CODE MONITORING AND RESTRICTING OF EGRESS OPERATIONS
One example method of operation may include identifying an attempted action taken to code, determining whether to block the attempted action based on one or more of user profile access rights assigned to a user profile and a code permission assigned to the code, and responsive to determining whether...
Saved in:
Main Authors | , , |
---|---|
Format | Patent |
Language | English |
Published |
19.08.2021
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | One example method of operation may include identifying an attempted action taken to code, determining whether to block the attempted action based on one or more of user profile access rights assigned to a user profile and a code permission assigned to the code, and responsive to determining whether to block the attempted action, blocking one or more of access to the code, access to a file containing the code and a port used to connect to a server hosting the code. |
---|---|
Bibliography: | Application Number: US202117178233 |