CODE MONITORING AND RESTRICTING OF EGRESS OPERATIONS

One example method of operation may include identifying an attempted action taken to code, determining whether to block the attempted action based on one or more of user profile access rights assigned to a user profile and a code permission assigned to the code, and responsive to determining whether...

Full description

Saved in:
Bibliographic Details
Main Authors Arora, Ajay K, Linga, Prakash, Buzuev, Vladimir
Format Patent
LanguageEnglish
Published 16.03.2023
Subjects
Online AccessGet full text

Cover

Loading…