摘要 |
A computer-readable instruction stream is verified to determine that it does not violate the run-time security constraints of the execution environment (150). The computer-readable instruction stream after verification is stored in a storage device (140). The execution environment (150) retrieves the computer-readable instruction stream from the storage device (14) and verifies that the computer-readable instruction stream has not been modified. Upon verification, the computer-readable instruction stream is executed, while bypassing verification of the run-time security constraints of the execution environment (150).
|