PROCEDE D'EXECUTION D'UN LOGICIEL SECURITAIRE ET D'UN LOGICIEL NON SECURITAIRE ENTRELACES
The method involves executing (100) secured and non secured software grouped in a non-secured common software with safety constraints corresponding to constraints of non-secured software so as to update an output datum of non-secured software module. A secured software is executed (120) with safety...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Patent |
Sprache: | fre |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | The method involves executing (100) secured and non secured software grouped in a non-secured common software with safety constraints corresponding to constraints of non-secured software so as to update an output datum of non-secured software module. A secured software is executed (120) with safety constraints corresponding to those of the secured software by using the output datum of the secured software module as an updated output datum. The updated output datum is transferred from the non secured common software towards secured software. |
---|