International Business Machines Corporation
Detection of Compromised Credentials
Last updated:
Abstract:
Managing client access token requests is provided. It is determined whether a current time interval between a last allowed access token request matches a regular access token request interval for a client. In response to determining that the current time interval does match the regular access token request interval for the client, a current access token request is allowed. An access token is generated for the client to access a protected resource hosted by a resource server based on allowing the current access token request. The access token is issued to the client via a network.
Status:
Application
Type:
Utility
Filling date:
27 Jan 2021
Issue date:
28 Jul 2022