CN111259351A - User identity verification system based on Access database login - Google Patents
User identity verification system based on Access database login Download PDFInfo
- Publication number
- CN111259351A CN111259351A CN202010030529.3A CN202010030529A CN111259351A CN 111259351 A CN111259351 A CN 111259351A CN 202010030529 A CN202010030529 A CN 202010030529A CN 111259351 A CN111259351 A CN 111259351A
- Authority
- CN
- China
- Prior art keywords
- user
- identity
- management server
- login
- access database
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
The invention relates to the technical field of Access database user identity authentication, and discloses a user identity authentication system based on Access database login, which comprises: the system comprises an Access database A for storing data, a user client U for requesting to log in the Access database A for data Access, and a login management server S for performing identity authentication on a login user of the Access database A, wherein user identity authentication system software is operated on the login management server S; user U as user client UiWhen a login request is sent to a login management server S of an Access database A, a user identity verification system of the login management server S adopts a verification method based on zero knowledge proof to a user UiThe identity of (2) is verified. The invention solves the technical problem that the identity of the login user cannot be safely verified by the conventional Access database.
Description
Technical Field
The invention relates to the technical field of Access database user identity verification, in particular to a user identity verification system based on Access database login.
Background
Microsoft Access is a small relational database management system. As one of the important Microsoft Office members, Access is not only a database system, but also has a powerful data management function. A user can conveniently generate objects such as query, form and report forms by using various data sources without much computer professional knowledge, particularly macro objects in Access and embedded VBA programming language provide a great function expansion space for a database application system developer from the self-defined programming angle, and the small database application system with more complete self-programming functions becomes possible. Therefore, it is highly appreciated by small enterprise data managers and database beginners.
However, since the Access database does not provide a user identity authentication mechanism with complete and safe functions, the data security of the developed application system cannot be ensured.
Disclosure of Invention
Technical problem to be solved
Aiming at the defects of the prior art, the invention provides a user identity authentication system based on Access database login, which aims to solve the technical problem that the identity of a login user cannot be safely authenticated by the current Access database.
(II) technical scheme
In order to achieve the purpose, the invention provides the following technical scheme:
a user identity authentication system based on Access database login comprises: the system comprises an Access database A for storing data, a user client U for requesting to log in the Access database A for data Access, and a login management server S for performing identity authentication on a login user of the Access database A, wherein user identity authentication system software is operated on the login management server S;
user U as user client UiWhen a login request is sent to a login management server S of an Access database A, a user identity verification system of the login management server S adopts a verification method based on zero knowledge proof to a user UiThe identity of (2) is verified;
the authentication method of the user identity authentication system comprises the following steps:
the method comprises the following steps: user U of user client UiThe method for registering the user on the user identity authentication system of the login management server S specifically includes: user UiSetting a large prime number piAnd q isiCalculating ni=pi×qiAnd n isiTransmitting to a user identity verification system;
step two: user authentication system for user U of user client UiThe identity of the user is verified, and the specific verification process comprises the following steps:
(1) randomly generating a large integer x by a user identity authentication systemiCalculating Will yiUser U returned to user client Ui;
(3) user authentication system authentication equation zi=z′iIf it is true, if equation zi=z′iIf true, then user UiKnowing the composite private key piAnd q isiI.e. by the user UiThe identity of (2) is verified;
step three: if the user U of the user client UiIf the identity of the user passes the authentication, the user authentication system of the login management server S allows the user U of the user client U to access the user authentication system of the management server SiLogging in the Access database A for data Access.
Further, in the third step: if the user U of the user client UiIf the identity of the user is not verified, the user authentication system of the login management server S does not allow the user U of the user client UiLogging in the Access database A for data Access.
Further, the first step: user U of user client UiThe method for registering the user on the user identity authentication system of the login management server S specifically includes:
(1) user identity authentication system pops up and user U on registration pageiA dialog box for interactive communication;
(2) user UiSetting a large prime number piAnd q isiCalculating ni=pi×qiAnd n isiAnd inputting the data into a dialog box.
Furthermore, the interactive communication dialog box has a traceless communication function, that is, all interactive communication contents in the dialog box have no backup record.
(III) advantageous technical effects
Compared with the prior art, the invention has the following beneficial technical effects:
user U as user client U in the inventioniWhen a login request is sent to a login management server S of an Access database A, a user identity authentication system adopts an authentication method based on zero knowledge proof to a user UiOnly the user U of the user client U which passes the identity authentication is authenticatediAllowing the user to log in the Access database A for data Access;
and at the user UiAfter the authentication is completed, the user authentication system of the login management server S only knows the user UiIs legitimate, it does not know the user UiOf the composite private key piAnd q isiI.e. user UiWithout revealing its own composite private key piAnd q isiOn the premise of finishing the identity verification;
therefore, the technical problem that the identity of the login user cannot be safely verified by the current Access database is solved.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
A user identity authentication system based on Access database login comprises: the system comprises an Access database A for storing data, a user client U for requesting to log in the Access database A for data Access, and a login management server S for performing identity authentication on a login user of the Access database A, wherein user identity authentication system software is operated on the login management server S;
user U as user client UiWhen a login request is sent to a login management server S of an Access database A, a user identity verification system of the login management server S adopts a verification method based on zero knowledge proof to a user UiThe identity of (2) is verified;
if the user UiIf the identity of the user passes the authentication, the user authentication system of the login management server S allows the user U of the user client U to access the user authentication system of the management server SiLogging in an Access database A to Access data;
if the user UiIf the identity of the user is not verified, the user authentication system of the login management server S does not allow the user U of the user client UiLogging in an Access database A to Access data;
the authentication method of the user identity authentication system comprises the following steps:
the method comprises the following steps: user U of user client UiThe method for registering the user on the user identity authentication system of the login management server S specifically includes:
(1) user identity authentication system pops up and user U on registration pageiA dialog box for interactive communication;
(2) user UiSetting a large prime number piAnd q isiCalculating ni=pi×qiAnd n isiInputting the data into a dialog box;
large prime number piAnd q isiIs a composite private key which is the only legitimate certification key and which is only the user U of the user client UiSeparately, i.e. the user authentication system does not know the private key;
step two: user U as user client UiWhen a login request is sent to the login management server S of the Access database A, the user identity authentication system starts to authenticate the user UiThe identity of the user is verified, and the specific verification process comprises the following steps:
(1) user authentication system pops up and user U on authentication pageiA dialog box for interactive communication;
(2) user's bodyRandomly generating a large integer x by the authentication systemiCalculating Will yiDisplaying in a dialog box;
(4) user authentication system authentication equation zi=z′iWhether the result is true or not;
if equation zi=z′iIf true, then user UiKnowing the composite private key piAnd q isiI.e. by the user UiAuthentication of user UiIs valid, the user U of the user client U is allowed at this timeiLogging in an Access database A to Access data;
preferably, the step (2), the step (3) and the step (4) constitute a round of verification, and the step (2), the step (3) and the step (4) are repeatedly executediSecond, if the user UiZ 'can be calculated correctly each time'iIf the user identity authentication system passes the user UiThe identity authentication of (2);
if in the course of a certain round of verification, the user UiIf the authentication is not passed, the whole authentication process is terminated, and the user UiThe authentication of the user identity verification system is not passed;
after the authentication is completed, the user authentication system only knows the user UiIs legitimate, it does not know the user UiOf the composite private key piAnd q isiI.e. user UiWithout revealing its own composite private key piAnd q isiOn the premise of finishing the identity verification;
the interactive communication dialog box has a traceless communication function, namely all interactive communication contents in the dialog box have no backup record.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.
Claims (4)
1. A user identity authentication system based on Access database login is characterized by comprising: the system comprises an Access database A for storing data, a user client U for requesting to log in the Access database A for data Access, and a login management server S for performing identity authentication on a login user of the Access database A, wherein user identity authentication system software is operated on the login management server S;
user U as user client UiWhen a login request is sent to a login management server S of an Access database A, a user identity verification system of the login management server S adopts a verification method based on zero knowledge proof to a user UiThe identity of (2) is verified, and the verification method comprises the following steps:
the method comprises the following steps: user U of user client UiThe method for registering the user on the user identity authentication system of the login management server S specifically includes: user UiSetting a large prime number piAnd q isiCalculating ni=pi×qiAnd n isiTransmitting to a user identity verification system;
step two: user authentication system for user U of user client UiThe identity of the user is verified, and the specific verification process comprises the following steps:
(1) randomly generating a large integer x by a user identity authentication systemiCalculating Will yiUser U returned to user client Ui;
(3) user authentication system authentication equation zi=z′iIf it is true, if equation zi=z′iIf true, then user UiKnowing the composite private key piAnd q isiI.e. by the user UiThe identity of (2) is verified;
step three: if the user U of the user client UiIf the identity of the user passes the authentication, the user authentication system of the login management server S allows the user U of the user client U to access the user authentication system of the management server SiLogging in the Access database A for data Access.
2. The system according to claim 1, wherein in step three, if the user U is the user client U, the user U is authenticatediIf the identity of the user is not verified, the user authentication system of the login management server S rejects the user U of the user client UiLogging in the Access database A for data Access.
3. The system according to claim 2, wherein in step one, the user U of the user client U is authenticatediThe method for registering the user on the user identity authentication system of the login management server S specifically includes:
(1) user identity authentication system pops up and user U on registration pageiA dialog box for interactive communication;
(2) user UiSetting a large prime number piAnd q isiCalculating ni=pi×qiAnd n isiAnd inputting the data into a dialog box.
4. The system of claim 3, wherein the interactive communication dialog box comprises traceless communication functionality, i.e. no backup record is available for all interactive communication content in the dialog box.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010030529.3A CN111259351A (en) | 2020-01-13 | 2020-01-13 | User identity verification system based on Access database login |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010030529.3A CN111259351A (en) | 2020-01-13 | 2020-01-13 | User identity verification system based on Access database login |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111259351A true CN111259351A (en) | 2020-06-09 |
Family
ID=70946889
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010030529.3A Withdrawn CN111259351A (en) | 2020-01-13 | 2020-01-13 | User identity verification system based on Access database login |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111259351A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111832006A (en) * | 2020-07-16 | 2020-10-27 | 浙江甬恒科技有限公司 | Patent retrieval platform based on intelligent operation and maintenance management |
CN112035809A (en) * | 2020-08-13 | 2020-12-04 | 刘乾春 | Unified access authorization platform based on education cloud |
CN112069475A (en) * | 2020-09-14 | 2020-12-11 | 杭州熙菱信息技术有限公司 | Identity safety management system |
-
2020
- 2020-01-13 CN CN202010030529.3A patent/CN111259351A/en not_active Withdrawn
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111832006A (en) * | 2020-07-16 | 2020-10-27 | 浙江甬恒科技有限公司 | Patent retrieval platform based on intelligent operation and maintenance management |
CN111832006B (en) * | 2020-07-16 | 2021-07-20 | 浙江甬恒科技有限公司 | Patent retrieval platform based on intelligent operation and maintenance management |
CN112035809A (en) * | 2020-08-13 | 2020-12-04 | 刘乾春 | Unified access authorization platform based on education cloud |
CN112035809B (en) * | 2020-08-13 | 2024-01-12 | 陕西碧宝教育科技有限公司 | Unified access authorization platform based on education cloud |
CN112069475A (en) * | 2020-09-14 | 2020-12-11 | 杭州熙菱信息技术有限公司 | Identity safety management system |
CN112069475B (en) * | 2020-09-14 | 2023-10-24 | 杭州领信数科信息技术有限公司 | Identity security management system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20210073806A1 (en) | Data processing system utilising distributed ledger technology | |
US10587413B1 (en) | Decentralized identities for cross-enterprise authentication and/or authorization | |
US11863677B2 (en) | Security token validation | |
US7840813B2 (en) | Method and system with authentication, revocable anonymity and non-repudiation | |
US6986039B1 (en) | Technique for synchronizing security credentials using a trusted authenticating domain | |
CN110602052A (en) | Micro-service processing method and server | |
US6986038B1 (en) | Technique for synchronizing security credentials from a master directory, platform, or registry | |
CN111259351A (en) | User identity verification system based on Access database login | |
CN103259663A (en) | User unified authentication method in cloud computing environment | |
US20130031359A1 (en) | Method and system for modular authentication and session management | |
CN105577835B (en) | Cross-platform single sign-on system based on cloud computing | |
CN112671720B (en) | Token construction method, device and equipment for cloud platform resource access control | |
JP2002064485A (en) | System and method for safe legacy enclave in public key infrastructure | |
CN112651011A (en) | Login verification method, device and equipment for operation and maintenance system and computer storage medium | |
US20140282834A1 (en) | Managing exchanges of sensitive data | |
KR20140085358A (en) | 3d cloud lock | |
US20210266162A1 (en) | Story assisted mnemonic phrase | |
US8176533B1 (en) | Complementary client and user authentication scheme | |
CN111585762A (en) | Server login authentication system based on zero-knowledge proof | |
CN111695147A (en) | Data security management system based on cloud storage technology | |
CN115987696B (en) | Zero trust security gateway implementation method and device based on block chain structure | |
WO2022206431A1 (en) | Method and apparatus for querying ledger data of fabric blockchain | |
CN115277010A (en) | Identity authentication method, system, computer device and storage medium | |
US7308578B2 (en) | Method and apparatus for authorizing execution for applications in a data processing system | |
CN117370952A (en) | Multi-node identity verification method and device based on block chain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20200609 |
|
WW01 | Invention patent application withdrawn after publication |