CN111259351A - User identity verification system based on Access database login - Google Patents

User identity verification system based on Access database login Download PDF

Info

Publication number
CN111259351A
CN111259351A CN202010030529.3A CN202010030529A CN111259351A CN 111259351 A CN111259351 A CN 111259351A CN 202010030529 A CN202010030529 A CN 202010030529A CN 111259351 A CN111259351 A CN 111259351A
Authority
CN
China
Prior art keywords
user
identity
management server
login
access database
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202010030529.3A
Other languages
Chinese (zh)
Inventor
王旭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202010030529.3A priority Critical patent/CN111259351A/en
Publication of CN111259351A publication Critical patent/CN111259351A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to the technical field of Access database user identity authentication, and discloses a user identity authentication system based on Access database login, which comprises: the system comprises an Access database A for storing data, a user client U for requesting to log in the Access database A for data Access, and a login management server S for performing identity authentication on a login user of the Access database A, wherein user identity authentication system software is operated on the login management server S; user U as user client UiWhen a login request is sent to a login management server S of an Access database A, a user identity verification system of the login management server S adopts a verification method based on zero knowledge proof to a user UiThe identity of (2) is verified. The invention solves the technical problem that the identity of the login user cannot be safely verified by the conventional Access database.

Description

User identity verification system based on Access database login
Technical Field
The invention relates to the technical field of Access database user identity verification, in particular to a user identity verification system based on Access database login.
Background
Microsoft Access is a small relational database management system. As one of the important Microsoft Office members, Access is not only a database system, but also has a powerful data management function. A user can conveniently generate objects such as query, form and report forms by using various data sources without much computer professional knowledge, particularly macro objects in Access and embedded VBA programming language provide a great function expansion space for a database application system developer from the self-defined programming angle, and the small database application system with more complete self-programming functions becomes possible. Therefore, it is highly appreciated by small enterprise data managers and database beginners.
However, since the Access database does not provide a user identity authentication mechanism with complete and safe functions, the data security of the developed application system cannot be ensured.
Disclosure of Invention
Technical problem to be solved
Aiming at the defects of the prior art, the invention provides a user identity authentication system based on Access database login, which aims to solve the technical problem that the identity of a login user cannot be safely authenticated by the current Access database.
(II) technical scheme
In order to achieve the purpose, the invention provides the following technical scheme:
a user identity authentication system based on Access database login comprises: the system comprises an Access database A for storing data, a user client U for requesting to log in the Access database A for data Access, and a login management server S for performing identity authentication on a login user of the Access database A, wherein user identity authentication system software is operated on the login management server S;
user U as user client UiWhen a login request is sent to a login management server S of an Access database A, a user identity verification system of the login management server S adopts a verification method based on zero knowledge proof to a user UiThe identity of (2) is verified;
the authentication method of the user identity authentication system comprises the following steps:
the method comprises the following steps: user U of user client UiThe method for registering the user on the user identity authentication system of the login management server S specifically includes: user UiSetting a large prime number piAnd q isiCalculating ni=pi×qiAnd n isiTransmitting to a user identity verification system;
step two: user authentication system for user U of user client UiThe identity of the user is verified, and the specific verification process comprises the following steps:
(1) randomly generating a large integer x by a user identity authentication systemiCalculating
Figure BDA0002364140280000021
Figure BDA0002364140280000022
Will yiUser U returned to user client Ui
(2) User UiComputing
Figure BDA0002364140280000023
And z'iTransmitting to a user identity verification system;
(3) user authentication system authentication equation zi=z′iIf it is true, if equation zi=z′iIf true, then user UiKnowing the composite private key piAnd q isiI.e. by the user UiThe identity of (2) is verified;
step three: if the user U of the user client UiIf the identity of the user passes the authentication, the user authentication system of the login management server S allows the user U of the user client U to access the user authentication system of the management server SiLogging in the Access database A for data Access.
Further, in the third step: if the user U of the user client UiIf the identity of the user is not verified, the user authentication system of the login management server S does not allow the user U of the user client UiLogging in the Access database A for data Access.
Further, the first step: user U of user client UiThe method for registering the user on the user identity authentication system of the login management server S specifically includes:
(1) user identity authentication system pops up and user U on registration pageiA dialog box for interactive communication;
(2) user UiSetting a large prime number piAnd q isiCalculating ni=pi×qiAnd n isiAnd inputting the data into a dialog box.
Furthermore, the interactive communication dialog box has a traceless communication function, that is, all interactive communication contents in the dialog box have no backup record.
(III) advantageous technical effects
Compared with the prior art, the invention has the following beneficial technical effects:
user U as user client U in the inventioniWhen a login request is sent to a login management server S of an Access database A, a user identity authentication system adopts an authentication method based on zero knowledge proof to a user UiOnly the user U of the user client U which passes the identity authentication is authenticatediAllowing the user to log in the Access database A for data Access;
and at the user UiAfter the authentication is completed, the user authentication system of the login management server S only knows the user UiIs legitimate, it does not know the user UiOf the composite private key piAnd q isiI.e. user UiWithout revealing its own composite private key piAnd q isiOn the premise of finishing the identity verification;
therefore, the technical problem that the identity of the login user cannot be safely verified by the current Access database is solved.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
A user identity authentication system based on Access database login comprises: the system comprises an Access database A for storing data, a user client U for requesting to log in the Access database A for data Access, and a login management server S for performing identity authentication on a login user of the Access database A, wherein user identity authentication system software is operated on the login management server S;
user U as user client UiWhen a login request is sent to a login management server S of an Access database A, a user identity verification system of the login management server S adopts a verification method based on zero knowledge proof to a user UiThe identity of (2) is verified;
if the user UiIf the identity of the user passes the authentication, the user authentication system of the login management server S allows the user U of the user client U to access the user authentication system of the management server SiLogging in an Access database A to Access data;
if the user UiIf the identity of the user is not verified, the user authentication system of the login management server S does not allow the user U of the user client UiLogging in an Access database A to Access data;
the authentication method of the user identity authentication system comprises the following steps:
the method comprises the following steps: user U of user client UiThe method for registering the user on the user identity authentication system of the login management server S specifically includes:
(1) user identity authentication system pops up and user U on registration pageiA dialog box for interactive communication;
(2) user UiSetting a large prime number piAnd q isiCalculating ni=pi×qiAnd n isiInputting the data into a dialog box;
large prime number piAnd q isiIs a composite private key which is the only legitimate certification key and which is only the user U of the user client UiSeparately, i.e. the user authentication system does not know the private key;
step two: user U as user client UiWhen a login request is sent to the login management server S of the Access database A, the user identity authentication system starts to authenticate the user UiThe identity of the user is verified, and the specific verification process comprises the following steps:
(1) user authentication system pops up and user U on authentication pageiA dialog box for interactive communication;
(2) user's bodyRandomly generating a large integer x by the authentication systemiCalculating
Figure BDA0002364140280000051
Figure BDA0002364140280000052
Will yiDisplaying in a dialog box;
(3) user UiComputing
Figure BDA0002364140280000053
And z'iInputting the data into a dialog box;
(4) user authentication system authentication equation zi=z′iWhether the result is true or not;
if equation zi=z′iIf true, then user UiKnowing the composite private key piAnd q isiI.e. by the user UiAuthentication of user UiIs valid, the user U of the user client U is allowed at this timeiLogging in an Access database A to Access data;
preferably, the step (2), the step (3) and the step (4) constitute a round of verification, and the step (2), the step (3) and the step (4) are repeatedly executediSecond, if the user UiZ 'can be calculated correctly each time'iIf the user identity authentication system passes the user UiThe identity authentication of (2);
if in the course of a certain round of verification, the user UiIf the authentication is not passed, the whole authentication process is terminated, and the user UiThe authentication of the user identity verification system is not passed;
after the authentication is completed, the user authentication system only knows the user UiIs legitimate, it does not know the user UiOf the composite private key piAnd q isiI.e. user UiWithout revealing its own composite private key piAnd q isiOn the premise of finishing the identity verification;
the interactive communication dialog box has a traceless communication function, namely all interactive communication contents in the dialog box have no backup record.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.

Claims (4)

1. A user identity authentication system based on Access database login is characterized by comprising: the system comprises an Access database A for storing data, a user client U for requesting to log in the Access database A for data Access, and a login management server S for performing identity authentication on a login user of the Access database A, wherein user identity authentication system software is operated on the login management server S;
user U as user client UiWhen a login request is sent to a login management server S of an Access database A, a user identity verification system of the login management server S adopts a verification method based on zero knowledge proof to a user UiThe identity of (2) is verified, and the verification method comprises the following steps:
the method comprises the following steps: user U of user client UiThe method for registering the user on the user identity authentication system of the login management server S specifically includes: user UiSetting a large prime number piAnd q isiCalculating ni=pi×qiAnd n isiTransmitting to a user identity verification system;
step two: user authentication system for user U of user client UiThe identity of the user is verified, and the specific verification process comprises the following steps:
(1) randomly generating a large integer x by a user identity authentication systemiCalculating
Figure FDA0002364140270000011
Figure FDA0002364140270000012
Will yiUser U returned to user client Ui
(2) User UiComputing
Figure FDA0002364140270000013
And z'iTransmitting to a user identity verification system;
(3) user authentication system authentication equation zi=z′iIf it is true, if equation zi=z′iIf true, then user UiKnowing the composite private key piAnd q isiI.e. by the user UiThe identity of (2) is verified;
step three: if the user U of the user client UiIf the identity of the user passes the authentication, the user authentication system of the login management server S allows the user U of the user client U to access the user authentication system of the management server SiLogging in the Access database A for data Access.
2. The system according to claim 1, wherein in step three, if the user U is the user client U, the user U is authenticatediIf the identity of the user is not verified, the user authentication system of the login management server S rejects the user U of the user client UiLogging in the Access database A for data Access.
3. The system according to claim 2, wherein in step one, the user U of the user client U is authenticatediThe method for registering the user on the user identity authentication system of the login management server S specifically includes:
(1) user identity authentication system pops up and user U on registration pageiA dialog box for interactive communication;
(2) user UiSetting a large prime number piAnd q isiCalculating ni=pi×qiAnd n isiAnd inputting the data into a dialog box.
4. The system of claim 3, wherein the interactive communication dialog box comprises traceless communication functionality, i.e. no backup record is available for all interactive communication content in the dialog box.
CN202010030529.3A 2020-01-13 2020-01-13 User identity verification system based on Access database login Withdrawn CN111259351A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010030529.3A CN111259351A (en) 2020-01-13 2020-01-13 User identity verification system based on Access database login

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010030529.3A CN111259351A (en) 2020-01-13 2020-01-13 User identity verification system based on Access database login

Publications (1)

Publication Number Publication Date
CN111259351A true CN111259351A (en) 2020-06-09

Family

ID=70946889

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010030529.3A Withdrawn CN111259351A (en) 2020-01-13 2020-01-13 User identity verification system based on Access database login

Country Status (1)

Country Link
CN (1) CN111259351A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111832006A (en) * 2020-07-16 2020-10-27 浙江甬恒科技有限公司 Patent retrieval platform based on intelligent operation and maintenance management
CN112035809A (en) * 2020-08-13 2020-12-04 刘乾春 Unified access authorization platform based on education cloud
CN112069475A (en) * 2020-09-14 2020-12-11 杭州熙菱信息技术有限公司 Identity safety management system

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111832006A (en) * 2020-07-16 2020-10-27 浙江甬恒科技有限公司 Patent retrieval platform based on intelligent operation and maintenance management
CN111832006B (en) * 2020-07-16 2021-07-20 浙江甬恒科技有限公司 Patent retrieval platform based on intelligent operation and maintenance management
CN112035809A (en) * 2020-08-13 2020-12-04 刘乾春 Unified access authorization platform based on education cloud
CN112035809B (en) * 2020-08-13 2024-01-12 陕西碧宝教育科技有限公司 Unified access authorization platform based on education cloud
CN112069475A (en) * 2020-09-14 2020-12-11 杭州熙菱信息技术有限公司 Identity safety management system
CN112069475B (en) * 2020-09-14 2023-10-24 杭州领信数科信息技术有限公司 Identity security management system

Similar Documents

Publication Publication Date Title
US20210073806A1 (en) Data processing system utilising distributed ledger technology
US10587413B1 (en) Decentralized identities for cross-enterprise authentication and/or authorization
US11863677B2 (en) Security token validation
US7840813B2 (en) Method and system with authentication, revocable anonymity and non-repudiation
US6986039B1 (en) Technique for synchronizing security credentials using a trusted authenticating domain
CN110602052A (en) Micro-service processing method and server
US6986038B1 (en) Technique for synchronizing security credentials from a master directory, platform, or registry
CN111259351A (en) User identity verification system based on Access database login
CN103259663A (en) User unified authentication method in cloud computing environment
US20130031359A1 (en) Method and system for modular authentication and session management
CN105577835B (en) Cross-platform single sign-on system based on cloud computing
CN112671720B (en) Token construction method, device and equipment for cloud platform resource access control
JP2002064485A (en) System and method for safe legacy enclave in public key infrastructure
CN112651011A (en) Login verification method, device and equipment for operation and maintenance system and computer storage medium
US20140282834A1 (en) Managing exchanges of sensitive data
KR20140085358A (en) 3d cloud lock
US20210266162A1 (en) Story assisted mnemonic phrase
US8176533B1 (en) Complementary client and user authentication scheme
CN111585762A (en) Server login authentication system based on zero-knowledge proof
CN111695147A (en) Data security management system based on cloud storage technology
CN115987696B (en) Zero trust security gateway implementation method and device based on block chain structure
WO2022206431A1 (en) Method and apparatus for querying ledger data of fabric blockchain
CN115277010A (en) Identity authentication method, system, computer device and storage medium
US7308578B2 (en) Method and apparatus for authorizing execution for applications in a data processing system
CN117370952A (en) Multi-node identity verification method and device based on block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20200609

WW01 Invention patent application withdrawn after publication