摘要 |
<p>The method involves analyzing data received from transmission channels of servers (2, 4), comparing the data, and switching-over to the server (4) for the transmission of single data flow from the server (4). The server (4) is switched-over to, if the server (2) is inactive for an inactivity delay (S) while the server (4) is active for the delay (S). The fixed time is equal to the longest latency accepted between the two servers. An independent claim is also included for a computer program including instructions for implementing a data flow securing method.</p> |