METHOD AND SYSTEM FOR SECURING AGAINST LEAKAGE OF SOURCE CODE
First Claim
1. A method of detecting source code in a message being sent over a digital communication network to secure against unauthorized leakage of source code, the method comprising:
- intercepting the message on a network device;
placing the message into a memory on the network device;
dividing the message in the memory into one or more segments, each segment including a predetermined number of lines of text from the message;
for each segment, applying one or more syntax rules of a programming language to the segment together with a predetermined number of context lines of text before the segment and/or after the segment, to determine which of the syntax rules of the programming language are matched in the segment; and
providing a determination of whether the message includes source code based on the syntax rules that were matched.
3 Assignments
0 Petitions
Accused Products
Abstract
Embodiments of the invention provide a method and a system of detecting source code in a message being sent over a digital communication network to secure against unauthorized leakage of source code. The message is intercepted on a network device, placed into a memory on the network device, and divided into one or more segments, wherein each segment includes a predetermined number of lines of text from the message. For each segment, one or more syntax rules of a programming language is applied to the segment and a predetermined number of context lines of text before the segment and/or after the segment, to determine which of the syntax rules of the programming language are matched in the segment. A determination of whether the text message includes source code is provided based on the syntax rules that were matched.
69 Citations
25 Claims
-
1. A method of detecting source code in a message being sent over a digital communication network to secure against unauthorized leakage of source code, the method comprising:
-
intercepting the message on a network device; placing the message into a memory on the network device; dividing the message in the memory into one or more segments, each segment including a predetermined number of lines of text from the message; for each segment, applying one or more syntax rules of a programming language to the segment together with a predetermined number of context lines of text before the segment and/or after the segment, to determine which of the syntax rules of the programming language are matched in the segment; and providing a determination of whether the message includes source code based on the syntax rules that were matched. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A system for securing against leakage of source code, the system comprising:
-
a network device connected to a network, the network device configured to intercept a message on the network and store the intercepted message in a memory on the network device; the network device further configured to detect source code in the message by; dividing the message in the memory into one or more segments, each segment including a predetermined number of lines of text; for each segment, applying one or more syntax rules of a programming language to the segment together with a predetermined number of context lines of text before the segment and/or after the segment, to determine which of the syntax rules of the programming language are matched in the segment; and providing a determination of whether the message includes source code based on the syntax rules that were matched; and the network device further configured to take an action to secure against unauthorized leakage of source code if it is determined that the message includes source code. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24, 25)
-
Specification