Method of securing a computer program. and corresponding device, method of updating and update server

作者: David Naccache

DOI:

关键词:

摘要: A method for securing use of a primary computer program driving at least one data receiving and delivery device. The implements secondary checking program, different from the capable delivering same output as portion referred to critical portion, in presence identical input data. following steps are performed when portions is activated: executing first based on data; second comparing generating anomaly information, if different; transmitting information remote server; continuing

参考文章(18)
Gerald M. Masson, Gregory F. Sullivan, Method and apparatus for fault tolerance ,(1990)
Mai H. Nguyen, Mark L. Hanson, Lorraine M. Fesq, In situ method and system for autonomous fault detection, isolation and recovery ,(1997)
Sanjay Gupta, Steven L. Roberts, Christopher J. Spandikow, System and Method for Test Generation for System Level Verification Using Parallel Algorithms ,(2005)
Larry J. Yount, Robert D. Girts, Rick H. Hay, Clarence S. Smith, Fail-operational fault tolerant flight critical computer architecture and monitoring method ,(1993)
Makoto Nohmi, Shinya Ohtsuji, Keisuke Bekki, Korefumi Tashiro, Hiroshi Sato, Yoshimichi Sato, Nobuyasu Kanekawa, Shoji Suzuki, Logic circuit having error detection function, redundant resource management method, and fault tolerant system using it ,(1994)
Thomas Lendroth, Michael Schaffrath, Jan Olsen, Horst Muller, Marc Webster, Jens Fichtner, Nils Kirstaedter, Testing versions of applications ,(2002)
Todd Scallan, William G. Cuan, Vijayakumar Kothandaraman, System for transactionally deploying content across multiple machines ,(2005)