CODE TRACKING AND IDENTIFICATION
One example method of operation may include identifying a plurality of code access events over a period of time, determining whether any of the code access events included any sensitive code segments, determining whether any of the code access events which included the sensitive code segments were u...
Saved in:
Main Authors | , , |
---|---|
Format | Patent |
Language | English |
Published |
19.08.2021
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | One example method of operation may include identifying a plurality of code access events over a period of time, determining whether any of the code access events included any sensitive code segments, determining whether any of the code access events which included the sensitive code segments were unauthorized, and performing one or more automated actions to restrict code access permissions of one or more user profiles. |
---|---|
Bibliography: | Application Number: US202117178229 |