Secure third party scripting environment
First Claim
Patent Images
1. A computer-implemented method for securing a third party scripting environment, the computer-implemented method comprising:
- receiving, by a computing device, a document to form a source input;
defining, by the computing device, a schema with functionality of an underlying target script language, wherein defining the schema comprises identifying operations for the target script language to form a group of identified operations, wherein only the identified operations are deemed safe in the target script language;
responsive to determining, by the computing device, that the source input includes at least one operation that is not included in the group of identified operations, rejecting the source input; and
responsive to determining, by the computing device, that the source input includes only operations that are included in the group of identified operations;
applying, by the computing device, the schema to the source input to generate clean language definitions; and
translating, by the computing device, the clean language definitions into a translated script of the target script language.
1 Assignment
0 Petitions
Accused Products
Abstract
An illustrative embodiment of a computer-implemented method for securing a third party scripting environment receives a document to form a source input, defines a schema with functionality of an underlying target script language, applies the schema to the source input to generate clean language definitions and translates the clean language definitions into a translated script of the target script language.
13 Citations
20 Claims
-
1. A computer-implemented method for securing a third party scripting environment, the computer-implemented method comprising:
-
receiving, by a computing device, a document to form a source input; defining, by the computing device, a schema with functionality of an underlying target script language, wherein defining the schema comprises identifying operations for the target script language to form a group of identified operations, wherein only the identified operations are deemed safe in the target script language; responsive to determining, by the computing device, that the source input includes at least one operation that is not included in the group of identified operations, rejecting the source input; and responsive to determining, by the computing device, that the source input includes only operations that are included in the group of identified operations; applying, by the computing device, the schema to the source input to generate clean language definitions; and translating, by the computing device, the clean language definitions into a translated script of the target script language. - View Dependent Claims (2, 3, 4, 5, 6, 9, 19)
-
-
7. A computer program product for securing a third party scripting environment, the computer program product comprising:
-
a computer-readable storage device containing computer executable program code stored thereon, the computer executable program code comprising; computer executable program code to receive a document to form a source input; computer executable program code to define a schema with functionality of an underlying target script language, wherein defining the schema comprises identifying operations for the target script language to form a group of identified operations, wherein only the identified operations are deemed safe in the target script language; computer executable program code to reject the source input responsive to determining that the source input includes at least one operation that is not included in the group of identified operations; computer executable program code to apply the schema to the source input to generate clean language definitions responsive to determining that the source input includes only operations that are included in the group of identified operations; and computer executable program code to translate the clean language definitions into a translated script of the target script language responsive to determining that the source input includes only operations that are included in the group of identified operations. - View Dependent Claims (8, 10, 11, 12, 20)
-
-
13. An apparatus for securing a third party scripting environment, the apparatus comprising:
-
a communications fabric; a computer-readable medium connected to the communications fabric, wherein the computer-readable medium contains computer executable program code; a communications unit connected to the communications fabric; an input/output unit connected to the communications fabric; a display connected to the communications fabric; and a processor unit connected to the communications fabric, wherein the processor unit executes the computer executable program code to direct the apparatus to; receive a document to form a source input; define a schema with functionality of an underlying target script language, wherein defining the schema comprises identifying operations for the target script language to form a group of identified operations, wherein only the identified operations are deemed safe in the target script language; responsive to determining that the source input includes at least one operation that is not included in the group of identified operations, reject the source input; and responsive to determining that the source input includes only operations that are included in the group of identified operations; apply the schema to the source input to generate clean language definitions; and translate the clean language definitions into a translated script of the target script language. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification