Monitoring accesses to computer source code
First Claim
Patent Images
1. A method comprising;
- detecting, by a processor, actions by a user while the user is accessing a source code file in a source code repository, at least a subset of the actions selected from the group consisting of mouse clicks and keyboard activity, the processor remote from the user;
determining, by the processor, whether the access is consistent with a history of accesses by the user to the source code repository, the history of accesses comprising portions of source code files accessed by the user, and viewing and editing times corresponding to the portions of source code files; and
based on determining that the access is not consistent with the history of accesses by the user;
analyzing the access for a reason for the user to perform the access, the analyzing based on information about the user and information about the access, the information about the user including work tasks assigned to the user; and
generating a notification of the access based on the analyzing resulting in an absence of a reason for the user to perform the access.
2 Assignments
0 Petitions
Accused Products
Abstract
Aspects include monitoring accesses to computer source code. A method includes detecting an access, by a user, to a source code repository. It is determined whether the access is consistent with a history of accesses by the user to the source code repository. Based on determining that the access is not consistent with the history of accesses by the user, the access is analyzed for a reason for the user to perform the access. The analyzing is based on information about the user and information about the access. A notification of the access is generated based on the analyzing resulting in an absence of a reason for the user to perform the access.
11 Citations
18 Claims
-
1. A method comprising;
-
detecting, by a processor, actions by a user while the user is accessing a source code file in a source code repository, at least a subset of the actions selected from the group consisting of mouse clicks and keyboard activity, the processor remote from the user; determining, by the processor, whether the access is consistent with a history of accesses by the user to the source code repository, the history of accesses comprising portions of source code files accessed by the user, and viewing and editing times corresponding to the portions of source code files; and based on determining that the access is not consistent with the history of accesses by the user; analyzing the access for a reason for the user to perform the access, the analyzing based on information about the user and information about the access, the information about the user including work tasks assigned to the user; and generating a notification of the access based on the analyzing resulting in an absence of a reason for the user to perform the access. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system comprising:
-
a memory having computer readable instructions; and one or more processors for executing the computer readable instructions, the computer readable instructions comprising; detecting, by a processor, actions by a user while the user is accessing a source code file in a source code repository, at least a subset of the actions selected from the group consisting of mouse clicks and keyboard activity, the processor remote from the user; determining, by the processor, whether the access is consistent with a history of accesses by the user to the source code repository, the history of accesses comprising portions of source code files accessed by the user, and viewing and editing times corresponding to the portions of source code files; and based on determining that the access is not consistent with the history of accesses by the user; analyzing the access for a reason for the user to perform the access, the analyzing based on information about the user and information about the access, the information about the user including work tasks assigned to the user; and generating a notification of the access based on the analyzing resulting in an absence of a reason for the user to perform the access. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
-
17. A computer program product comprising a non-transitory computer readable storage medium having program instructions embodied therewith, the program instructions executable by a processor to cause the processor to perform:
-
detecting, by the processor, actions by a user while the user is accessing a source code file in a source code repository, at least a subset of the actions selected from the group consisting of mouse clicks and keyboard activity, the processor remote from the user; determining, by the processor, whether the access is consistent with a history of accesses by the user to the source code repository, the history of accesses comprising portions of source code files accessed by the user, and viewing and editing times corresponding to the portions of source code files; and based on determining that the access is not consistent with the history of accesses by the user; analyzing the access for a reason for the user to perform the access, the analyzing based on information about the user and information about the access, the information about the user including work tasks assigned to the user; and generating a notification of the access based on the analyzing resulting in an absence of a reason for the user to perform the access. - View Dependent Claims (18)
-
Specification