International Business Machines Corporation
USING KEYS FOR SELECTIVELY PREVENTING EXECUTION OF COMMANDS ON A DEVICE
Last updated:
Abstract:
A computer-implemented method according to one embodiment includes receiving, at a first system, a command to start encryption. In response to receiving the command to start encryption, a pair of keys are created on the first system. The pair of keys includes a public key and a secret key. The method further includes outputting the public key to a second system and saving the secret key on the first system. A command encrypted using the public key is received by the first system. The encrypted command is decrypted on the first system using the secret key and the decrypted command is executed. A computer program product according to another embodiment includes a computer readable storage medium having program instructions embodied therewith. The program instructions are readable and/or executable by a computer to cause the computer to perform the foregoing method.
Utility
7 Dec 2020
9 Jun 2022