[go: up one dir, main page]

CN104168116A - Database identity authentication method and system - Google Patents

Database identity authentication method and system Download PDF

Info

Publication number
CN104168116A
CN104168116A CN201410409637.6A CN201410409637A CN104168116A CN 104168116 A CN104168116 A CN 104168116A CN 201410409637 A CN201410409637 A CN 201410409637A CN 104168116 A CN104168116 A CN 104168116A
Authority
CN
China
Prior art keywords
password
dynamic password
database
application program
dynamic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410409637.6A
Other languages
Chinese (zh)
Other versions
CN104168116B (en
Inventor
丁瑞琦
赵亮
陆铮
贺耀宜
汪丛笑
张卫国
陈小林
王启峰
赵立厂
闫兆振
奚冬芹
戴雨
林兴旺
安新亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tiandi Changzhou Automation Co Ltd
Changzhou Research Institute of China Coal Technology and Engineering Group Corp
Original Assignee
Tiandi Changzhou Automation Co Ltd
Changzhou Research Institute of China Coal Technology and Engineering Group Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tiandi Changzhou Automation Co Ltd, Changzhou Research Institute of China Coal Technology and Engineering Group Corp filed Critical Tiandi Changzhou Automation Co Ltd
Priority to CN201410409637.6A priority Critical patent/CN104168116B/en
Publication of CN104168116A publication Critical patent/CN104168116A/en
Application granted granted Critical
Publication of CN104168116B publication Critical patent/CN104168116B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention provides a database identity authentication method and system. When receiving a database access instruction of an application program, a password generating end generates a first dynamic password corresponding to the application program and sends the first dynamic password to a password verification end; when receiving the first dynamic password corresponding to the application program, the password verification end generates a second dynamic password, and whether the first dynamic password and the second dynamic password are consistent is determined through comparison; when the first dynamic password and the second dynamic password are consistent through comparison, an account number and a code of a database are returned to the application program, the password generating end triggers the application program to be connected with the database according to the account number and the code, and accordingly the database caries out identity verification on connection. Compared with the prior art that the account number and the code of the database are directly stored in a configuration file, the account number and the code of the database can be obtained in a dynamic password verification mode, and access safety of the database is improved.

Description

A kind of database auth method and system
Technical field
The application relates to database technical field, especially a kind of database auth method and system.
Background technology
Database, is according to certain data structure storage the technology of management data, its have sharing high and with the advantage such as application program is independent, be widely used in the processing procedure of miscellaneous service data.Wherein, in order to improve the fail safe of business datum, the application program of accessing database is carried out to authentication most important.Particularly, in the time of application program accessing database, need account and the password of input database, in the time that the account of typing is identical with the account of storing in password and database and password, allow this visit, otherwise, denied access.
At present, the auth method of database is, application call is stored in database account and the password in local profile, and according to the account and password to the database authentication that conducts interviews.This kind of method, due to easily the reading property of local profile, causes the account of database and password to be easily illegally accessed, thereby reduces the fail safe of database.
Summary of the invention
In view of this, the application provides a kind of database auth method and system, causes the account of database and password to be easily illegally accessed in order to solve the auth method of prior art, thereby reduces the technical problem of the fail safe of database.For realizing described goal of the invention, technical scheme provided by the invention is as follows:
A kind of database auth method, comprising:
In the time receiving the database access instruction of application program, generate first dynamic password corresponding with described application program;
Described the first dynamic password is sent to password authentication end, whether trigger described password authentication end generates the second dynamic password and compares described the first dynamic password consistent with described the second dynamic password, and trigger described password authentication end in the time that comparison is consistent, the account of database and password are back to described application program;
Trigger described application program and create and being connected of database according to described account and password, described database is verified described connection.
Above-mentioned verification method, preferably, described generation first dynamic password corresponding with described application program comprises:
Obtain the value of public-key cryptography and the default dynamic factor corresponding with described application program; Wherein, described default dynamic factor comprises the time;
It is the first character string that the value of described public-key cryptography and described default dynamic factor is linked in sequence, and according to default cryptographic algorithm, described the first character string is encrypted as to the second character string;
Described the second character string is transformed and generates the first dynamic password.
Above-mentioned verification method, preferably, described by described second character string conversion generation the first dynamic password, comprising:
Described the second character string is converted to the first byte arrays;
According to default dynamic password figure place, described the first byte arrays is divided into multiple the second byte arrays; Wherein, the length of each described the second byte arrays is all identical with described default dynamic password figure place;
The element of same position in the second byte arrays described in each is carried out to logical operation, obtain the 3rd byte arrays, and extract a binary value in each byte elements of described the 3rd byte arrays, generate the first dynamic password.
Above-mentioned verification method, preferably, the character string that the project name that described public-key cryptography is application program generates after encrypting;
Described default dynamic factor also comprises: the bullets of application program and/or the number of run of application program; And in described default dynamic factor, the precision of time is for dividing.
The application also provides a kind of database auth method, comprising:
In the time receiving the first dynamic password corresponding to application program, generate the second dynamic password;
Compare described the first dynamic password whether consistent with described the second dynamic password;
When comparison is when consistent, the account of database and password are back to described application program, trigger described application program and create and being connected of database according to described account and password, described database is verified described connection.
Above-mentioned verification method, preferably, also comprises:
According to the first Preset Time interval, timing generates the 3rd dynamic password; Wherein, the precision at described the first Preset Time interval is week or the moon;
After generating described the 3rd dynamic password, the 3rd dynamic password that is described generation by the password update of described database.
Above-mentioned verification method, preferably, described in the time receiving the first dynamic password corresponding to application program, generate the second dynamic password, comprising:
In the time receiving the first dynamic password corresponding to application program, obtain current point in time;
According to the second Preset Time interval, generate respectively current point in time and each self-corresponding the second dynamic password of a upper time point;
Correspondingly, whether described the first dynamic password of described comparison is consistent with described the second dynamic password, comprising:
Whether unanimously compare the second dynamic password that the second dynamic password that described the first dynamic password is corresponding with described current point in time or a upper time point are corresponding.
Above-mentioned verification method, preferably, also comprises:
Encrypt described the 3rd dynamic password of storage.
The application also provides a kind of database authentication system, comprising:
Password generated end, in the time receiving the database access instruction of application program, generates first dynamic password corresponding with described application program, and described the first dynamic password is sent to password authentication end;
Password authentication end, for in the time receiving the first dynamic password corresponding to application program, generation the second dynamic password, and whether compare described the first dynamic password consistent with described the second dynamic password, in the time that comparison is consistent, the account of database and password are back to described application program;
Described password generated end, also creates and being connected of database according to described account and password for triggering described application program, and described database is verified described connection.
Above-mentioned verification system, preferably, described password authentication end also, for according to the first Preset Time interval, regularly generates the 3rd dynamic password, and after generating described the 3rd dynamic password, the 3rd dynamic password that is described generation by the password update of described database; Wherein, the precision at described the first Preset Time interval is week or the moon.
Compared with prior art, the application has following beneficial effect:
In the technical scheme that the application provides, password generated end is in the time receiving the database access instruction of application program, generate first dynamic password corresponding with described application program, and described the first dynamic password is sent to password authentication end, password authentication end is in the time receiving the first dynamic password corresponding to application program, generate the second dynamic password, whether and it is consistent with described the second dynamic password to compare described the first dynamic password, in the time that comparison is consistent, the account of database and password are back to application program, password generated end triggers application program and creates and being connected of database according to this account and password, so that database carries out authentication to this connection.Compared with directly database account and password being stored in to configuration file in prior art, the application could obtain database account and password by the mode of verifying dynamic password, has improved the access security of database.
Brief description of the drawings
In order to be illustrated more clearly in the embodiment of the present invention or technical scheme of the prior art, to the accompanying drawing of required use in embodiment or description of the Prior Art be briefly described below, apparently, accompanying drawing in the following describes is only embodiments of the invention, for those of ordinary skill in the art, do not paying under the prerequisite of creative work, other accompanying drawing can also be provided according to the accompanying drawing providing.
The flow chart of the password generated client database auth method that Fig. 1 provides for the embodiment of the present invention;
In the password generated client database auth method that Fig. 2 provides for the embodiment of the present invention, generate the flow chart of the first dynamic password;
The flow chart of the password authentication end client database auth method that Fig. 3 provides for the embodiment of the present invention;
Another flow chart of the password authentication client database auth method that Fig. 4 provides for the embodiment of the present invention;
The structure chart of the database authentication system that Fig. 5 provides for the embodiment of the present invention;
Database authentication system structure and method flow diagram that Fig. 6 provides for the embodiment of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is clearly and completely described, obviously, described embodiment is only the present invention's part embodiment, instead of whole embodiment.Based on the embodiment in the present invention, those of ordinary skill in the art, not making the every other embodiment obtaining under creative work prerequisite, belong to the scope of protection of the invention.
Referring to Fig. 1, the flow process that it shows the database auth method that the embodiment of the present invention provides, specifically comprises:
Step S101: in the time receiving the database access instruction of application program, generate first dynamic password corresponding with described application program.
Wherein, when application program needs the business datum in accessing database, generating database access instruction, and this instruction is sent to the module that the present embodiment is corresponding, i.e. password generated end.Wherein, password authentication end can be dynamic link library, comprises the algorithm that generates dynamic password in dynamic link library.
It should be noted that, dynamic password utilizes dynamic password algorithm to generate.In process due to dynamic password algorithm generation dynamic password, need parameter to be encrypted, parameter is corresponding with the application program of carrying out database access, that is to say, each application program has corresponding parameter, in the time receiving the database access instruction of an application program, obtain the parameter corresponding with this application program, there is uniqueness thereby make that parameter is encrypted to the first dynamic password generating.
Step S102: described the first dynamic password is sent to password authentication end, whether trigger described password authentication end generates the second dynamic password and compares described the first dynamic password consistent with described the second dynamic password, and trigger described password authentication end in the time that comparison is consistent, the account of database and password are back to described application program.
Wherein, password authentication end and password generated end can be on same computer, can be also the not computers being on the same stage connected by network.When password verifying end receives after this first dynamic password, thereby can think that receiving triggering command carries out follow-up generation and comparison action.
It should be noted that, the algorithm that described password authentication end generates the second dynamic password is identical with the algorithm that generates the first dynamic password, specifically comprises the parameter that algorithmic rule and algorithm for encryption are used.
Step S103: trigger described application program and create and being connected of database according to described account and password, described database is verified described connection.
Wherein, create and being connected of database after application program receives the account returned and password, database receives after this connection, and the account in this connection and password are carried out to authentication.
From above technical scheme, in the database auth method that the application provides, obtaining database account and password is the mode by verifying dynamic password, be that database account and password are stored in password authentication end, in the time that application program needs accessing database, generate first dynamic password corresponding with this application program and be sent to password authentication end, triggering password authentication end verifies this first dynamic password according to the second dynamic password generating, in the time that the result is consistent, just database account and password are back to application program.
In prior art, account and password are stored in local profile, and local profile can be opened by the text edit tool easily, and account and password are easily acquired.But, in the embodiment of the present invention, account and password are stored in to password authentication end, and in the time that the result is consistent, just this account and password are back to application program, improve the fail safe of database account and password, also improve the fail safe of database access.
Further, the first dynamic password generating in the present embodiment just generates in real time in authentication process itself,, is difficult for being obtained by illegal program compared with the mode of configuration file with static storage; Simultaneously, the parameter that generates this dynamic password is also corresponding with application program, the parameter of illegal program is different from the parameter of this application program, therefore, the first dynamic password generating is also different from the first legal dynamic password, cause password authentication result inconsistent, thereby can not get account and the password of database.
From the implementation of the present embodiment, the present embodiment provides interface to application program, calls this interface when application program needs accessing database, generates the first dynamic password thereby trigger the present embodiment.There is privacy due to interface and for the parameter that generates dynamic password, not open to other undelegated application programs, therefore, for illegal program, it is difficult for obtaining and distorting, also just can not generate the first illegal dynamic password and the second dynamic password, therefore, strengthen the fail safe of dynamic password in the present embodiment.
Particularly, in said method embodiment, in step S101, generate first dynamic password corresponding with described application program, can realize in the following manner:
Step S201: the value of obtaining public-key cryptography and the default dynamic factor corresponding with described application program; Wherein, described default dynamic factor comprises the time.
Wherein, the parameter of generation dynamic password comprises public-key cryptography and dynamic factor.The public-key cryptography that application program is corresponding is the character string of utilizing default cryptographic algorithm application programs information encryption to generate.Alternatively, the project label that application information is application program, default cryptographic algorithm is DES algorithm.The public-key cryptography of generation is set in advance at password generated end, for generating the first dynamic password, the public-key cryptography of generation is set in advance at password authentication end, for generating the second dynamic password.
It should be noted that, default dynamic factor comprises the time, alternatively, time precision for point, the time value of obtaining is accurate to point.For example, the time of obtaining is " 201407221503 ", represents 15: 3 on the 22nd July in 2014.Based on the uniqueness of time point, the dynamic password that different time points generates also has uniqueness.Certainly, default dynamic factor, except the time, can also comprise the parameter of other types, for example, and the bullets of application program and/or the number of run of application program etc.
Step S202: it is the first character string that the value of described public-key cryptography and described default dynamic factor is linked in sequence, and according to default cryptographic algorithm, described the first character string is encrypted as to the second character string.
Certainly, the order of connection of public-key cryptography and default dynamic factor is also not construed as limiting, and the two can be that any one is front.And alternatively, default cryptographic algorithm can be MD5 algorithm.
Step S203: described the second character string is converted to the first byte arrays.
Alternatively, the byte arrays that this first byte arrays is 16 byte lengths.
Step S204: according to default dynamic password figure place, described the first byte arrays is divided into multiple the second byte arrays; Wherein, the length of each described the second byte arrays is all identical with described default dynamic password figure place.
Alternatively, default dynamic password is 8, the first byte arrays is divided into the byte arrays of two 8.
Step S205: the element of same position in the second byte arrays described in each is carried out to logical operation, obtain the 3rd byte arrays, and extract a binary value in each byte elements of described the 3rd byte arrays, generate the first dynamic password.
Alternatively, described logical operation is XOR.For example, the array element of two each same positions of octet array is carried out to XOR, obtain an octet array.
In each byte elements, comprise a byte, i.e. 8 bits.Alternatively, the binary value in each byte elements of extraction, for the first from left position, forms 8 bit digital, and this 8 bit digital i.e. the first dynamic password.
It should be noted that, the generating algorithm of the second dynamic password can be consistent with the generating algorithm of above-mentioned the first dynamic password, that is to say, the kind of public-key cryptography and dynamic factor is identical, and algorithmic rule is also identical.What particularly, password authentication end generated the second dynamic password use is public-key cryptography and the dynamic factor corresponding with this application program.Certainly, the time that password authentication end generates the second dynamic password can be to receive after the first dynamic password corresponding to application program, can be also according to Preset Time interval, and timing generates the second dynamic password.It should be noted that, the unit at this Preset Time interval for point, as every 5 minutes, thus the access failure causing can avoid high-frequency database is conducted interviews time.
It should be noted that, said method embodiment can be applied in concrete scene, carries out authentication in order to the database access in concrete industry field.Now scene is defined as to coal industry, and this database authentication algorithm in this coal industry application scenarios is elaborated.
In coal industry application scenarios, what in database, store is the industry such as coal production and sale data, and application program is coal production monitoring program.Generating the public-key cryptography in the dynamic password generating algorithm of the first dynamic password and the second dynamic password, is coal project information to be carried out to order with coal project implementation unit information be connected, and character string after being connected is carried out to the generation of DES algorithm for encryption.The dynamic factor that generates the first dynamic password and the second dynamic password is the time, and precision is for dividing.And then, public-key cryptography and dynamic factor order is connected and generates character string to be encrypted, certainly, when connection, can be public-key cryptography at front dynamic factor rear, can be also dynamic factor at front key rear.Utilize MD5 algorithm, the character string to be encrypted generating is encrypted.
For example, coal project information is " KJ95N mine supervision system ", and coal project implementation unit information is " Bei Zao colliery, Shandong ", and the character string after order is connected is " Bei Zao colliery, KJ95N mine supervision system Shandong "; The character string generating after utilizing DES algorithm to encrypt this character string is " QFwMUIaqJ9t8jNb8ALPLcQOriwP/K4mQdbRYRzXvJWpFysmKHtK/yJwo 2NBeJG6a ", and this character string is public-key cryptography; The time of obtaining is " 201407221503 ", represents 15: 3 on the 22nd July in 2014; The character string to be encrypted generating after the posterior mode of front key connects according to dynamic factor is " 201407221503QFwMUIaqJ9t8jNb8ALPLcQOriwP/K4mQdbRYRzXvJWpF ysmKHtK/yJwo2NBeJG6a "; Utilize MD5 algorithm, the character string that this character string to be encrypted is encrypted to rear generation is " NwMlwZhrCaTGu7KCUctukg==".Here mistake in computation, has revised again.
It should be noted that, the database auth method providing in above-mentioned each embodiment of the method is applied to password generated end, and accordingly, the application also provides a kind of database auth method that is applied to password authentication end.Referring to Fig. 3, the idiographic flow that it shows the method, comprising:
Step S301: in the time receiving the first dynamic password corresponding to application program, generate the second dynamic password.
It should be noted that, in the present embodiment, the encryption parameter using while generating the second dynamic password, it is the kind of public-key cryptography and dynamic factor, with generate the first dynamic password identical, and public-key cryptography is to generate according to the project information of application program in advance, that is to say, public-key cryptography is corresponding one by one with application program, all corresponding unique key of each legal application program.It should be noted that, this application program can refer to a class application program, is not an independently application program, and the common ground of such application program is the same database of access.
Step S302: compare described the first dynamic password whether consistent with described the second dynamic password.
Step S303: when comparison is when consistent, the account of database and password are back to described application program, trigger described application program and create and being connected of database according to described account and password, described database is verified described connection.
Above technical scheme is applied in password authentication end, can verify the first dynamic password of password generated end transmission, and in the time that the result is consistent, return data storehouse account and password.In prior art, database account and password are stored in configuration file and are compared, improve the fail safe of account and password, and then improved the fail safe of database access.
Certainly,, in the time that above-mentioned comparison is inconsistent, can return to miscue information to application program.
It should be noted that, because password generated end can be connected by network with password authentication end, and comprise time factor in the generating algorithm of the first dynamic password and the second dynamic password, for fear of the time error of Internet Transmission, and then the success rate of raising verifying dynamic password, above-mentioned steps S302 can realize in the following manner:
In the time receiving the first dynamic password corresponding to application program, obtain current point in time; According to the second Preset Time interval, generate respectively current point in time and each self-corresponding the second dynamic password of a upper time point.
It should be noted that, the unit at the second Preset Time interval divides, for example 5 minutes.A upper time point is that current point in time deducts the second Preset Time interval, for example, when current point in time is 2014-8-1323 25 points, when a upper time point is 2014-8-1323 20 points.
Correspondingly, above-mentioned steps S303 can realize in the following manner:
Whether unanimously compare the second dynamic password that the second dynamic password that described the first dynamic password is corresponding with described current point in time or a upper time point are corresponding.
It should be noted that, the first dynamic password is consistent with any in above-mentioned two the second dynamic passwords, assert that this first dynamic password is legal.
Referring to Fig. 4, on the basis of said method embodiment, can also comprise:
Step S304: according to the first Preset Time interval, timing generates the 3rd dynamic password; Wherein, the precision at described the first Preset Time interval is week or the moon.
Step S305: after generating described the 3rd dynamic password, the 3rd dynamic password that is described generation by the password update of described database.
From above technical scheme, the present embodiment can upgrade by account and the password to database according to the default time interval, compared to fixed password, had improved fail safe.Meanwhile, the frequency of renewal be week or month, compared to renewal frequency for sky, even for time or point, can avoid the access failure that high frequency ground Modify password causes, complicated artificial data storehouse to safeguard and data storage time delay.
Alternatively, after said method embodiment, can also comprise:
Encrypt described the 3rd dynamic password of storage.
Particularly, will the 3rd dynamic password export to file after encrypting, for after anti-locking system surprisingly closes, after again starting, cannot learn the password that generated last time and cannot accessing database.
The database authentication system below application being provided describes, and it should be noted that, this system can, with reference to database auth method provided above, not repeat.
With reference to Fig. 5, the structure that it shows the database authentication system that the embodiment of the present invention provides, specifically comprises: password generated end 1 and password authentication end 2; Wherein:
Password generated end 1, in the time receiving the database access instruction of application program, generates first dynamic password corresponding with described application program, and described the first dynamic password is sent to password authentication end;
Password authentication end 2, for in the time receiving the first dynamic password corresponding to application program, generation the second dynamic password, and whether compare described the first dynamic password consistent with described the second dynamic password, in the time that comparison is consistent, the account of database and password are back to described application program;
Described password generated end 1, also creates and being connected of database according to described account and password for triggering described application program, and described database is verified described connection.
Alternatively, described password authentication end also, for according to the first Preset Time interval, regularly generates the 3rd dynamic password, and after generating described the 3rd dynamic password, the 3rd dynamic password that is described generation by the password update of described database; Wherein, the precision at described the first Preset Time interval is week or the moon.
Known with reference to the data interaction relation between the system configuration shown in Fig. 6 and each structure, the idiographic flow of database authentication is:
When application program needs accessing database, password generated end generates the first dynamic password, and this first dynamic password is sent to password authentication end, password authentication termination is compared this first dynamic password according to the second dynamic password generating after receiving this first dynamic password, in the time that comparison result is consistent, return data storehouse account and password generate and being connected of database after application program receives this account number cipher, and database is verified the account in this connection and password.Meanwhile, password authentication end can regularly generate the 3rd dynamic password, with the password of new database more.
It should be noted that, each embodiment in this specification all adopts the mode of going forward one by one to describe, and what each embodiment stressed is and the difference of other embodiment, between each embodiment identical similar part mutually referring to.
To the above-mentioned explanation of the disclosed embodiments, make professional and technical personnel in the field can realize or use the present invention.To be apparent for those skilled in the art to the multiple amendment of these embodiment, General Principle as defined herein can, in the situation that not departing from the spirit or scope of the present invention, realize in other embodiments.Therefore, the present invention will can not be restricted to these embodiment shown in this article, but will meet the widest scope consistent with principle disclosed herein and features of novelty.

Claims (10)

1. a database auth method, is characterized in that, comprising:
In the time receiving the database access instruction of application program, generate first dynamic password corresponding with described application program;
Described the first dynamic password is sent to password authentication end, whether trigger described password authentication end generates the second dynamic password and compares described the first dynamic password consistent with described the second dynamic password, and trigger described password authentication end in the time that comparison is consistent, the account of database and password are back to described application program;
Trigger described application program and create and being connected of database according to described account and password, described database is verified described connection.
2. verification method according to claim 1, is characterized in that, described generation first dynamic password corresponding with described application program comprises:
Obtain the value of public-key cryptography and the default dynamic factor corresponding with described application program; Wherein, described default dynamic factor comprises the time;
It is the first character string that the value of described public-key cryptography and described default dynamic factor is linked in sequence, and according to default cryptographic algorithm, described the first character string is encrypted as to the second character string;
Described the second character string is transformed and generates the first dynamic password.
3. verification method according to claim 2, is characterized in that, described by described second character string conversion generation the first dynamic password, comprising:
Described the second character string is converted to the first byte arrays;
According to default dynamic password figure place, described the first byte arrays is divided into multiple the second byte arrays; Wherein, the length of each described the second byte arrays is all identical with described default dynamic password figure place;
The element of same position in the second byte arrays described in each is carried out to logical operation, obtain the 3rd byte arrays, and extract a binary value in each byte elements of described the 3rd byte arrays, generate the first dynamic password.
4. verification method according to claim 2, is characterized in that, the character string that the project name that described public-key cryptography is application program generates after encrypting;
Described default dynamic factor also comprises: the bullets of application program and/or the number of run of application program; And in described default dynamic factor, the precision of time is for dividing.
5. a database auth method, is characterized in that, comprising:
In the time receiving the first dynamic password corresponding to application program, generate the second dynamic password;
Compare described the first dynamic password whether consistent with described the second dynamic password;
When comparison is when consistent, the account of database and password are back to described application program, trigger described application program and create and being connected of database according to described account and password, described database is verified described connection.
6. verification method according to claim 5, is characterized in that, also comprises:
According to the first Preset Time interval, timing generates the 3rd dynamic password; Wherein, the precision at described the first Preset Time interval is week or the moon;
After generating described the 3rd dynamic password, the 3rd dynamic password that is described generation by the password update of described database.
7. verification method according to claim 5, is characterized in that, described in the time receiving the first dynamic password corresponding to application program, generates the second dynamic password, comprising:
In the time receiving the first dynamic password corresponding to application program, obtain current point in time;
According to the second Preset Time interval, generate respectively current point in time and each self-corresponding the second dynamic password of a upper time point;
Correspondingly, whether described the first dynamic password of described comparison is consistent with described the second dynamic password, comprising:
Whether unanimously compare the second dynamic password that the second dynamic password that described the first dynamic password is corresponding with described current point in time or a upper time point are corresponding.
8. verification method according to claim 6, is characterized in that, also comprises:
Encrypt described the 3rd dynamic password of storage.
9. a database authentication system, is characterized in that, comprising:
Password generated end, in the time receiving the database access instruction of application program, generates first dynamic password corresponding with described application program, and described the first dynamic password is sent to password authentication end;
Password authentication end, for in the time receiving the first dynamic password corresponding to application program, generation the second dynamic password, and whether compare described the first dynamic password consistent with described the second dynamic password, in the time that comparison is consistent, the account of database and password are back to described application program;
Described password generated end, also creates and being connected of database according to described account and password for triggering described application program, and described database is verified described connection.
10. verification system according to claim 9, it is characterized in that, described password authentication end is also for foundation the first Preset Time interval, timing generates the 3rd dynamic password, and after generating described the 3rd dynamic password, the 3rd dynamic password that is described generation by the password update of described database; Wherein, the precision at described the first Preset Time interval is week or the moon.
CN201410409637.6A 2014-08-19 2014-08-19 A kind of database auth method and system Active CN104168116B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410409637.6A CN104168116B (en) 2014-08-19 2014-08-19 A kind of database auth method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410409637.6A CN104168116B (en) 2014-08-19 2014-08-19 A kind of database auth method and system

Publications (2)

Publication Number Publication Date
CN104168116A true CN104168116A (en) 2014-11-26
CN104168116B CN104168116B (en) 2019-06-04

Family

ID=51911768

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410409637.6A Active CN104168116B (en) 2014-08-19 2014-08-19 A kind of database auth method and system

Country Status (1)

Country Link
CN (1) CN104168116B (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106200556A (en) * 2015-05-29 2016-12-07 库卡罗伯特有限公司 For the method changing at least one the first secure configuration file
CN106411830A (en) * 2016-01-25 2017-02-15 平安科技(深圳)有限公司 Method for preventing access data from being tampered and mobile terminal
CN107332819A (en) * 2017-05-25 2017-11-07 苏州科达科技股份有限公司 A kind of method for authenticating and device for conference system
CN110048834A (en) * 2019-03-12 2019-07-23 深圳壹账通智能科技有限公司 Dynamic password sending method, device and computer readable storage medium
CN110349351A (en) * 2018-04-02 2019-10-18 菜鸟智能物流控股有限公司 Unlocking method and system of logistics object management equipment
CN111368264A (en) * 2018-12-26 2020-07-03 技嘉科技股份有限公司 Verification method of application program, computer device and mainboard thereof
CN111488331A (en) * 2020-04-08 2020-08-04 广州虎牙科技有限公司 Database connection method and device and computer equipment
CN112434094A (en) * 2020-11-24 2021-03-02 平安普惠企业管理有限公司 Database connection method and device based on encryption algorithm and computer equipment
CN112953711A (en) * 2021-01-28 2021-06-11 杉德银卡通信息服务有限公司 Database security connection system and method
CN113645249A (en) * 2021-08-17 2021-11-12 杭州时趣信息技术有限公司 Server password control method, system and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1801699A (en) * 2004-12-31 2006-07-12 联想(北京)有限公司 Method for accessing cipher device
CN101197667A (en) * 2007-12-26 2008-06-11 北京飞天诚信科技有限公司 Dynamic password authentication method
CN101651675A (en) * 2009-08-27 2010-02-17 北京飞天诚信科技有限公司 Method and system for enhancing security of network transactions
US20100153276A1 (en) * 2006-07-20 2010-06-17 Kamfu Wong Method and system for online payment and identity confirmation with self-setting authentication fomula
CN102866998A (en) * 2011-07-05 2013-01-09 中兴通讯股份有限公司 Centralized password management method and centralized password management system in synchronous system
CN103152172A (en) * 2011-12-07 2013-06-12 中国电信股份有限公司 Method and client side and server and system for mobile token dynamic password generation

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1801699A (en) * 2004-12-31 2006-07-12 联想(北京)有限公司 Method for accessing cipher device
US20100153276A1 (en) * 2006-07-20 2010-06-17 Kamfu Wong Method and system for online payment and identity confirmation with self-setting authentication fomula
CN101197667A (en) * 2007-12-26 2008-06-11 北京飞天诚信科技有限公司 Dynamic password authentication method
CN101651675A (en) * 2009-08-27 2010-02-17 北京飞天诚信科技有限公司 Method and system for enhancing security of network transactions
CN102866998A (en) * 2011-07-05 2013-01-09 中兴通讯股份有限公司 Centralized password management method and centralized password management system in synchronous system
CN103152172A (en) * 2011-12-07 2013-06-12 中国电信股份有限公司 Method and client side and server and system for mobile token dynamic password generation

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106200556B (en) * 2015-05-29 2019-06-07 库卡罗伯特有限公司 Method for converting at least one the first secure configuration file
CN106200556A (en) * 2015-05-29 2016-12-07 库卡罗伯特有限公司 For the method changing at least one the first secure configuration file
CN106411830A (en) * 2016-01-25 2017-02-15 平安科技(深圳)有限公司 Method for preventing access data from being tampered and mobile terminal
WO2017129103A1 (en) * 2016-01-25 2017-08-03 平安科技(深圳)有限公司 Method for preventing access data from being tampered, mobile terminal, device, and readable storage medium
AU2017211746B2 (en) * 2016-01-25 2018-06-28 Ping An Technology (Shenzhen) Co., Ltd. Method for preventing access data from being tampered, mobile terminal, device, and readable storage medium
US10320556B2 (en) 2016-01-25 2019-06-11 Ping An Technology (Shenzhen) Co., Ltd. Method, mobile terminal, device, and readable storage medium for preventing accessed data from being tampered with
CN106411830B (en) * 2016-01-25 2019-06-21 平安科技(深圳)有限公司 The method and mobile terminal for preventing access data to be tampered
CN107332819A (en) * 2017-05-25 2017-11-07 苏州科达科技股份有限公司 A kind of method for authenticating and device for conference system
CN110349351A (en) * 2018-04-02 2019-10-18 菜鸟智能物流控股有限公司 Unlocking method and system of logistics object management equipment
CN111368264A (en) * 2018-12-26 2020-07-03 技嘉科技股份有限公司 Verification method of application program, computer device and mainboard thereof
CN110048834A (en) * 2019-03-12 2019-07-23 深圳壹账通智能科技有限公司 Dynamic password sending method, device and computer readable storage medium
CN111488331A (en) * 2020-04-08 2020-08-04 广州虎牙科技有限公司 Database connection method and device and computer equipment
CN111488331B (en) * 2020-04-08 2024-03-01 广州虎牙科技有限公司 Database connection method and device and computer equipment
CN112434094A (en) * 2020-11-24 2021-03-02 平安普惠企业管理有限公司 Database connection method and device based on encryption algorithm and computer equipment
CN112434094B (en) * 2020-11-24 2023-12-29 人和数智科技有限公司 Database connection method and device based on encryption algorithm and computer equipment
CN112953711A (en) * 2021-01-28 2021-06-11 杉德银卡通信息服务有限公司 Database security connection system and method
CN112953711B (en) * 2021-01-28 2022-12-02 杉德银卡通信息服务有限公司 Database security connection system and method
CN113645249A (en) * 2021-08-17 2021-11-12 杭州时趣信息技术有限公司 Server password control method, system and storage medium

Also Published As

Publication number Publication date
CN104168116B (en) 2019-06-04

Similar Documents

Publication Publication Date Title
CN104168116A (en) Database identity authentication method and system
CN111460453B (en) Machine learning training method, controller, device, server, terminal and medium
US10536272B2 (en) Encryption system with double key wrapping
CN109429222B (en) Method for encrypting wireless network equipment upgrading program and communication data
US9537657B1 (en) Multipart authenticated encryption
CN107689869B (en) User password management method and server
CA2914785C (en) System and methods for encrypting data
CN109474423A (en) Data encryption/decryption method, server and storage medium
CN109040090A (en) A kind of data ciphering method and device
US20150134950A1 (en) Storage array password management
TW202036347A (en) Data storage and verification method and device
CN111475824A (en) Data access method, device, equipment and storage medium
CN104636444B (en) A kind of encryption and decryption method and device of database
CN109657497B (en) Secure file system and method thereof
CN104283668A (en) Method and device for obtaining application password based on mobile terminal
CN104683354A (en) A dynamic password system based on identification
CN113079001B (en) Key updating method, information processing apparatus, and key updating device
CN106850232B (en) Authorization management method and system for state maintenance
CN112860791A (en) Cross-network data synchronous control system, method and storage medium
CN104200137A (en) Method for guaranteeing self-security of JAVA program
KR102258700B1 (en) method and system of smart electronic contracting based on block chain
CN103853943A (en) Program protection method and device
TWI789291B (en) Module and method for authenticating data transfer between a storage device and a host device
CN104506320A (en) Method and system for identity authentication
EP3214567B1 (en) Secure external update of memory content for a certain system on chip

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
EXSB Decision made by sipo to initiate substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant