CN111010397A - Database password modification method and device - Google Patents

Database password modification method and device Download PDF

Info

Publication number
CN111010397A
CN111010397A CN201911308765.0A CN201911308765A CN111010397A CN 111010397 A CN111010397 A CN 111010397A CN 201911308765 A CN201911308765 A CN 201911308765A CN 111010397 A CN111010397 A CN 111010397A
Authority
CN
China
Prior art keywords
database
password
application program
authentication
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201911308765.0A
Other languages
Chinese (zh)
Other versions
CN111010397B (en
Inventor
翟栋男
王照文
秦旭果
邹帮山
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jilin Yillion Bank Co ltd
Original Assignee
Jilin Yillion Bank Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jilin Yillion Bank Co ltd filed Critical Jilin Yillion Bank Co ltd
Priority to CN201911308765.0A priority Critical patent/CN111010397B/en
Publication of CN111010397A publication Critical patent/CN111010397A/en
Application granted granted Critical
Publication of CN111010397B publication Critical patent/CN111010397B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a method and a device for modifying a database password, which comprise the following steps: under the condition that the password of the database needs to be modified, triggering a target application program to log in the database in a mode of identity authentication to a third-party system; randomly generating a target password, and modifying the current password of the database into the target password; when the current password of the database is successfully modified into the target password, determining a configuration file of each application program in an access relation with the database, and modifying the current password of the database pre-stored in each configuration file into the target password; and when the current password of the database in each configuration file is modified into the target password, triggering the database to carry out identity authentication on each application program accessing the database in a password authentication mode. By the method, the application program can normally log in the database in the process of modifying the database password, so that the service is provided for the outside, and the use experience of a user is improved.

Description

Database password modification method and device
Technical Field
The invention relates to the technical field of computers, in particular to a method and a device for modifying a database password.
Background
With the development of information technology, people pay more attention to information security. The database is a key element to be considered when maintaining the information security of the computer. A database is a collection of data stored together in some manner independent of the application. Generally, the authentication means for logging in and operating the database by the application program is password authentication, that is, authentication is performed by using a user name and a user password.
In order to ensure information security, the user password used for password authentication in the database needs to be modified periodically. In the process of modifying the password of the database, the application system corresponding to the database for modifying the password is usually suspended, and then the password for password authentication of the database and the application program in access relation with the database is modified. And after the password of the database is modified and synchronized to each application program in access relation with the database, the application system is started.
By the method, the password of the database is modified, the operation of the application system needs to be stopped, the application system cannot provide service for the user, the normal use of the application system by the user is influenced, and the use experience of the user is reduced.
Disclosure of Invention
In view of this, the embodiment of the present invention provides a method for modifying a database password, so as to solve the problems that when a database password is modified, the operation of an application system needs to be stopped, normal use of the application system by a user is affected, and use experience of the user is reduced.
The embodiment of the invention also provides a device for modifying the database password, which is used for ensuring the actual realization and application of the method.
In order to achieve the above purpose, the embodiments of the present invention provide the following technical solutions:
a method for modifying a database password, comprising:
under the condition that the password of the database needs to be modified, triggering a target application program to log in the database in a mode of identity authentication to a third-party system, wherein the target application program is an application program for accessing the database in the process of modifying the password of the database;
randomly generating a target password, and modifying the current password of the database into the target password;
when the current password of the database is successfully modified into the target password, determining a configuration file of each application program in an access relation with the database, and modifying the current password of the database pre-stored in each configuration file into the target password;
and when the current password of the database stored in each configuration file in advance is modified into the target password, triggering the database to carry out identity authentication on each application program accessing the database in a password authentication mode.
Optionally, the method for triggering the target application to log in the database in a manner of authenticating an identity to a third-party system includes:
sending a first authentication change instruction to the database to indicate that the database triggers the target application program to send a preset digital certificate to the third-party system to request identity authentication when receiving a login request sent by the target application program;
when the digital certificate sent by the target application program is received, performing identity authentication on the target application program according to the digital certificate;
when the identity of the target application program is authenticated, generating an authentication identifier corresponding to the target application program;
and respectively sending the authentication identification to the database and the target application program, and triggering the target application program to apply the authentication identification to carry out identity authentication on the database so as to log in the database.
Optionally, the above method, wherein generating the authentication identifier corresponding to the target application includes:
determining the application equipment where the target application program is located;
acquiring the MAC address of the application equipment;
and generating a token corresponding to the MAC address according to the MAC address, and taking the token as an authentication identifier corresponding to the target application program.
Optionally, the triggering the database to perform identity authentication on each application accessing the database in a password authentication manner includes:
and sending a second authentication change instruction to the database to indicate that the database performs identity authentication on each application program accessing the database in a password authentication mode when receiving a login request sent by the application program.
The above method, optionally, further includes:
and encrypting the target password, and storing the encrypted target password in a preset specified file.
The above method, optionally, further includes:
and sending the target password to a preset electronic mailbox.
An apparatus for modifying a database password, comprising:
the system comprises a first triggering unit, a second triggering unit and a third party system, wherein the first triggering unit is used for triggering a target application program to log in a database in an identity authentication mode to a third party system under the condition that a password of the database needs to be modified, and the target application program is an application program for accessing the database in the password modification process of the database;
the first modification unit is used for randomly generating a target password and modifying the current password of the database into the target password;
the second modification unit is used for determining a configuration file of each application program in an access relation with the database when the current password of the database is successfully modified into the target password, and modifying the current password of the database prestored in each configuration file into the target password;
and the second triggering unit is used for triggering the database to carry out identity authentication on each application program accessing the database in a password authentication mode when the current password of the database stored in each configuration file in advance is modified into the target password.
The above apparatus, optionally, the first triggering unit includes:
the first sending subunit is configured to send a first authentication change instruction to the database to indicate that the database triggers the target application program to send a preset digital certificate to the third-party system to request identity authentication when receiving a login request sent by the target application program;
the authentication subunit is used for performing identity authentication on the target application program according to the digital certificate when receiving the digital certificate sent by the target application program;
the first generating subunit is configured to generate an authentication identifier corresponding to the target application program when the identity of the target application program passes authentication;
and the second sending subunit is used for respectively sending the authentication identifier to the database and the target application program, and triggering the target application program to apply the authentication identifier to perform identity authentication on the database so as to log in the database.
The above apparatus, optionally, the first generating subunit includes:
a determining subunit, configured to determine an application device where the target application program is located;
an obtaining subunit, configured to obtain an MAC address of the application device;
and the second generation subunit is used for generating a token corresponding to the MAC address according to the MAC address, and taking the token as an authentication identifier corresponding to the target application program.
The above apparatus, optionally, the second triggering unit includes:
and the third sending subunit is configured to send a second authentication change instruction to the database to instruct the database to perform identity authentication on each application program accessing the database in a password authentication manner when receiving the login request sent by the application program.
The above apparatus, optionally, further comprises:
and the encryption unit is used for encrypting the target password and storing the encrypted target password into a preset specified file.
The above apparatus, optionally, further comprises:
and the sending unit is used for sending the target password to a preset electronic mailbox.
The method for modifying the database password provided by the embodiment of the invention comprises the following steps: under the condition that the password of the database needs to be modified, triggering a target application program to log in the database in a mode of identity authentication to a third-party system, wherein the target application program is an application program for accessing the database in the process of modifying the password of the database; randomly generating a target password, and modifying the current password of the database into the target password; when the current password of the database is successfully modified into the target password, determining a configuration file of each application program in an access relation with the database, and modifying the current password of the database pre-stored in each configuration file into the target password; and when the current password of the database stored in each configuration file in advance is modified into the target password, triggering the database to carry out identity authentication on each application program accessing the database in a password authentication mode.
By the method for modifying the database password, the target application program needing to log in the database can be triggered to log in the database in an identity authentication mode to a third-party system in the modification process of the database password. And under the condition that the third-party system undertakes the identity authentication work of the target application program, modifying the current password of the database into a randomly generated target password, and synchronizing the target password into a configuration file of the application program in an access relation with the database. And after the whole password modification process is finished, triggering the database to perform identity authentication on the application program accessing the database in a password authentication mode. Based on the method for modifying the database password provided by the embodiment of the invention, in the process that the application program requests identity authentication to a third-party system to log in the database, the application program does not need to call the user name and the password stored in the configuration file to request authentication, and the database does not need to authenticate the application program according to the user name and the user password. Therefore, the password of the database is not modified, the authentication work of the application program for accessing the database is not influenced, and after the password of the database is modified, the database and the application program can continue to use the modified password to carry out efficient password authentication. By the method provided by the embodiment of the invention, the database password can be modified, and in the process of modifying the database password, the application program can normally access the database to respond to the operation of the user, so that the running of the application program does not need to be suspended, the application system can normally provide service to the outside, the user can normally use the application system, and the use experience of the user is improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
Fig. 1 is a flowchart of a method for modifying a database password according to an embodiment of the present invention;
fig. 2 is a flowchart of another method of modifying a database password according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of an apparatus for modifying a database password according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a database password modification apparatus according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In this application, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The password for the database to perform password authentication on the application program is one of key elements for maintaining information security, and the password of the database needs to be modified periodically in order to ensure the information security. In the modification process of the database password, if the application system provides services for the user normally, the application program responds to the operation of the user, needs to call the user name and the password stored in the configuration file to request password authentication from the database and log in the database, and at this time, the password of the database may have been modified, and the modified password is not synchronized into the configuration file of the application program, so that the password authentication of the application program fails and the application program cannot log in the database normally. Therefore, when the database password is modified, the operation of the application system is usually required to be stopped, which affects the normal use of the user, and especially when the database has access relations with a plurality of application programs, the task of completing the password modification takes a long time, which results in that the application system cannot provide services normally for a long time. Secondly, in actual operation, in order to avoid the loss caused by the fact that the user cannot normally use the application system, the modification frequency of the database password is often reduced, and the requirement of information security is not met.
Therefore, the embodiment of the invention provides a method for modifying a database password, which enables an application program needing to access a database to request identity authentication from a third-party system to log in the database in the process of modifying the database password. The method can meet the requirement that the application program logs in the database password modification process without stopping the operation of the application system, so that the user experience is prevented from being influenced by stopping the operation of the application system.
The embodiment of the invention provides a method for modifying a database password, which can be applied to a third-party system, wherein an execution main body of the method can be a processor in an application system or a peripheral processor for executing a function corresponding to the method, and a flow chart of the method is shown in fig. 1 and comprises the following steps:
s101: under the condition that the password of the database needs to be modified, triggering a target application program to log in the database in a mode of identity authentication to a third-party system, wherein the target application program is an application program for accessing the database in the process of modifying the password of the database;
in the method provided by the embodiment of the invention, under the condition that the third-party system responds to the information security requirement and needs to modify the database password, the authentication mode of the database is changed, so that the database authenticates the application program in a non-password authentication mode. In the process of modifying the password of the database, when the application program requests to log in the database in a password authentication mode, the application program is triggered to request identity authentication from the third-party system so as to log in the database in a third-party system identity authentication mode. The current authentication mode of the database can be obtained by sending an authentication mode query instruction to the database, or a successful change response can be sent to a third-party system by presetting and triggering the database after the authentication mode is changed. When the database authenticates the application program in a non-password authentication mode, the modification work of the database password is started.
S102: randomly generating a target password, and modifying the current password of the database into the target password;
in the method provided by the embodiment of the invention, under the condition that the database does not perform identity authentication on the application program accessing the database by password authentication, the target password can be randomly generated based on the preset password generation script, for example, the password can be generated by a function for generating a random number, the password can be randomly generated by calling a preset password generator, and the target password meeting the security requirement can be obtained by controlling the generation type of data, such as generating random numbers or letters. After the target password is generated, the user name of the database and the current password can be called according to a preset password modification script, a command of modifying the password corresponding to the database is executed, the user password of the target database is modified, and the user password is modified into the target password. For example, in the MySQL database, the command "MySQL > setpassword for user name @ localhost ═ password ('change password')" may be used to modify the password, or "MySQL in-u user name-p original password change password" may be used, or the user table may be used to modify the password of the database directly by UPDATE.
S103: when the current password of the database is successfully modified into the target password, determining a configuration file of each application program in an access relation with the database, and modifying the current password of the database pre-stored in each configuration file into the target password;
in the method provided by the embodiment of the invention, after the current password of the database is modified, the configuration file of the password for password authentication stored in each application program in the access relation with the database can be determined through the information of each application program which is stored in the database in advance and has the access relation with the database, the configuration file of the application program is called according to a preset configuration modification script, and the database password for password authentication stored in each configuration file in advance is modified into the target password according to a preset data modification command.
S104: and when the current password of the database stored in each configuration file in advance is modified into the target password, triggering the database to carry out identity authentication on each application program accessing the database in a password authentication mode.
In the method provided by the embodiment of the invention, after the database passwords which are pre-stored in the configuration file of each application program in the access relation with the database and are used for password authentication are modified into the target passwords, the database can be triggered to change the identity authentication mode of the application program accessing the database, so that the database can continuously perform identity authentication on each application program accessing the database in the password authentication mode.
Based on the method provided by the embodiment of the invention, under the condition that the password of the database in the system needs to be modified, the application program accessing the database in the password modification process is triggered to carry out identity authentication on the third-party system, so that the database is logged in a third-party system identity authentication mode. Under the condition that the database does not perform identity authentication on the application program accessing the database by password authentication, the target password can be randomly generated, the password of the database is modified into the target password, and the target password is synchronized into a configuration file of the database password for password authentication stored in each application program in an access relation with the database, so that the modification of the database password is completed. After the password of the database is modified, the database can be triggered to perform identity authentication on the application program accessing the database in a password authentication mode. The method provided by the embodiment of the invention can complete the modification of the database password and ensure the information security of the database. During the process of modifying the data password, the application program accessing the database can request identity authentication from the third-party system to log in the database, and the database does not need to perform identity authentication on the application program in a password authentication mode. In the modification process of the database password, the database and the application program accessing the database do not need to call the password to realize the requirement that the application program logs in the database. The user password for modifying the database can not interfere the identity authentication process of the application program for logging in the database, so that the login failure is caused. Therefore, in the process of modifying the database password, the application program can log in the database to obtain data, normally respond to user operation, and does not need to suspend external service of the application system, so that the use experience of the user is improved. Secondly, the method provided by the embodiment of the invention can call the script to modify the database password and uniformly modify the password in the configuration file of the application program, thereby saving human resources and improving the modification efficiency. The randomly generated password is used as a new password for modification, so that the possibility of password leakage is reduced, and the information security of the database is further ensured.
To better explain the method provided by the embodiment of the present invention, referring to fig. 2, on the basis of the method shown in fig. 1, a further method for modifying a database password is provided, where in step S101 shown in fig. 1, the process of triggering a target application to log in a database in a manner of performing identity authentication with a third-party system is described, and the method provided by the embodiment of the present invention includes:
s201: sending a first authentication change instruction to the database to indicate that the database triggers the target application program to send a preset digital certificate to the third-party system to request identity authentication when receiving a login request sent by the target application program;
in the method provided by the embodiment of the invention, the first authentication change instruction can be sent to the database of which the password needs to be modified under the condition that the third-party system needs to modify the password of the database according to the information security requirement. The modification period of the database password can be determined according to factors such as the life cycle of information stored in the database or the information security level, and an authentication change instruction can be sent to the database when the preset modification period of the database password is triggered according to a preset script. And when the actual demand is changed unplanned greatly, according to the actual information security demand, when the password of the database needs to be modified, the manager triggers the system to actively send an authentication change instruction to the database.
When the database receives a first authentication change instruction sent by a third-party system, the identity authentication mode of the application program accessing the database can be changed, and the application program is not authenticated in a password authentication mode any more. Under the condition that the database is not authenticated in a password authentication mode, if the database receives a login request sent by an application program in the password authentication mode, a third party authentication instruction can be sent to the application program, and the application program is triggered to apply a preset digital certificate to request identity authentication to a third party system. When the application program receives a third party authentication instruction sent by the database, a preset digital certificate can be called, and an identity authentication request is sent to a third party system based on the digital certificate.
S202: when the digital certificate sent by the target application program is received, performing identity authentication on the target application program according to the digital certificate;
in the method provided by the embodiment of the invention, when the third-party system receives the digital certificate sent by the application program, the identity authentication can be performed on the application program according to the digital certificate. The identity of the application program can be authenticated by comparing the digital certificate sent by the application program with a trusted certificate pre-stored by a third-party system. For example, a unique digital identifier corresponding to the application may be included in the digital certificate, and the digital identifier may be stored encrypted in the digital certificate. When a digital certificate sent by an application program is received, a digital identifier corresponding to the digital certificate can be obtained through decryption processing. All pre-stored trusted certificates, i.e. digital certificates corresponding to applications that are in an access relationship with the database, may be obtained. And decrypting all the trusted certificates to obtain all the trusted digital identifications. And comparing the digital identifier corresponding to the digital certificate sent by the application program with all trusted digital identifiers to realize the identity authentication of the application program. Or all the trusted digital identifications can be stored in advance, and the comparison is directly carried out by acquiring the prestored trusted digital identifications and the digital identifications corresponding to the digital certificates of the application programs. And when the digital identification corresponding to the digital certificate of the application program is the same as any trusted digital identification, passing the identity authentication of the application program. Otherwise, if the digital identifier corresponding to the digital certificate of the application program is different from each trusted digital identifier, the application program does not pass the identity authentication.
S203: when the identity of the target application program is authenticated, generating an authentication identifier corresponding to the target application program;
in the method provided by the embodiment of the invention, when the third-party system passes the identity authentication of the application program, the corresponding authentication identifier can be generated for the application program passing the identity authentication. For example, an identity corresponding to the application program may be obtained, a corresponding token is generated based on the identity, and the token is used as the identity corresponding to the application program. And a corresponding authentication identifier can be distributed to the application program passing the identity authentication through a preset script.
S204: and respectively sending the authentication identification to the database and the target application program, and triggering the target application program to apply the authentication identification to carry out identity authentication on the database so as to log in the database.
In the method provided by the embodiment of the invention, after the third-party system generates the corresponding authentication identifier for the application program, signature encryption can be carried out on the authentication identifier, and the authentication identifier after signature encryption is respectively sent to the database and the application program requesting identity authentication. After the application program receives the authentication identifier sent by the third-party system, a login request can be sent to the database based on the authentication identifier so as to log in the database.
When the database receives a login request sent by the application program based on the authentication identifier, the authentication identifier sent by the application program can be acquired, the authentication identifier sent by the application program is compared with all authentication identifiers sent by a third-party system and received by the database in advance, and if the authentication identifier sent by the application program is the same as any authentication identifier received by the database in advance, the application program can log in the database to perform corresponding operation through the login request of the application program. Otherwise, if the authentication identifier sent by the application program is different from each authentication identifier received by the database in advance, the login request of the application program is not passed. For example, when the generated token is used as the authentication identifier, when the database receives the token sent by the application program, the token may be decrypted, the token sent by the application program may be compared with all the token tokens received in advance and sent by the third-party system, for example, the identity identifiers in the token tokens may be compared, and if the identity identifier in the token sent by the application program is the same as the identity identifier in any one of the token tokens received in advance, the authentication request of the application program is passed. The signature and the timestamp in the token may be further compared, and if the identity, the signature, and the timestamp in the token sent by the application are the same as the identity, the signature, and the timestamp in any token tokne received in advance, the login request of the application is passed.
Based on the method provided by the embodiment of the invention, the authentication change instruction can be sent to the database under the condition that the password of the database needs to be modified, so that the database triggers an application program accessing the database in the password modification process to request identity authentication from a third-party system by adopting a preset digital certificate, and the application program logs in the database in a third-party system identity authentication mode. Under the condition that the database does not perform identity authentication on the application program accessing the database by password authentication, the target password can be randomly generated, the password of the database is modified into the target password, and the target password is synchronized into a configuration file of the database password for password authentication stored in each application program in an access relation with the database, so that the modification of the database password is completed. After the password of the database is modified, the database can be triggered to perform identity authentication on the application program accessing the database in a password authentication mode. The method provided by the embodiment of the invention can complete the modification of the database password and ensure the information security of the database. Further, in the method provided by the embodiment of the present invention, a digital certificate may be preset in an application program that is in an access relationship with a database, and in a modification process of a database password, the application program may request identity authentication from a third-party system using the preset digital certificate, and after the third-party authentication passes the identity authentication of the application program, a corresponding authentication identifier may be generated for the application program, and the generated authentication identifier is sent to the database and the application program, so that the application program may log in the database through the authentication identifier, thereby implementing that in the modification process of the database password, the application program that is in an access relationship with the database may normally log in the database in a non-password authentication manner to perform corresponding operations without stopping external services of the application system, and improving user experience. Secondly, in the method provided by the embodiment of the present invention, by presetting a digital certificate in an application program having an access relationship with a database, the application program can request identity authentication from a third-party system by using the digital certificate to log in the database, and the application program having no access relationship with the database does not have a preset certificate, and cannot log in the database by using the identity authentication of the third-party system even during the modification of a password of the database, and the digital certificate is more conveniently replaced, so that the digital certificate can be timely replaced within a preset period or when the access relationship between the database and the application program changes, thereby further ensuring the information security of the database. Further, in the method provided by the embodiment of the present invention, the password modification period of the database may be preset, and when the password modification period is triggered, an authentication change instruction is sent to the database to modify the password of the database. By setting the password modification period to trigger the password modification process, the problem that the information safety of an application system is influenced due to the fact that the password modification frequency is reduced due to artificial reasons when a worker triggers the password modification process of the database can be avoided. Therefore, the safety of the database information is further improved.
Further, to better explain that in the method shown in fig. 2, in step S203, the authentication identifier corresponding to the target application is generated, a further method for modifying a database password is provided in the embodiment of the present invention, and on the basis of the method shown in fig. 2, a process of generating the authentication identifier corresponding to the target application in the method provided in the embodiment of the present invention includes:
determining the application equipment where the target application program is located;
in the method provided by the embodiment of the invention, after the third-party system passes the identity authentication of the application program, the application equipment where the application program passing the identity authentication is located can be determined. For example, corresponding setting may be performed in advance, so that when the application program sends the identity authentication request to the third-party system by using the preset digital certificate, the application device information where the application program is located is written in the identity authentication request information, and the application device where the application program passing the identity authentication is located may be determined by receiving the application device information in the identity authentication request information. Or after passing the identity authentication request of the application program, sending a device information request to the application program to acquire the application device information of the application program sent by the application program, so as to determine the application device of the application program.
Acquiring the MAC address of the application equipment;
in the method provided in the embodiment of the present invention, after the third-party system determines the application device where the application program passing the identity authentication is located, the MAC address of the application device where the application program passing the identity authentication is located, that is, the MAC address of the application device, may be acquired.
And generating a token corresponding to the MAC address according to the MAC address, and taking the token as an authentication identifier corresponding to the target application program.
In the method provided by the embodiment of the present invention, after the MAC address of the application device is obtained, a preset script may be called, the MAC address is used as an identity identifier in the token, a token corresponding to the MAC address is generated, and the generated token is used as an authentication identifier corresponding to the application program that passes the identity authentication.
Based on the method provided by the embodiment of the invention, the modification of the database password can be completed under the condition that the database password needs to be modified, the information security of the database is ensured, in the process of modifying the database password, the database carries out identity authentication on the login request of the application program in a non-password authentication mode, the application program using the password authentication is triggered to request identity authentication from the third-party system by adopting a preset digital certificate so as to obtain the authentication identifier generated by the third-party system, and the database is requested to be logged in by using the authentication identifier. Therefore, in the modification process of the database password, the application program in access relation with the database can normally log in the database to acquire data so as to realize external service provision. Therefore, the running of the application system is not required to be stopped in the process of modifying the database password, and the use experience of the user is improved. Secondly, in the method provided by the embodiment of the present invention, the MAC address of the application device where the application program is located is obtained, and the token corresponding to the application program is generated based on the MAC address as the authentication identifier corresponding to the application program, where the MAC address is a parameter of the application device where the application program is located, and is easy to obtain, and the MAC address of the device has uniqueness, so that a unique authentication identifier can be provided for the application program passing identity authentication. While a simple component of the token may generally include a unique identity, a timestamp and a signature, and the first few bits of the token may be compressed into a hexadecimal string of a certain length by a hash algorithm, which makes the token highly secure. The generated token is used as an authentication identifier, which is beneficial to ensuring the security of the application program logging in the database in the process of modifying the password by the database, and further improves the security of the database information.
Further, on the basis of the method provided by the above embodiment, in the method provided by the embodiment of the present invention, the step S104 shown in fig. 1 is a process of triggering the database to perform identity authentication on each application accessing the database in a password authentication manner, where the process includes:
and sending a second authentication change instruction to the database to indicate that the database performs identity authentication on each application program accessing the database in a password authentication mode when receiving a login request sent by the application program.
In the method provided by the embodiment of the invention, the database password is modified into the randomly generated target password, the target password is synchronized into the configuration file of the database password stored in each application program in access relation with the database, and after the whole modification process of the database password is completed, a second authentication change instruction can be sent to the database. When the database receives the second authentication change instruction, the authentication mode of the application program accessing the database can be changed, and the identity authentication of the application program accessing the database is continuously carried out in a password authentication mode. When the database authenticates the application program in a password authentication manner, if a login request sent by the application program through an authentication identifier is received, the password authentication request can be sent to the application program, and when the application program receives the password authentication request sent by the database, the database password stored in the configuration file can be called to request to login the database in a password authentication manner. And if the database receives a login request sent by the application program in a password authentication mode, calling the password of the database to perform identity authentication on the application program.
Based on the method provided by the embodiment of the invention, after the password of the database is modified, the authentication change instruction can be sent to the database, the database is triggered to change the authentication mode in time, the high-efficiency password authentication mode can be continuously used for identity authentication of the application program accessing the database, and the operation efficiency of the application system is improved.
Further, an embodiment of the present invention provides another method for modifying a database password, where on the basis of the method provided in the above embodiment, the method provided in the embodiment of the present invention further includes:
and encrypting the target password, and storing the encrypted target password in a preset specified file.
In the method provided by the embodiment of the invention, the modified database password, namely the target password randomly generated in the password modification process, can be encrypted, and the encrypted target password is stored in a preset specified file.
Based on the method provided by the embodiment of the invention, the password modified by the database is stored in the appointed file, and can be called when the password of the database is modified next time, so that the modification efficiency of the password of the database is improved. And the password is encrypted and then stored, which is beneficial to ensuring the security of the password.
Further, an embodiment of the present invention provides another method for modifying a database password, where on the basis of the method provided in the above embodiment, the method provided in the embodiment of the present invention further includes:
and sending the target password to a preset electronic mailbox.
In the method provided by the embodiment of the invention, the preset email address can be called, and the modified database password is sent to the preset email user in an email mode according to the preset email sending script.
Based on the method provided by the embodiment of the invention, the e-mail box for receiving the database password can be arranged in the system in advance, and after the database password is modified, the new password of the database is sent to corresponding staff in the form of e-mail, so that the staff can keep the database password, and the situation that the password is lost and the database management is adversely affected due to unexpected errors of the system is prevented.
Corresponding to the method for modifying a database password shown in fig. 1, an embodiment of the present invention further provides a device for modifying a database password, which is used to implement the method shown in fig. 1 specifically, and a schematic structural diagram of the device is shown in fig. 3, and includes:
the first triggering unit 301 is configured to, when a password of a database needs to be modified, trigger a target application to log in the database in a manner of performing identity authentication on a third-party system, where the target application is an application accessing the database during the password modification of the database;
a first modifying unit 302, configured to randomly generate a target password, and modify the current password of the database into the target password;
a second modifying unit 303, configured to determine, when the current password of the database is successfully modified into the target password, a configuration file of each application program in an access relationship with the database, and modify, into the target password, the current password of the database stored in advance in each configuration file;
a second triggering unit 304, configured to, when the current password of the database stored in each configuration file in advance is modified to the target password, trigger the database to perform identity authentication on each application accessing the database in a password authentication manner.
Based on the device provided by the embodiment of the invention, under the condition that the password of the database in the system needs to be modified, the application program accessing the database in the password modification process is triggered to carry out identity authentication on the third-party system, so that the database is logged in a third-party system identity authentication mode. Under the condition that the database does not perform identity authentication on the application program accessing the database by password authentication, the target password can be randomly generated, the password of the database is modified into the target password, and the target password is synchronized into a configuration file of the database password for password authentication stored in each application program in an access relation with the database, so that the modification of the database password is completed. After the password of the database is modified, the database can be triggered to perform identity authentication on the application program accessing the database in a password authentication mode. The device provided by the embodiment of the invention can complete the modification of the database password and ensure the information security of the database. During the process of modifying the data password, the application program accessing the database can request identity authentication from the third-party system to log in the database, and the database does not need to perform identity authentication on the application program in a password authentication mode. In the modification process of the database password, the database and the application program accessing the database do not need to call the password to realize the requirement that the application program logs in the database. The user password for modifying the database can not interfere the identity authentication process of the application program for logging in the database, so that the login failure is caused. Therefore, in the process of modifying the database password, the application program can log in the database to obtain data, normally respond to user operation, and does not need to suspend external service of the application system, so that the use experience of the user is improved. Secondly, the device provided by the embodiment of the invention can call the script to modify the database password and uniformly modify the password in the configuration file of the application program, thereby saving human resources and improving the modification efficiency. The randomly generated password is used as a new password for modification, so that the possibility of password leakage is reduced, and the information security of the database is further ensured.
Further, an embodiment of the present invention provides another apparatus for modifying a database password, a schematic structural diagram of which is shown in fig. 4, and on the basis of the apparatus provided in the above embodiment, in the apparatus provided in the embodiment of the present invention, the first triggering unit 301 includes:
a first sending subunit 3011, configured to send a first authentication change instruction to the database to indicate that the database triggers the target application to send a preset digital certificate to the third-party system to request identity authentication when receiving a login request sent by the target application;
an authentication subunit 3012, configured to, when receiving the digital certificate sent by the target application program, perform identity authentication on the target application program according to the digital certificate;
a first generating subunit 3013, configured to generate, when the identity of the target application passes authentication, an authentication identifier corresponding to the target application;
a second sending subunit 3014, configured to send the authentication identifiers to the database and the target application respectively, and trigger the target application to apply the authentication identifiers to perform identity authentication on the database, so as to log in the database.
On the basis of the device, the device provided by the embodiment of the invention can enable the application program to request identity authentication from the third-party system by using the digital certificate to log in the database through presetting the digital certificate in the application program in an access relation with the database, the application program without the access relation with the database does not have the preset certificate, the application program cannot log in the database through the identity authentication of the third-party system during the modification period of the password of the database, the digital certificate is convenient to replace, the digital certificate can be replaced in time in a preset period or when the access relation between the database and the application program is changed, and the information safety of the database is further ensured. Further, in the apparatus provided in the embodiment of the present invention, a password modification period of the database may be preset, and when the password modification period is triggered, an authentication change instruction is sent to the database to modify the password of the database. By setting the password modification period to trigger the password modification process, the problem that the information safety of an application system is influenced due to the fact that the password modification frequency is reduced due to artificial reasons when a worker triggers the password modification process of the database can be avoided. Therefore, the safety of the database information is further improved.
In addition to the above apparatus, an apparatus according to an embodiment of the present invention is provided, wherein the first generating subunit 3013 includes:
a determining subunit 3015, configured to determine an application device where the target application program is located;
an obtaining subunit 3016, configured to obtain a MAC address of the application device;
and the second generating subunit 3017 is configured to generate a token corresponding to the MAC address according to the MAC address, and use the token as an authentication identifier corresponding to the target application.
On the basis of the device, based on the device provided by the embodiment of the invention, the token corresponding to the application program can be generated based on the MAC address by acquiring the MAC address of the application device where the application program is located, and the token is used as the authentication identifier corresponding to the application program, the MAC address has the parameters of the application device where the application program is located, and is easy to acquire, and the MAC address of the device has uniqueness, so that a unique authentication identifier can be provided for the application program passing identity authentication. While a simple component of the token may generally include a unique identity, a timestamp and a signature, and the first few bits of the token may be compressed into a hexadecimal string of a certain length by a hash algorithm, which makes the token highly secure. The generated token form is used as an authentication identifier, which is beneficial to ensuring the security of the application program logging in the database in the process of modifying the password by the database, and further improves the security of the database information.
On the basis of the above apparatus, in the apparatus provided in the embodiment of the present invention, the second triggering unit 304 includes:
a third sending subunit 3041, configured to send a second authentication change instruction to the database, so as to instruct the database to perform identity authentication on each application accessing the database in a password authentication manner when the database receives a login request sent by the application.
On the basis of the device, based on the device provided by the embodiment of the invention, after the password of the database is modified, the authentication change instruction can be sent to the database, the database is triggered to change the authentication mode in time, the high-efficiency password authentication mode can be continuously used for identity authentication of the application program accessing the database, and the operation efficiency of the application system is improved.
Further, an embodiment of the present invention provides another apparatus for modifying a database password, where on the basis of the apparatus provided in the above embodiment, the apparatus provided in the embodiment of the present invention further includes:
and the encryption unit is used for encrypting the target password and storing the encrypted target password into a preset specified file.
Based on the device provided by the embodiment of the invention, the password modified by the database is stored in the appointed file, and can be called when the password of the database is modified next time, so that the modification efficiency of the password of the database is improved. And the password is encrypted and then stored, which is beneficial to ensuring the security of the password.
Further, an embodiment of the present invention provides another apparatus for modifying a database password, where on the basis of the apparatus provided in the above embodiment, the apparatus provided in the embodiment of the present invention further includes:
and the sending unit is used for sending the target password to a preset electronic mailbox.
Based on the device provided by the embodiment of the invention, the e-mail box for receiving the database password can be arranged in the system in advance, and after the database password is modified, the new password of the database is sent to corresponding staff in the form of e-mail, so that the staff can keep the database password, and the situation that the password is lost and the database management is adversely affected due to unexpected errors of the system is prevented.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, the system or system embodiments are substantially similar to the method embodiments and therefore are described in a relatively simple manner, and reference may be made to some of the descriptions of the method embodiments for related points. The above-described system and system embodiments are only illustrative, wherein the units described as separate parts may or may not be physically separate, and the parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
Those of skill would further appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that the various illustrative components and steps have been described above generally in terms of their functionality in order to clearly illustrate this interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (10)

1. A method for modifying a database password, comprising:
under the condition that the password of the database needs to be modified, triggering a target application program to log in the database in a mode of identity authentication to a third-party system, wherein the target application program is an application program for accessing the database in the process of modifying the password of the database;
randomly generating a target password, and modifying the current password of the database into the target password;
when the current password of the database is successfully modified into the target password, determining a configuration file of each application program in an access relation with the database, and modifying the current password of the database pre-stored in each configuration file into the target password;
and when the current password of the database stored in each configuration file in advance is modified into the target password, triggering the database to carry out identity authentication on each application program accessing the database in a password authentication mode.
2. The method of claim 1, wherein the triggering the target application to log into the database by authenticating with a third-party system comprises:
sending a first authentication change instruction to the database to indicate that the database triggers the target application program to send a preset digital certificate to the third-party system to request identity authentication when receiving a login request sent by the target application program;
when the digital certificate sent by the target application program is received, performing identity authentication on the target application program according to the digital certificate;
when the identity of the target application program is authenticated, generating an authentication identifier corresponding to the target application program;
and respectively sending the authentication identification to the database and the target application program, and triggering the target application program to apply the authentication identification to carry out identity authentication on the database so as to log in the database.
3. The method of claim 2, wherein the generating the authentication identifier corresponding to the target application comprises:
determining the application equipment where the target application program is located;
acquiring the MAC address of the application equipment;
and generating a token corresponding to the MAC address according to the MAC address, and taking the token as an authentication identifier corresponding to the target application program.
4. The method of claim 1, wherein the triggering the database to authenticate each application accessing the database by means of password authentication comprises:
and sending a second authentication change instruction to the database to indicate that the database performs identity authentication on each application program accessing the database in a password authentication mode when receiving a login request sent by the application program.
5. The method of claim 1, further comprising:
and encrypting the target password, and storing the encrypted target password in a preset specified file.
6. The method of claim 1, further comprising:
and sending the target password to a preset electronic mailbox.
7. An apparatus for modifying a database password, comprising:
the system comprises a first triggering unit, a second triggering unit and a third party system, wherein the first triggering unit is used for triggering a target application program to log in a database in an identity authentication mode to a third party system under the condition that a password of the database needs to be modified, and the target application program is an application program for accessing the database in the password modification process of the database;
the first modification unit is used for randomly generating a target password and modifying the current password of the database into the target password;
the second modification unit is used for determining a configuration file of each application program in an access relation with the database when the current password of the database is successfully modified into the target password, and modifying the current password of the database prestored in each configuration file into the target password;
and the second triggering unit is used for triggering the database to carry out identity authentication on each application program accessing the database in a password authentication mode when the current password of the database stored in each configuration file in advance is modified into the target password.
8. The apparatus of claim 7, wherein the first trigger unit comprises:
the first sending subunit is configured to send a first authentication change instruction to the database to indicate that the database triggers the target application program to send a preset digital certificate to the third-party system to request identity authentication when receiving a login request sent by the target application program;
the authentication subunit is used for performing identity authentication on the target application program according to the digital certificate when receiving the digital certificate sent by the target application program;
the first generating subunit is configured to generate an authentication identifier corresponding to the target application program when the identity of the target application program passes authentication;
and the second sending subunit is used for respectively sending the authentication identifier to the database and the target application program, and triggering the target application program to apply the authentication identifier to perform identity authentication on the database so as to log in the database.
9. The apparatus of claim 8, wherein the first generating subunit comprises:
a determining subunit, configured to determine an application device where the target application program is located;
an obtaining subunit, configured to obtain an MAC address of the application device;
and the second generation subunit is used for generating a token corresponding to the MAC address according to the MAC address, and taking the token as an authentication identifier corresponding to the target application program.
10. The apparatus of claim 7, wherein the second trigger unit comprises:
and the third sending subunit is configured to send a second authentication change instruction to the database to instruct the database to perform identity authentication on each application program accessing the database in a password authentication manner when receiving the login request sent by the application program.
CN201911308765.0A 2019-12-18 2019-12-18 Database password modification method and device Active CN111010397B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911308765.0A CN111010397B (en) 2019-12-18 2019-12-18 Database password modification method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911308765.0A CN111010397B (en) 2019-12-18 2019-12-18 Database password modification method and device

Publications (2)

Publication Number Publication Date
CN111010397A true CN111010397A (en) 2020-04-14
CN111010397B CN111010397B (en) 2022-07-19

Family

ID=70116327

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911308765.0A Active CN111010397B (en) 2019-12-18 2019-12-18 Database password modification method and device

Country Status (1)

Country Link
CN (1) CN111010397B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112395591A (en) * 2020-11-17 2021-02-23 陕西上讯信息技术有限公司 Encryption method and system

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104378211A (en) * 2014-11-26 2015-02-25 深圳市银雁金融配套服务有限公司 Identity authentication method and device
CN104391874A (en) * 2014-10-29 2015-03-04 中国建设银行股份有限公司 Database password management method and system
US20150286816A1 (en) * 2014-04-04 2015-10-08 PassedWord LLC Method and system for automatic updating of randomly generated user passwords
CN106714274A (en) * 2016-06-23 2017-05-24 腾讯科技(深圳)有限公司 Access point connection method and device
CN106909411A (en) * 2015-12-23 2017-06-30 中国移动通信集团江苏有限公司 A kind of file updating method and device
CN107769930A (en) * 2017-11-20 2018-03-06 飞天诚信科技股份有限公司 A kind of authentication mode forwarding method and device
CN107832608A (en) * 2017-11-29 2018-03-23 北京安华金和科技有限公司 A kind of method for preventing artificial or application end leakage oracle database password
CN109688133A (en) * 2018-12-26 2019-04-26 江苏恒宝智能系统技术有限公司 It is a kind of based on exempt from account login communication means
CN109831435A (en) * 2019-01-31 2019-05-31 广州银云信息科技有限公司 A kind of database operation method, system and proxy server and storage medium
CN110163003A (en) * 2019-05-30 2019-08-23 浙江齐治科技股份有限公司 A kind of cipher management method and device

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150286816A1 (en) * 2014-04-04 2015-10-08 PassedWord LLC Method and system for automatic updating of randomly generated user passwords
CN104391874A (en) * 2014-10-29 2015-03-04 中国建设银行股份有限公司 Database password management method and system
CN104378211A (en) * 2014-11-26 2015-02-25 深圳市银雁金融配套服务有限公司 Identity authentication method and device
CN106909411A (en) * 2015-12-23 2017-06-30 中国移动通信集团江苏有限公司 A kind of file updating method and device
CN106714274A (en) * 2016-06-23 2017-05-24 腾讯科技(深圳)有限公司 Access point connection method and device
CN107769930A (en) * 2017-11-20 2018-03-06 飞天诚信科技股份有限公司 A kind of authentication mode forwarding method and device
CN107832608A (en) * 2017-11-29 2018-03-23 北京安华金和科技有限公司 A kind of method for preventing artificial or application end leakage oracle database password
CN109688133A (en) * 2018-12-26 2019-04-26 江苏恒宝智能系统技术有限公司 It is a kind of based on exempt from account login communication means
CN109831435A (en) * 2019-01-31 2019-05-31 广州银云信息科技有限公司 A kind of database operation method, system and proxy server and storage medium
CN110163003A (en) * 2019-05-30 2019-08-23 浙江齐治科技股份有限公司 A kind of cipher management method and device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
王桃群: "提高SQL Server数据库安全性的几点思考", 《电脑知识与技术》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112395591A (en) * 2020-11-17 2021-02-23 陕西上讯信息技术有限公司 Encryption method and system

Also Published As

Publication number Publication date
CN111010397B (en) 2022-07-19

Similar Documents

Publication Publication Date Title
KR102018971B1 (en) Method for enabling network access device to access wireless network access point, network access device, application server and non-volatile computer readable storage medium
EP3550783B1 (en) Internet of things device burning verification method and apparatus
US8196186B2 (en) Security architecture for peer-to-peer storage system
US9544297B2 (en) Method for secured data processing
CN107483509A (en) A kind of auth method, server and readable storage medium storing program for executing
US20130086651A1 (en) Re-authentication in secure web service conversations
CN107612889B (en) Method for preventing user information leakage
WO2015120437A1 (en) Authentication system and method
TWI679551B (en) Process identity authentication method and device
CN108259502A (en) For obtaining the identification method of interface access rights, server-side and storage medium
US8601264B2 (en) Systems and methods of user authentication
CN111159656A (en) Method, device, equipment and storage medium for preventing software from being used without authorization
US9503442B1 (en) Credential-based application programming interface keys
CN111770087A (en) Service node verification method and related equipment
CN111010397B (en) Database password modification method and device
JP6081857B2 (en) Authentication system and authentication method
JP2009003501A (en) Onetime password authentication system
CN112261103A (en) Node access method and related equipment
CN108924149B (en) Token-based identity validity verification method and system
CN116599719A (en) User login authentication method, device, equipment and storage medium
CN114157470B (en) Token management method and device
GB2582180A (en) Distributed authentication
CN111404680B (en) Password management method and device
CN108429726B (en) Secure WIFI certificate encryption verification access method and system thereof
CN114629637B (en) Method for micro-service safety management and application system thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant