基于OAUTH協(xié)議的動(dòng)態(tài)口令認(rèn)證平臺(tái)設(shè)計(jì)與實(shí)現(xiàn)
[Abstract]:With the development of the Internet, its openness has become an inevitable trend, Internet companies have launched their own open platforms. The open platform wraps the service as a unified interface, and the interface is open to third parties. Third parties can develop applications based on open platform interfaces. In this process, the trust mechanism between the user, the third party and the open platform mainly adopts OAUTH authorization mode. The advantage of OAUTH protocol is that the third party can use the user resources of the target website without knowing the user account and password of the target website. Therefore, it has been favored by major Internet manufacturers and widely used. For OAUTH protocol, it is an authorization protocol rather than an authentication protocol, so the security problems of OAUTH protocol are exposed with its wide use. Whether it is OAUTH2.0 or OAUTH1.0, security issues will hinder its development. On the basis of deep research on OAUTH protocol, identity authentication technology and dynamic password technology, firstly, the formal analysis of BAN logic of OATUH protocol and the detailed analysis of four authorization modes of OAUTH2.0 are carried out to obtain the root of the security problem. Secondly, combined with dynamic password, broadcast, logging and other related technologies and theories are used to try to make up for the security problems involved in the OAUTH protocol. Furthermore, the previous research results are displayed in the form of platform, and the related modules involved in the platform are designed, such as dynamic password implementation, OAUTH authorization to implement, REST WEB services, etc. It includes comparing the advantages and disadvantages of different authentication technology and password authentication technology, selecting appropriate and sound authentication methods, designing password generation algorithm, designing password authentication basic flow, designing access token and authorization code, etc. Finally, the platform designed in this paper is implemented by JAVA programming, which is safe, reliable, open and has strong extensibility. On the one hand, the dynamic password platform based on OAUTH protocol can provide sound identity authentication to meet the security requirements. Another aspect can realize the sharing of user data, improve the utilization of network resources, reduce the cost of developing and maintaining user management system, and also save the link of user registration account. The OAUTH protocol is improved and dynamic authentication is added so as to avoid the attacker using XSS,CSRF to hijack the user account and then to unify the identity authentication and authority management of the user.
【學(xué)位授予單位】:北京郵電大學(xué)
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2014
【分類號(hào)】:TP393.04
【參考文獻(xiàn)】
相關(guān)期刊論文 前10條
1 孫冬梅,裘正定;生物特征識(shí)別技術(shù)綜述[J];電子學(xué)報(bào);2001年S1期
2 陳振;;CSRF攻擊的原理解析與對(duì)策研究[J];福建電腦;2009年06期
3 王征;;比較IOS探討安卓系統(tǒng)的優(yōu)勢(shì)[J];才智;2013年20期
4 葉錫君,吳國(guó)新,許勇,束坤;一次性口令認(rèn)證技術(shù)的分析與改進(jìn)[J];計(jì)算機(jī)工程;2000年09期
5 吳晨清,榮震華;用JSP/Servlet技術(shù)構(gòu)建Web應(yīng)用[J];計(jì)算機(jī)工程;2001年01期
6 王惠芳,郭金庚;用BAN邏輯方法分析SSL 3.0協(xié)議[J];計(jì)算機(jī)工程;2001年11期
7 高能,向繼,馮登國(guó);一種基于數(shù)字證書(shū)的網(wǎng)絡(luò)設(shè)備身份認(rèn)證機(jī)制[J];計(jì)算機(jī)工程;2004年12期
8 劉知貴,楊立春,蒲潔,張霜;基于PKI技術(shù)的數(shù)字簽名身份認(rèn)證系統(tǒng)[J];計(jì)算機(jī)應(yīng)用研究;2004年09期
9 王建斌;胡小生;李康君;趙靚;;REST風(fēng)格和基于SOAP的Web Services的比較與結(jié)合[J];計(jì)算機(jī)應(yīng)用與軟件;2010年09期
10 宗華,李建民,萬(wàn)長(zhǎng)林;基于數(shù)字證書(shū)的Web身份認(rèn)證機(jī)制的研究與實(shí)現(xiàn)[J];計(jì)算機(jī)與現(xiàn)代化;2005年06期
,本文編號(hào):2365651
本文鏈接:http://sikaile.net/guanlilunwen/ydhl/2365651.html