Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Two-Factor Authentication Method for Database User Authentication

A two-factor authentication and user identity technology, which is applied in the design and implementation of two-factor identity authentication protocols, can solve problems such as password guessing attacks, password leaks, and inability to guarantee password security, and achieve high security, safe and efficient identity authentication. Effect

Active Publication Date: 2022-07-22
PEKING UNIV
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Existing practical two-factor protocols based on smart phones are similar to the (1) type of two-factor protocols based on physical cards, such as Google Authenticator, FIDO, Duo, etc. Smart phones generate PIN codes and passwords and send them to the server together, smart phones and Passwords are verified separately, and the security of passwords cannot be guaranteed
In 2014, Shirvanian et al. proposed 13 methods based on the literature 3 (Shirvanian M, Jarecki S, Saxena N, et al. Two-factor protocols for mixed-bandwidth smart devices, but these protocols rely on public key infrastructure (PKI) and are vulnerable to PKI failure and password compromise
Existing protocols either have security issues, such as password leaks, password guessing attacks, etc., or have low performance and are not suitable for fast access to databases

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Two-Factor Authentication Method for Database User Authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] Below in conjunction with the accompanying drawings, the present invention is further described by means of embodiments, but the scope of the present invention is not limited in any way.

[0033] Using the smart phone-based two-factor identity authentication protocol designed by the method provided by the present invention to perform database user identity authentication, the existing authentication key exchange protocol can be transformed into a password-based and smart phone-based one, with anonymity, forward security and An authentication protocol with security attributes such as user-friendliness to achieve secure and efficient two-factor authentication.

[0034] The user identity authentication process of the present invention includes an initialization phase, a user registration phase and an authentication key exchange phase. figure 1 Shown is the design and implementation process of the identity authentication protocol of the present invention. The present inven...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a two-factor authentication method for database user identity verification. The steps include: 1) an initialization stage: the server S generates and stores a public-private key pair (k s , K S ); 2) Registration stage: client C communicates with smartphone D and server S at the same time, and converts the password pw input by user U into a random password rw; client C generates a public-private key pair for user U (k U , K U ), encrypt the private key k with rw U and public key K S , generate ciphertext c; client C sends the public key K U Send to server S, and send ciphertext c to mobile phone D; server S stores K U , the mobile phone D stores the ciphertext c; 3) Authentication stage: the user U verifies each other with the server S under the assistance of the mobile phone D, if both verifications pass, the server S agrees to the user U to access the database and establishes a temporary session key SK; otherwise Server S terminates the connection service. The invention can realize safe and efficient two-factor authentication.

Description

technical field [0001] The invention belongs to the technical field of information security, and relates to a practical and combinable user identity authentication method, in particular to a design and implementation method of a smart phone-based dual-factor identity authentication protocol for database users. Background technique [0002] A fundamental step in securing a database system is to verify the identity of the user accessing the database (authentication). A sophisticated authentication scheme helps protect users and the data they store from attackers. Existing database systems (such as Oracle, MySQL) provide a variety of authentication strategies to meet user needs, such as password-based authentication methods, token or smart card-based strong authentication methods, and public key infrastructure (PKI) authentication method, proxy authentication, etc. Among these authentication methods, password-based authentication is the most basic and convenient method. User...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L9/08
CPCH04L63/08H04L63/0807H04L63/0838H04L63/061H04L9/0861
Inventor 王平李文婷程海波
Owner PEKING UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products