipment pair
The ID number for the main control chip answered or the MAC Address of network control chip will change, such as only one change, then only need by
The data to change upload and request to verify, and verifying can successfully assert again, and such as the two changes, then require former conjunction
Method user re-registers account information, and completing registration can normal use.
Present invention has an advantage that compared with the prior art, in the present invention, equipment uploads unique ID of main control chip
Number and network control chip unique mac address, ID number is matched with MAC Address with the account of user's lawful registration, in user
During using equipment, system software confirms that equipment connects the IP address of network, real-time tracing equipment by MAC Address in time
Position, while guaranteeing normal equipment, legal use, avoid equipment stolen, prevent user information from losing.
The above is merely preferred embodiments of the present invention, be not intended to limit the invention, it is all in spirit of the invention and
Made any modifications, equivalent replacements, and improvements etc., should all be included in the protection scope of the present invention within principle.