Access management system based on background database

An access management and database technology, applied in the field of background database access management, can solve the problems of key information theft, low cost of identity, wanton flooding, etc., and achieve the effect of solving illegal access and theft

Inactive Publication Date: 2020-08-18
王尧
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the development of Internet and mobile Internet technology and applications, the scene environment for verifying the legality of user identities is more complex. However, the current commonly used identity verification methods are mainly based on the mainstream method of user name and password, combined with SMS verification codes and picture verification codes. and other technologies to realize the identification of user identities, but the databases that appear in the form of usernames and passwords are being removed, exploded, and injected more and more violently, resulting in the frequent theft of key, important, and private data of governments, enterprises, and individuals and being leaked on the Internet. Indiscriminate dissemination or illegal underground transactions on the Internet, leading to the theft and wanton flooding of key information, and even if SMS verification codes and picture verification codes are used, they still face the traditional and single nature of identity verification methods, resulting in forgery and identity theft. Low cost, so that the identity security verification is usually in vain and is broken, resulting in background data being driven straight in and stolen

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the embodiments of the present invention. Apparently, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0028] A background database-based access management system, comprising: a background server S running the access management system ht , background server S ht Configured with a background database S i , running PC terminal U with access management system i , PC terminal U i Through the network communication equipment on the access management system and the background server S ht Realize mutual communication connection;

[0029] To prevent or avoid unauthorized PC termin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of background database access management and further discloses an access management system based on the background database. The system comprises a background server Sht running an access management system, the background server Sht is configured with a background database Si and a PC terminal Ui runs the access management system, and the PC terminal Uiis in communication connection with the background server Sht on the access management system through network communication equipment; the access management system verifies the user identity of the PC terminal Ui by adopting a verification method based on zero knowledge proof; and only when the user identity of the PC terminal Ui passes the verification of the access management system, the background server Sht allows the PC terminal Ui to access the background database Si, otherwise, the background server Sht refuses the access request of the PC terminal Ui to the background database Si. Thetechnical problem that data in an existing background database is illegally accessed and stolen is solved.

Description

technical field [0001] The invention relates to the technical field of background database access management, in particular to a background database-based access management system. Background technique [0002] With the development of Internet and mobile Internet technology and applications, the scene environment for verifying the legality of user identities is more complex. However, the current commonly used identity verification methods are mainly based on the mainstream method of username and password, combined with SMS verification codes and picture verification codes. and other technologies to realize the identification of user identities, but the databases that appear in the form of usernames and passwords are being removed, exploded, and injected more and more violently, resulting in the frequent theft of key, important, and private data of governments, enterprises, and individuals and being leaked on the Internet. Indiscriminate dissemination or illegal underground t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/30H04L9/08
CPCH04L63/0869H04L63/083H04L9/0863H04L9/0869H04L9/3066H04L63/10H04L9/3221
Inventor 王尧
Owner 王尧
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products