摘要 |
<p>A secure implementation of a transition machine utilizing requirements oriented application programming and a hardware executive system controller (10). The system controller (10) is physically separate and protected from data processors (2a, 2b, 2c) executing the application programs and limits access authorization both for program execute and data read and write operations. </p> |