期刊文献+

基于OAuth2.0的认证授权技术研究 被引量:19

Optimization Method for OAuth2.0 Protocol
在线阅读 下载PDF
导出
摘要 为了提高OAuth2.0协议的安全性,文章在深入分析OAuth2.0协议的基础上提出了基于OAuth2.0协议的引入安全节点和同步机制的改进方法,改进了协议的授权流程。OAuth协议为目前较流行的身份认证授权协议,经历了OAuth1.0和OAuth2.0两个版本目前仍在不断的优化中。文章首先研究了OAuth2.0协议的基本原理,针对OAuth2.0协议在实施过程中可能存在的信息泄露方面的安全威胁,提出了基于OAuth2.0的在授权服务器中引入安全节点,同时在授权服务器和资源服务器之间引入同步机制的方法,从而在授权过程前期对授权申请的安全性进行检查并在授权过程中实现授权服务器和资源服务器信息的共享,对OAuth2.0协议进行优化。然后,文章对协议改进的思想和协议的抽象授权流程进行详细描述,对协议的实现架构、具体授权流程进行了详细的介绍。最后,结合工程应用实例给出系统设计方案,对改进的协议进行系统实现,通过协议改进前后的实验效果的对比,验证了改进协议的可行性和有效性。 To improve the security of protocol OAuth2.0, we optimize the protocol by introducing a security point and an synchronization mechanism based on the basic OAuth2.0 protocol. OAuth protocol for the current more popular authorization protocol, has experienced two versions of OAuth2.0 and OAuth1.0 is still in constant optimization. We proposed a new authorization process based on authorization code. Firstly, we studied the basic OAuth2.0 protocol. To prevent the security threats in information disclosure, we present a detailed model, in which a security node is introduced in the authorization server to check the security of authorization request, and a synchronization mechanism is introduced between the authorization server and the resource server to synchronize the information between the servers, then, we describes the new authorization model and the framework for realization of this protocol. Finally, we gave an example of system design to fulfill the new protocol model.
出处 《信息网络安全》 2016年第9期6-11,共6页 Netinfo Security
关键词 开放授权2.0协议 安全性 授权 安全节点 授权码 OAuth2.0 security authorization security point authorization code
  • 相关文献

参考文献3

二级参考文献97

  • 1周贤伟,施德军,覃伯平.无线传感器网络认证机制的研究[J].计算机应用研究,2006,23(12):108-111. 被引量:6
  • 2CAESAR: Competition for Authenticated Encryption: Security, Applicability, and Robustness. [EB/OL]http://competitions.cr.yp.to/caesar.hnnl.
  • 3Alizadeh J, Aref M 1k, Bagheri N. JHAE: An authenticated encryption mode based on JH [J]. IACR Cryptology ePrint Archive, 2014: 193-214, available from http://eprint.iacr.org.
  • 4Andreeva E, Bogdanov A. Parallelizable and authenticated online ciphers [C]. Sako K, Sarkar P (Eds.) ASIACRYPT 2013, 8269, 2013: 424-443.
  • 5Andreeva E, Bilgin B, Bogdanov A, et al. APE: authenticated permutation-based encryption for lightweight cryptography [J]. IACIZ Cryptology ePrint Archive, 2013(791), available from http://eprint.iacr.org.
  • 6Aoki K, Yasuda K. The security of the OCB mode of operation without the SPRP assumption [C]. ProvSec 2013, 8209, Springer-Verlag, 2013: 202-220.
  • 7Bertoni G, Daemen J. Permutation based encryption, authentication and authenticated encryption [J]. DIAC 2012, available from http://www. hyperelliptic.org.
  • 8Bellare M, Desai A, Jokipii E, et al. A Concrete Security treatment of symmetric encryption [C]. In Proceedings of the 38th symposiun on FOCS, IEEE, 1997: 394-403.
  • 9Bertoni G, Daemen J, Peeters M, et al. Duplexing the sponge: Single- pass authenticated encryption and other applications [C]. SAC 2011 , Springer, 2011: 320-337.
  • 10Bogdanov A, Mendel F, Regazzoni F. ALE: AES-based lightweight authenticated encryption [C]. In Fast Software Encryption, FSE 2013, Lecture Notes in Computer Science, Moriai S (ed.), Springer-Verlag, 2013.

共引文献26

同被引文献83

引证文献19

二级引证文献64

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部