International Business Machines Corporation
PREVENTING UNTRUSTED SCRIPT EXECUTION
Last updated:
Abstract:
Using a first key, an encrypted file fingerprint is decrypted, the decrypting resulting in a decrypted file fingerprint. Using a hash function on a script file, a script file fingerprint is computed, the script file intended to be executed by an interpreter. Responsive to the script file fingerprint matching the decrypted file fingerprint, the script file is executed.
Status:
Application
Type:
Utility
Filling date:
4 Mar 2020
Issue date:
9 Sep 2021