CODE MONITORING AND RESTRICTING OF EGRESS OPERATIONS

One example method of operation may include identifying an attempted action taken to code, determining whether to block the attempted action based on one or more of user profile access rights assigned to a user profile and a code permission assigned to the code, and responsive to determining whether...

Full description

Saved in:
Bibliographic Details
Main Authors Arora, Ajay K, Linga, Prakash, Buzuev, Vladimir
Format Patent
LanguageEnglish
Published 16.03.2023
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:One example method of operation may include identifying an attempted action taken to code, determining whether to block the attempted action based on one or more of user profile access rights assigned to a user profile and a code permission assigned to the code, and responsive to determining whether to block the attempted action, blocking one or more of access to the code, access to a file containing the code and a port used to connect to a server hosting the code.
Bibliography:Application Number: US202217989604