Paper
20 October 2022 OAuth 2.0 protocol optimization based on CPK technology
Qian Li, Jie Kong
Author Affiliations +
Proceedings Volume 12451, 5th International Conference on Computer Information Science and Application Technology (CISAT 2022); 1245140 (2022) https://doi.org/10.1117/12.2656672
Event: 5th International Conference on Computer Information Science and Application Technology (CISAT 2022), 2022, Chongqing, China
Abstract
As a security standard, OAuth's access certificate is an anonymous token without any protective measures. It is easy to be malicious monitored or stolen in channel transmission. In order to enhance the security transmission of access token and ensure the confidentiality of protected resources. This paper discusses the authorization and delegation function of oauth2.0. Based on the operation mechanism of standard oauth2.0 protocol, it is proposed that the access credentials issued by the subject authorization server are transmitted in JWT structured token format, a handshake is added between the authorization server and the resource server, and the combined encryption CPK system is used in the transmission of access tokens to strengthen mutual authentication among servers, The formal security analysis of partially optimized oauth2.0 protocol is carried out with AVISPA tool as the carrier. The verification results show that this method improves the security of the protocol to a certain extent.
© (2022) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Qian Li and Jie Kong "OAuth 2.0 protocol optimization based on CPK technology", Proc. SPIE 12451, 5th International Conference on Computer Information Science and Application Technology (CISAT 2022), 1245140 (20 October 2022); https://doi.org/10.1117/12.2656672
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Computer security

Information security

Security technologies

Systems modeling

Standards development

Back to Top