作者: David Naccache
DOI:
关键词:
摘要: A method for securing use of a primary computer program driving at least one data receiving and delivery device. The implements secondary checking program, different from the capable delivering same output as portion referred to critical portion, in presence identical input data. following steps are performed when portions is activated: executing first based on data; second comparing generating anomaly information, if different; transmitting information remote server; continuing