International Business Machines Corporation
PREVENTING UNTRUSTED SCRIPT EXECUTION

Last updated:

Abstract:

Using a first key, an encrypted file fingerprint is decrypted, the decrypting resulting in a decrypted file fingerprint. Using a hash function on a script file, a script file fingerprint is computed, the script file intended to be executed by an interpreter. Responsive to the script file fingerprint matching the decrypted file fingerprint, the script file is executed.

Status:
Application
Type:

Utility

Filling date:

4 Mar 2020

Issue date:

9 Sep 2021