摘要 |
The method involves requesting a security for transactions in a stage, and administrating requests under usage of transaction-identifiers in another stage, where the transaction-identifiers are assigned to the respective transactions and arranged in a data block (11). A write statement is examined to check whether the transaction-identifiers are valid, and original data is stored in a recycling buffer by using the write statement. A new entry to the list of valid transaction-identifiers takes place during starting of the transactions. Independent claims are also included for the following: (1) a portable data carrier comprising a processor and a memory (2) a computer program product for executing a method for processing a transaction. |