摘要 |
<p>A computer-readable instruction stream is verified (410) that it does not violate run-time security constraints (420) in an execution environment (150) and is then stored in a storage element (140). Upon retrieval and prior to execution, the instruction stream is verified (510) that it has not been modified (520) while in storage. The stored instruction stream is then executed (530) bypassing any further verification of the run-time security constraints in the execution environment (150).</p> |