A method for database login authentication based on kerberos mechanism

A login authentication and database technology, applied in the field of database login access, can solve the problem of lack of effective authentication methods for database user login, and achieve the effects of security assurance, performance improvement, and security improvement.

Active Publication Date: 2022-01-11
TIANJIN NANKAI UNIV GENERAL DATA TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In view of this, the present invention aims to propose a method for implementing database login authentication based on the Kerberos mechanism, so as to solve the problem of lack of effective authentication methods for database user login and improve database user authentication performance.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for database login authentication based on kerberos mechanism

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] It should be noted that, in the case of no conflict, the embodiments of the present invention and the features in the embodiments can be combined with each other.

[0037] In describing the present invention, it should be understood that the terms "center", "longitudinal", "transverse", "upper", "lower", "front", "rear", "left", "right", " The orientations or positional relationships indicated by "vertical", "horizontal", "top", "bottom", "inner" and "outer" are based on the orientations or positional relationships shown in the drawings, and are only for the convenience of describing the present invention and Simplified descriptions, rather than indicating or implying that the device or element referred to must have a particular orientation, be constructed and operate in a particular orientation, and thus should not be construed as limiting the invention. In addition, the terms "first", "second", etc. are used for descriptive purposes only, and should not be understood ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for realizing database login authentication based on the Kerberos mechanism, including two stages of preparation for authentication and dynamic authentication. to the server; the server parses the user name information to determine whether it is the Kerberos authentication method, and if so, marks it and sends the relevant authentication data to the client; the client receives the authentication data for client identity verification; after the verification is passed, the client The terminal sends the authentication subject information of the server to the KDC, and the KDC authenticates the legal identity information of both the client and the server; the client obtains the authorization ticket certificate cred through the ticket authorization service and sends it to the server; the server decrypts the cred to obtain the client information , compared with the client authentication ID, if they are the same, the login is successful. Kerberos authentication eliminates the possibility of login password leakage, and ensures the legitimacy of the data requester and the data provider.

Description

technical field [0001] The invention belongs to the field of database login and access, and in particular relates to a method for realizing database login authentication based on a Kerberos mechanism. Background technique [0002] Database user login is an important guarantee for user security. How to make this process more secure and effective is a problem that database developers need to consider. Although Kerberos is a relatively mature authentication method, there is no application scenario for how to effectively combine it with database users. It is of great significance to realize the effective combination of GBase8a MPP database user login and Kerberos mechanism, strengthen the user security of GBase8a MPP products and improve the performance of user authentication. Contents of the invention [0003] In view of this, the present invention aims to propose a method for implementing database login authentication based on the Kerberos mechanism, so as to solve the prob...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/31G06F21/46G06F21/60
CPCG06F21/31G06F21/46G06F21/602G06F21/604G06F2221/2141
Inventor 赵伟崔杰姚铸
Owner TIANJIN NANKAI UNIV GENERAL DATA TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products