by Guest on 2020/03/20 03:08:56 AM
I have no clue about this feature however logically this could involve confirming a remote authenticity by creating a cryptographic algorithm that uses as its seed something unchangable such as the MAC ID on the remote machines network device, this is common for some other cryptographic security mechanisms.
I may be completely wrong, but this sort of fits the description.