CODE TRACKING AND IDENTIFICATION

One example method of operation may include identifying a plurality of code access events over a period of time, determining whether any of the code access events included any sensitive code segments, determining whether any of the code access events which included the sensitive code segments were u...

Full description

Saved in:
Bibliographic Details
Main Authors Arora, Ajay K, Linga, Prakash, Buzuev, Vladimir
Format Patent
LanguageEnglish
Published 19.08.2021
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:One example method of operation may include identifying a plurality of code access events over a period of time, determining whether any of the code access events included any sensitive code segments, determining whether any of the code access events which included the sensitive code segments were unauthorized, and performing one or more automated actions to restrict code access permissions of one or more user profiles.
Bibliography:Application Number: US202117178229