US 12,143,396 B2
Injecting risk assessment in user authentication
Moshe Kagan, Petach Tikva (IL); and Scott Matthew Andrews, Ashmore (AU)
Assigned to International Business Machines Corporation, Armonk, NY (US)
Filed by International Business Machines Corporation, Armonk, NY (US)
Filed on Mar. 25, 2021, as Appl. No. 17/211,981.
Prior Publication US 2022/0311776 A1, Sep. 29, 2022
Int. Cl. G06F 7/04 (2006.01); H04L 9/40 (2022.01)
CPC H04L 63/105 (2013.01) [H04L 63/0807 (2013.01); H04L 63/0815 (2013.01); H04L 63/083 (2013.01); H04L 63/0876 (2013.01); H04L 63/0884 (2013.01); H04L 63/102 (2013.01); H04L 2463/082 (2013.01)] 24 Claims
OG exemplary drawing
 
1. A computer-implemented method for authenticating a user, comprising:
receiving a login request for an application, wherein the application controls access only to a protected resource remote from a user, without an ability to control access to resources that are not the protected resource;
selecting a collection page from a plurality of collection pages stored on a server and customized to particular applications, wherein the collection page is selected based on the application for which the login request is received;
directing the login request to the collection page, wherein the collection page comprises an authentication script requesting log-in information that the application does not collect;
receiving a risk assessment based on an identity authenticated through the authentication script; and
granting a level of access to the application based on the risk assessment.