International Business Machines Corporation
Detection of Compromised Credentials

Last updated:

Abstract:

Managing client access token requests is provided. It is determined whether a current time interval between a last allowed access token request matches a regular access token request interval for a client. In response to determining that the current time interval does match the regular access token request interval for the client, a current access token request is allowed. An access token is generated for the client to access a protected resource hosted by a resource server based on allowing the current access token request. The access token is issued to the client via a network.

Status:
Application
Type:

Utility

Filling date:

27 Jan 2021

Issue date:

28 Jul 2022