Netinfo Security ›› 2016, Vol. 16 ›› Issue (9): 6-11.doi: 10.3969/j.issn.1671-1122.2016.09.002

• Orginal Article • Previous Articles     Next Articles

Optimization Method for OAuth2.0 Protocol

Chengkun WEI(), Xiangdong LIU, Zhaojun SHI   

  1. Institute 706,The Second Academy of China Aerospace Science and Industry Corporation, Beijing 100854, China
  • Received:2016-07-25 Online:2016-09-20 Published:2020-05-13

Abstract:

To improve the security of protocol OAuth2.0, we optimize the protocol by introducing a security point and an synchronization mechanism based on the basic OAuth2.0 protocol. OAuth protocol for the current more popular authorization protocol, has experienced two versions of OAuth2.0 and OAuth1.0 is still in constant optimization. We proposed a new authorization process based on authorization code. Firstly, we studied the basic OAuth2.0 protocol. To prevent the security threats in information disclosure, we present a detailed model, in which a security node is introduced in the authorization server to check the security of authorization request, and a synchronization mechanism is introduced between the authorization server and the resource server to synchronize the information between the servers, then, we describes the new authorization model and the framework for realization of this protocol. Finally, we gave an example of system design to fulfill the new protocol model.

Key words: OAuth2.0, security, authorization, security point, authorization code

CLC Number: